[JBoss JIRA] (ISPN-8061) Upgrade to Hibernate Search 5.8.0.Beta4 : SPI cleanup
by Sanne Grinovero (JIRA)
[ https://issues.jboss.org/browse/ISPN-8061?page=com.atlassian.jira.plugin.... ]
Sanne Grinovero updated ISPN-8061:
----------------------------------
Status: Open (was: New)
> Upgrade to Hibernate Search 5.8.0.Beta4 : SPI cleanup
> -----------------------------------------------------
>
> Key: ISPN-8061
> URL: https://issues.jboss.org/browse/ISPN-8061
> Project: Infinispan
> Issue Type: Component Upgrade
> Components: Embedded Querying
> Reporter: Sanne Grinovero
> Assignee: Sanne Grinovero
> Fix For: 9.1.0.Final
>
>
> This upgrade of Hibernate Search is very minor in terms of functionality, but represents an important milestone towards using the new SPI.
> Many of the deprecated methods used by Infinispan in the past have been removed, so I will recommend to upgrade to maintain compatibility with further releases of this generation.
--
This message was sent by Atlassian JIRA
(v7.2.3#72005)
7 years, 6 months
[JBoss JIRA] (ISPN-8060) Remove indexed entity autodetection
by Adrian Nistor (JIRA)
Adrian Nistor created ISPN-8060:
-----------------------------------
Summary: Remove indexed entity autodetection
Key: ISPN-8060
URL: https://issues.jboss.org/browse/ISPN-8060
Project: Infinispan
Issue Type: Enhancement
Components: Embedded Querying, Remote Querying
Reporter: Adrian Nistor
Fix For: 10.0.0.Final
All indexed types should be predeclared.
Existing tests for autodetection should be converted into tests that prove autodetection is no longer supported.
--
This message was sent by Atlassian JIRA
(v7.2.3#72005)
7 years, 6 months
[JBoss JIRA] (ISPN-7973) Investigate Service Brokers
by Sebastian Łaskawiec (JIRA)
[ https://issues.jboss.org/browse/ISPN-7973?page=com.atlassian.jira.plugin.... ]
Sebastian Łaskawiec edited comment on ISPN-7973 at 7/12/17 9:17 AM:
--------------------------------------------------------------------
Things to clarify and other issues:
* No UI for creating/deleting/editing ServicePlans. It is also worth to mention that OpenShift Origin (with {{oc cluster up}}) comes with one default plan (use {{oc edit ServiceClass infinispan-ephemeral}} to view it).
* Shall we create separate separate service or one service with multiple plans?
* It seems there is no way to let the client specify how the secret created by binding should look like. It can be defined from a service broker perspective (have a look at this [test|https://github.com/openshift/origin/blob/f4b675ea183f1ebec3d15373337...]). So it might be better (for now?) to let the template create a secret for Service Consumers.
* In addition to previous point - it seems that [MariaDB Template|https://github.com/openshift/origin/blob/master/examples/db-temp...] handles this correctly. We should copy its behavior.
was (Author: sebastian.laskawiec):
Things to clarify and other issues:
* No UI for creating/deleting/editing ServicePlans. It is also worth to mention that OpenShift Origin (with {{oc cluster up}}) comes with one default plan (use {{oc edit ServiceClass infinispan-ephemeral}} to view it).
* Shall we create separate separate service or one service with multiple plans?
* It seems there is no way to let the client specify how the secret created by binding should look like. It can be defined from a service broker perspective (have a look at this [test|https://github.com/openshift/origin/blob/f4b675ea183f1ebec3d15373337...]). So it might be better (for now?) to let the template create a secret for Service Consumers.
> Investigate Service Brokers
> ---------------------------
>
> Key: ISPN-7973
> URL: https://issues.jboss.org/browse/ISPN-7973
> Project: Infinispan
> Issue Type: Feature Request
> Components: Cloud Integrations
> Reporter: Sebastian Łaskawiec
> Assignee: Sebastian Łaskawiec
>
--
This message was sent by Atlassian JIRA
(v7.2.3#72005)
7 years, 6 months
[JBoss JIRA] (ISPN-7973) Investigate Service Brokers
by Sebastian Łaskawiec (JIRA)
[ https://issues.jboss.org/browse/ISPN-7973?page=com.atlassian.jira.plugin.... ]
Sebastian Łaskawiec edited comment on ISPN-7973 at 7/12/17 8:20 AM:
--------------------------------------------------------------------
Things to clarify and other issues:
* No UI for creating/deleting/editing ServicePlans. It is also worth to mention that OpenShift Origin (with {{oc cluster up}}) comes with one default plan (use {{oc edit ServiceClass infinispan-ephemeral}} to view it).
* Shall we create separate separate service or one service with multiple plans?
* It seems there is no way to let the client specify how the secret created by binding should look like. It can be defined from a service broker perspective (have a look at this [test|https://github.com/openshift/origin/blob/f4b675ea183f1ebec3d15373337...]). So it might be better (for now?) to let the template create a secret for Service Consumers.
was (Author: sebastian.laskawiec):
Things to clarify and other issues:
* No UI for creating/deleting/editing ServicePlans. It is also worth to mention that OpenShift Origin (with {{oc cluster up}}) comes with one default plan (use {{oc edit ServiceClass infinispan-ephemeral}} to view it).
* Shall we create separate separate service or one service with multiple plans?
> Investigate Service Brokers
> ---------------------------
>
> Key: ISPN-7973
> URL: https://issues.jboss.org/browse/ISPN-7973
> Project: Infinispan
> Issue Type: Feature Request
> Components: Cloud Integrations
> Reporter: Sebastian Łaskawiec
> Assignee: Sebastian Łaskawiec
>
--
This message was sent by Atlassian JIRA
(v7.2.3#72005)
7 years, 6 months
[JBoss JIRA] (ISPN-8059) HotRod keySet operation requires ADMIN permissions
by Martin Gencur (JIRA)
[ https://issues.jboss.org/browse/ISPN-8059?page=com.atlassian.jira.plugin.... ]
Martin Gencur updated ISPN-8059:
--------------------------------
Description:
Steps to reproduce:
1) uncomment testKeySet in HotRodOperationsAuthzIT#testSupervisor
(note that the supervisor has BULK_READ permission defined in configuration)
2) run the test in the server test suite
This bug seems to be resolved in current master branch (9.1.0-SNAPSHOT - commit 5c5ff99) as I wasn't able to reproduce it there.
Stacktrace:
{code}
testSupervisor(org.infinispan.server.test.client.hotrod.security.HotRodOperationsAuthzIT) Time elapsed: 0.216 sec <<< ERROR!
org.infinispan.client.hotrod.exceptions.HotRodClientException: java.lang.SecurityException: ISPN000287: Unauthorized access: subject 'Subject with principal(s): [SimpleUserPrincipal [name=supervisor], InetAddressPrincipal [address=127.0.0.1/127.0.0.1], supervisor@ApplicationRealm, supervisor@ApplicationRealm, supervisor]' lacks 'ADMIN' permission
at org.infinispan.client.hotrod.impl.protocol.Codec20.checkForErrorsInResponseStatus(Codec20.java:363)
at org.infinispan.client.hotrod.impl.protocol.Codec20.readPartialHeader(Codec20.java:152)
at org.infinispan.client.hotrod.impl.protocol.Codec20.readHeader(Codec20.java:138)
at org.infinispan.client.hotrod.impl.operations.HotRodOperation.readHeaderAndValidate(HotRodOperation.java:60)
at org.infinispan.client.hotrod.impl.operations.BulkGetKeysOperation.executeOperation(BulkGetKeysOperation.java:39)
at org.infinispan.client.hotrod.impl.operations.BulkGetKeysOperation.executeOperation(BulkGetKeysOperation.java:20)
at org.infinispan.client.hotrod.impl.operations.RetryOnFailureOperation.execute(RetryOnFailureOperation.java:56)
at org.infinispan.client.hotrod.impl.RemoteCacheImpl.keySet(RemoteCacheImpl.java:529)
at org.infinispan.server.test.client.hotrod.security.HotRodAuthzOperationTests.testKeySet(HotRodAuthzOperationTests.java:113)
at org.infinispan.server.test.client.hotrod.security.HotRodOperationsAuthzIT.testSupervisor(HotRodOperationsAuthzIT.java:111)
{code}
was:
Steps to reproduce:
1) uncomment testKeySet in HotRodOperationsAuthzIT#testSupervisor
(note that the supervisor has BULK_READ permission defined in configuration)
2) run the test in the server test suite
This bug seems to be resolved in current master branch (9.1.0-SNAPSHOT) as I wasn't able to reproduce it there.
Stacktrace:
{code}
testSupervisor(org.infinispan.server.test.client.hotrod.security.HotRodOperationsAuthzIT) Time elapsed: 0.216 sec <<< ERROR!
org.infinispan.client.hotrod.exceptions.HotRodClientException: java.lang.SecurityException: ISPN000287: Unauthorized access: subject 'Subject with principal(s): [SimpleUserPrincipal [name=supervisor], InetAddressPrincipal [address=127.0.0.1/127.0.0.1], supervisor@ApplicationRealm, supervisor@ApplicationRealm, supervisor]' lacks 'ADMIN' permission
at org.infinispan.client.hotrod.impl.protocol.Codec20.checkForErrorsInResponseStatus(Codec20.java:363)
at org.infinispan.client.hotrod.impl.protocol.Codec20.readPartialHeader(Codec20.java:152)
at org.infinispan.client.hotrod.impl.protocol.Codec20.readHeader(Codec20.java:138)
at org.infinispan.client.hotrod.impl.operations.HotRodOperation.readHeaderAndValidate(HotRodOperation.java:60)
at org.infinispan.client.hotrod.impl.operations.BulkGetKeysOperation.executeOperation(BulkGetKeysOperation.java:39)
at org.infinispan.client.hotrod.impl.operations.BulkGetKeysOperation.executeOperation(BulkGetKeysOperation.java:20)
at org.infinispan.client.hotrod.impl.operations.RetryOnFailureOperation.execute(RetryOnFailureOperation.java:56)
at org.infinispan.client.hotrod.impl.RemoteCacheImpl.keySet(RemoteCacheImpl.java:529)
at org.infinispan.server.test.client.hotrod.security.HotRodAuthzOperationTests.testKeySet(HotRodAuthzOperationTests.java:113)
at org.infinispan.server.test.client.hotrod.security.HotRodOperationsAuthzIT.testSupervisor(HotRodOperationsAuthzIT.java:111)
{code}
> HotRod keySet operation requires ADMIN permissions
> --------------------------------------------------
>
> Key: ISPN-8059
> URL: https://issues.jboss.org/browse/ISPN-8059
> Project: Infinispan
> Issue Type: Bug
> Components: Security
> Affects Versions: 9.0.3.Final
> Reporter: Martin Gencur
>
> Steps to reproduce:
> 1) uncomment testKeySet in HotRodOperationsAuthzIT#testSupervisor
> (note that the supervisor has BULK_READ permission defined in configuration)
> 2) run the test in the server test suite
> This bug seems to be resolved in current master branch (9.1.0-SNAPSHOT - commit 5c5ff99) as I wasn't able to reproduce it there.
> Stacktrace:
> {code}
> testSupervisor(org.infinispan.server.test.client.hotrod.security.HotRodOperationsAuthzIT) Time elapsed: 0.216 sec <<< ERROR!
> org.infinispan.client.hotrod.exceptions.HotRodClientException: java.lang.SecurityException: ISPN000287: Unauthorized access: subject 'Subject with principal(s): [SimpleUserPrincipal [name=supervisor], InetAddressPrincipal [address=127.0.0.1/127.0.0.1], supervisor@ApplicationRealm, supervisor@ApplicationRealm, supervisor]' lacks 'ADMIN' permission
> at org.infinispan.client.hotrod.impl.protocol.Codec20.checkForErrorsInResponseStatus(Codec20.java:363)
> at org.infinispan.client.hotrod.impl.protocol.Codec20.readPartialHeader(Codec20.java:152)
> at org.infinispan.client.hotrod.impl.protocol.Codec20.readHeader(Codec20.java:138)
> at org.infinispan.client.hotrod.impl.operations.HotRodOperation.readHeaderAndValidate(HotRodOperation.java:60)
> at org.infinispan.client.hotrod.impl.operations.BulkGetKeysOperation.executeOperation(BulkGetKeysOperation.java:39)
> at org.infinispan.client.hotrod.impl.operations.BulkGetKeysOperation.executeOperation(BulkGetKeysOperation.java:20)
> at org.infinispan.client.hotrod.impl.operations.RetryOnFailureOperation.execute(RetryOnFailureOperation.java:56)
> at org.infinispan.client.hotrod.impl.RemoteCacheImpl.keySet(RemoteCacheImpl.java:529)
> at org.infinispan.server.test.client.hotrod.security.HotRodAuthzOperationTests.testKeySet(HotRodAuthzOperationTests.java:113)
> at org.infinispan.server.test.client.hotrod.security.HotRodOperationsAuthzIT.testSupervisor(HotRodOperationsAuthzIT.java:111)
> {code}
--
This message was sent by Atlassian JIRA
(v7.2.3#72005)
7 years, 6 months
[JBoss JIRA] (ISPN-8059) HotRod keySet operation requires ADMIN permissions
by Martin Gencur (JIRA)
Martin Gencur created ISPN-8059:
-----------------------------------
Summary: HotRod keySet operation requires ADMIN permissions
Key: ISPN-8059
URL: https://issues.jboss.org/browse/ISPN-8059
Project: Infinispan
Issue Type: Bug
Components: Security
Affects Versions: 9.0.3.Final
Reporter: Martin Gencur
Steps to reproduce:
1) uncomment testKeySet in HotRodOperationsAuthzIT#testSupervisor
(note that the supervisor has BULK_READ permission defined in configuration)
2) run the test in the server test suite
This bug seems to be resolved in current master branch (9.1.0-SNAPSHOT) as I wasn't able to reproduce it there.
Stacktrace:
{code}
testSupervisor(org.infinispan.server.test.client.hotrod.security.HotRodOperationsAuthzIT) Time elapsed: 0.216 sec <<< ERROR!
org.infinispan.client.hotrod.exceptions.HotRodClientException: java.lang.SecurityException: ISPN000287: Unauthorized access: subject 'Subject with principal(s): [SimpleUserPrincipal [name=supervisor], InetAddressPrincipal [address=127.0.0.1/127.0.0.1], supervisor@ApplicationRealm, supervisor@ApplicationRealm, supervisor]' lacks 'ADMIN' permission
at org.infinispan.client.hotrod.impl.protocol.Codec20.checkForErrorsInResponseStatus(Codec20.java:363)
at org.infinispan.client.hotrod.impl.protocol.Codec20.readPartialHeader(Codec20.java:152)
at org.infinispan.client.hotrod.impl.protocol.Codec20.readHeader(Codec20.java:138)
at org.infinispan.client.hotrod.impl.operations.HotRodOperation.readHeaderAndValidate(HotRodOperation.java:60)
at org.infinispan.client.hotrod.impl.operations.BulkGetKeysOperation.executeOperation(BulkGetKeysOperation.java:39)
at org.infinispan.client.hotrod.impl.operations.BulkGetKeysOperation.executeOperation(BulkGetKeysOperation.java:20)
at org.infinispan.client.hotrod.impl.operations.RetryOnFailureOperation.execute(RetryOnFailureOperation.java:56)
at org.infinispan.client.hotrod.impl.RemoteCacheImpl.keySet(RemoteCacheImpl.java:529)
at org.infinispan.server.test.client.hotrod.security.HotRodAuthzOperationTests.testKeySet(HotRodAuthzOperationTests.java:113)
at org.infinispan.server.test.client.hotrod.security.HotRodOperationsAuthzIT.testSupervisor(HotRodOperationsAuthzIT.java:111)
{code}
--
This message was sent by Atlassian JIRA
(v7.2.3#72005)
7 years, 6 months