[Red Hat JIRA] (ELY-2063) MaskedPassword interface contains 8 algorighms those are unavailable on IBM JDK8
by Marek Kopecky (Jira)
Marek Kopecky created ELY-2063:
----------------------------------
Summary: MaskedPassword interface contains 8 algorighms those are unavailable on IBM JDK8
Key: ELY-2063
URL: https://issues.redhat.com/browse/ELY-2063
Project: WildFly Elytron
Issue Type: Bug
Reporter: Marek Kopecky
Assignee: Darran Lofthouse
MaskedPassword interface contains 8 algorighms those are unavailable on IBM JDK8:
* masked-SHA1-RC2-40
* masked-SHA1-RC2-40-CBC-PKCS5
* masked-SHA1-RC2-128
* masked-SHA1-RC2-128-CBC-PKCS5
* masked-SHA1-RC4-40
* masked-SHA1-RC4-40-ECB
* masked-SHA1-RC4-128
* masked-SHA1-RC4-128-ECB
This leads to MaskedPasswordTest errors on IBM JDK8:
{noformat}
[hudson@csb-rhel7-medium-102630 impl]$ mvn clean install -Dmaven.repo.local=/tmp/mkopecky/repo -Dtest=MaskedPasswordTest -P skip-default-tests -Djava8.home=/path/to/ibm-java-x86_64-sdk-8.0-6.16
...
Running org.wildfly.security.password.impl.MaskedPasswordTest
Tests run: 48, Failures: 0, Errors: 16, Skipped: 0, Time elapsed: 1.688 sec <<< FAILURE! - in org.wildfly.security.password.impl.MaskedPasswordTest
testClearSpec[6: masked-SHA1-RC2-40](org.wildfly.security.password.impl.MaskedPasswordTest) Time elapsed: 0.006 sec <<< ERROR!
java.security.spec.InvalidKeySpecException: java.security.NoSuchAlgorithmException: PBEwithSHA1AndRC2_40 SecretKeyFactory not available
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:91)
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:100)
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:120)
at org.wildfly.security.password.impl.PasswordFactorySpiImpl.engineGeneratePassword(PasswordFactorySpiImpl.java:492)
at org.wildfly.security.password.PasswordFactory.generatePassword(PasswordFactory.java:151)
at org.wildfly.security.password.impl.MaskedPasswordTest.testClearSpec(MaskedPasswordTest.java:84)
Caused by: java.security.NoSuchAlgorithmException: PBEwithSHA1AndRC2_40 SecretKeyFactory not available
at org.wildfly.security.password.impl.MaskedPasswordImpl.getCipher(MaskedPasswordImpl.java:189)
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:87)
... 5 more
testEncryptableSpec[6: masked-SHA1-RC2-40](org.wildfly.security.password.impl.MaskedPasswordTest) Time elapsed: 0 sec <<< ERROR!
java.security.spec.InvalidKeySpecException: java.security.NoSuchAlgorithmException: PBEwithSHA1AndRC2_40 SecretKeyFactory not available
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:91)
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:104)
at org.wildfly.security.password.impl.PasswordFactorySpiImpl.engineGeneratePassword(PasswordFactorySpiImpl.java:483)
at org.wildfly.security.password.PasswordFactory.generatePassword(PasswordFactory.java:151)
at org.wildfly.security.password.impl.MaskedPasswordTest.testEncryptableSpec(MaskedPasswordTest.java:104)
Caused by: java.security.NoSuchAlgorithmException: PBEwithSHA1AndRC2_40 SecretKeyFactory not available
at org.wildfly.security.password.impl.MaskedPasswordImpl.getCipher(MaskedPasswordImpl.java:189)
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:87)
... 4 more
testClearSpec[7: masked-SHA1-RC2-40-CBC-PKCS5](org.wildfly.security.password.impl.MaskedPasswordTest) Time elapsed: 0.002 sec <<< ERROR!
java.security.spec.InvalidKeySpecException: java.security.NoSuchAlgorithmException: PBEwithSHA1Andrc2_40 SecretKeyFactory not available
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:91)
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:100)
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:120)
at org.wildfly.security.password.impl.PasswordFactorySpiImpl.engineGeneratePassword(PasswordFactorySpiImpl.java:492)
at org.wildfly.security.password.PasswordFactory.generatePassword(PasswordFactory.java:151)
at org.wildfly.security.password.impl.MaskedPasswordTest.testClearSpec(MaskedPasswordTest.java:84)
Caused by: java.security.NoSuchAlgorithmException: PBEwithSHA1Andrc2_40 SecretKeyFactory not available
at org.wildfly.security.password.impl.MaskedPasswordImpl.getCipher(MaskedPasswordImpl.java:189)
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:87)
... 5 more
testEncryptableSpec[7: masked-SHA1-RC2-40-CBC-PKCS5](org.wildfly.security.password.impl.MaskedPasswordTest) Time elapsed: 0.001 sec <<< ERROR!
java.security.spec.InvalidKeySpecException: java.security.NoSuchAlgorithmException: PBEwithSHA1Andrc2_40 SecretKeyFactory not available
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:91)
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:104)
at org.wildfly.security.password.impl.PasswordFactorySpiImpl.engineGeneratePassword(PasswordFactorySpiImpl.java:483)
at org.wildfly.security.password.PasswordFactory.generatePassword(PasswordFactory.java:151)
at org.wildfly.security.password.impl.MaskedPasswordTest.testEncryptableSpec(MaskedPasswordTest.java:104)
Caused by: java.security.NoSuchAlgorithmException: PBEwithSHA1Andrc2_40 SecretKeyFactory not available
at org.wildfly.security.password.impl.MaskedPasswordImpl.getCipher(MaskedPasswordImpl.java:189)
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:87)
... 4 more
testClearSpec[8: masked-SHA1-RC2-128](org.wildfly.security.password.impl.MaskedPasswordTest) Time elapsed: 0.001 sec <<< ERROR!
java.security.spec.InvalidKeySpecException: java.security.NoSuchAlgorithmException: PBEWithSHA1AndRC2_128 SecretKeyFactory not available
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:91)
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:100)
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:120)
at org.wildfly.security.password.impl.PasswordFactorySpiImpl.engineGeneratePassword(PasswordFactorySpiImpl.java:492)
at org.wildfly.security.password.PasswordFactory.generatePassword(PasswordFactory.java:151)
at org.wildfly.security.password.impl.MaskedPasswordTest.testClearSpec(MaskedPasswordTest.java:84)
Caused by: java.security.NoSuchAlgorithmException: PBEWithSHA1AndRC2_128 SecretKeyFactory not available
at org.wildfly.security.password.impl.MaskedPasswordImpl.getCipher(MaskedPasswordImpl.java:189)
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:87)
... 5 more
testEncryptableSpec[8: masked-SHA1-RC2-128](org.wildfly.security.password.impl.MaskedPasswordTest) Time elapsed: 0.001 sec <<< ERROR!
java.security.spec.InvalidKeySpecException: java.security.NoSuchAlgorithmException: PBEWithSHA1AndRC2_128 SecretKeyFactory not available
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:91)
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:104)
at org.wildfly.security.password.impl.PasswordFactorySpiImpl.engineGeneratePassword(PasswordFactorySpiImpl.java:483)
at org.wildfly.security.password.PasswordFactory.generatePassword(PasswordFactory.java:151)
at org.wildfly.security.password.impl.MaskedPasswordTest.testEncryptableSpec(MaskedPasswordTest.java:104)
Caused by: java.security.NoSuchAlgorithmException: PBEWithSHA1AndRC2_128 SecretKeyFactory not available
at org.wildfly.security.password.impl.MaskedPasswordImpl.getCipher(MaskedPasswordImpl.java:189)
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:87)
... 4 more
testClearSpec[9: masked-SHA1-RC2-128-CBC-PKCS5](org.wildfly.security.password.impl.MaskedPasswordTest) Time elapsed: 0.001 sec <<< ERROR!
java.security.spec.InvalidKeySpecException: java.security.NoSuchAlgorithmException: PBEWithSHA1andRC2_128 SecretKeyFactory not available
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:91)
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:100)
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:120)
at org.wildfly.security.password.impl.PasswordFactorySpiImpl.engineGeneratePassword(PasswordFactorySpiImpl.java:492)
at org.wildfly.security.password.PasswordFactory.generatePassword(PasswordFactory.java:151)
at org.wildfly.security.password.impl.MaskedPasswordTest.testClearSpec(MaskedPasswordTest.java:84)
Caused by: java.security.NoSuchAlgorithmException: PBEWithSHA1andRC2_128 SecretKeyFactory not available
at org.wildfly.security.password.impl.MaskedPasswordImpl.getCipher(MaskedPasswordImpl.java:189)
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:87)
... 5 more
testEncryptableSpec[9: masked-SHA1-RC2-128-CBC-PKCS5](org.wildfly.security.password.impl.MaskedPasswordTest) Time elapsed: 0 sec <<< ERROR!
java.security.spec.InvalidKeySpecException: java.security.NoSuchAlgorithmException: PBEWithSHA1andRC2_128 SecretKeyFactory not available
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:91)
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:104)
at org.wildfly.security.password.impl.PasswordFactorySpiImpl.engineGeneratePassword(PasswordFactorySpiImpl.java:483)
at org.wildfly.security.password.PasswordFactory.generatePassword(PasswordFactory.java:151)
at org.wildfly.security.password.impl.MaskedPasswordTest.testEncryptableSpec(MaskedPasswordTest.java:104)
Caused by: java.security.NoSuchAlgorithmException: PBEWithSHA1andRC2_128 SecretKeyFactory not available
at org.wildfly.security.password.impl.MaskedPasswordImpl.getCipher(MaskedPasswordImpl.java:189)
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:87)
... 4 more
testClearSpec[10: masked-SHA1-RC4-40](org.wildfly.security.password.impl.MaskedPasswordTest) Time elapsed: 0.001 sec <<< ERROR!
java.security.spec.InvalidKeySpecException: java.security.NoSuchAlgorithmException: PBEWithSHA1AndRC4_40 SecretKeyFactory not available
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:91)
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:100)
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:120)
at org.wildfly.security.password.impl.PasswordFactorySpiImpl.engineGeneratePassword(PasswordFactorySpiImpl.java:492)
at org.wildfly.security.password.PasswordFactory.generatePassword(PasswordFactory.java:151)
at org.wildfly.security.password.impl.MaskedPasswordTest.testClearSpec(MaskedPasswordTest.java:84)
Caused by: java.security.NoSuchAlgorithmException: PBEWithSHA1AndRC4_40 SecretKeyFactory not available
at org.wildfly.security.password.impl.MaskedPasswordImpl.getCipher(MaskedPasswordImpl.java:189)
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:87)
... 5 more
testEncryptableSpec[10: masked-SHA1-RC4-40](org.wildfly.security.password.impl.MaskedPasswordTest) Time elapsed: 0.001 sec <<< ERROR!
java.security.spec.InvalidKeySpecException: java.security.NoSuchAlgorithmException: PBEWithSHA1AndRC4_40 SecretKeyFactory not available
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:91)
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:104)
at org.wildfly.security.password.impl.PasswordFactorySpiImpl.engineGeneratePassword(PasswordFactorySpiImpl.java:483)
at org.wildfly.security.password.PasswordFactory.generatePassword(PasswordFactory.java:151)
at org.wildfly.security.password.impl.MaskedPasswordTest.testEncryptableSpec(MaskedPasswordTest.java:104)
Caused by: java.security.NoSuchAlgorithmException: PBEWithSHA1AndRC4_40 SecretKeyFactory not available
at org.wildfly.security.password.impl.MaskedPasswordImpl.getCipher(MaskedPasswordImpl.java:189)
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:87)
... 4 more
testClearSpec[11: masked-SHA1-RC4-40-ECB](org.wildfly.security.password.impl.MaskedPasswordTest) Time elapsed: 0.002 sec <<< ERROR!
java.security.spec.InvalidKeySpecException: java.security.NoSuchAlgorithmException: PBEWithsha1AndRC4_40 SecretKeyFactory not available
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:91)
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:100)
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:120)
at org.wildfly.security.password.impl.PasswordFactorySpiImpl.engineGeneratePassword(PasswordFactorySpiImpl.java:492)
at org.wildfly.security.password.PasswordFactory.generatePassword(PasswordFactory.java:151)
at org.wildfly.security.password.impl.MaskedPasswordTest.testClearSpec(MaskedPasswordTest.java:84)
Caused by: java.security.NoSuchAlgorithmException: PBEWithsha1AndRC4_40 SecretKeyFactory not available
at org.wildfly.security.password.impl.MaskedPasswordImpl.getCipher(MaskedPasswordImpl.java:189)
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:87)
... 5 more
testEncryptableSpec[11: masked-SHA1-RC4-40-ECB](org.wildfly.security.password.impl.MaskedPasswordTest) Time elapsed: 0.002 sec <<< ERROR!
java.security.spec.InvalidKeySpecException: java.security.NoSuchAlgorithmException: PBEWithsha1AndRC4_40 SecretKeyFactory not available
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:91)
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:104)
at org.wildfly.security.password.impl.PasswordFactorySpiImpl.engineGeneratePassword(PasswordFactorySpiImpl.java:483)
at org.wildfly.security.password.PasswordFactory.generatePassword(PasswordFactory.java:151)
at org.wildfly.security.password.impl.MaskedPasswordTest.testEncryptableSpec(MaskedPasswordTest.java:104)
Caused by: java.security.NoSuchAlgorithmException: PBEWithsha1AndRC4_40 SecretKeyFactory not available
at org.wildfly.security.password.impl.MaskedPasswordImpl.getCipher(MaskedPasswordImpl.java:189)
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:87)
... 4 more
testClearSpec[12: masked-SHA1-RC4-128](org.wildfly.security.password.impl.MaskedPasswordTest) Time elapsed: 0.001 sec <<< ERROR!
java.security.spec.InvalidKeySpecException: java.security.NoSuchAlgorithmException: PBEWithSHA1AndRC4_128 SecretKeyFactory not available
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:91)
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:100)
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:120)
at org.wildfly.security.password.impl.PasswordFactorySpiImpl.engineGeneratePassword(PasswordFactorySpiImpl.java:492)
at org.wildfly.security.password.PasswordFactory.generatePassword(PasswordFactory.java:151)
at org.wildfly.security.password.impl.MaskedPasswordTest.testClearSpec(MaskedPasswordTest.java:84)
Caused by: java.security.NoSuchAlgorithmException: PBEWithSHA1AndRC4_128 SecretKeyFactory not available
at org.wildfly.security.password.impl.MaskedPasswordImpl.getCipher(MaskedPasswordImpl.java:189)
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:87)
... 5 more
testEncryptableSpec[12: masked-SHA1-RC4-128](org.wildfly.security.password.impl.MaskedPasswordTest) Time elapsed: 0.002 sec <<< ERROR!
java.security.spec.InvalidKeySpecException: java.security.NoSuchAlgorithmException: PBEWithSHA1AndRC4_128 SecretKeyFactory not available
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:91)
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:104)
at org.wildfly.security.password.impl.PasswordFactorySpiImpl.engineGeneratePassword(PasswordFactorySpiImpl.java:483)
at org.wildfly.security.password.PasswordFactory.generatePassword(PasswordFactory.java:151)
at org.wildfly.security.password.impl.MaskedPasswordTest.testEncryptableSpec(MaskedPasswordTest.java:104)
Caused by: java.security.NoSuchAlgorithmException: PBEWithSHA1AndRC4_128 SecretKeyFactory not available
at org.wildfly.security.password.impl.MaskedPasswordImpl.getCipher(MaskedPasswordImpl.java:189)
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:87)
... 4 more
testClearSpec[13: masked-SHA1-RC4-128-ECB](org.wildfly.security.password.impl.MaskedPasswordTest) Time elapsed: 0 sec <<< ERROR!
java.security.spec.InvalidKeySpecException: java.security.NoSuchAlgorithmException: pbeWithSHA1AndRC4_128 SecretKeyFactory not available
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:91)
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:100)
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:120)
at org.wildfly.security.password.impl.PasswordFactorySpiImpl.engineGeneratePassword(PasswordFactorySpiImpl.java:492)
at org.wildfly.security.password.PasswordFactory.generatePassword(PasswordFactory.java:151)
at org.wildfly.security.password.impl.MaskedPasswordTest.testClearSpec(MaskedPasswordTest.java:84)
Caused by: java.security.NoSuchAlgorithmException: pbeWithSHA1AndRC4_128 SecretKeyFactory not available
at org.wildfly.security.password.impl.MaskedPasswordImpl.getCipher(MaskedPasswordImpl.java:189)
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:87)
... 5 more
testEncryptableSpec[13: masked-SHA1-RC4-128-ECB](org.wildfly.security.password.impl.MaskedPasswordTest) Time elapsed: 0 sec <<< ERROR!
java.security.spec.InvalidKeySpecException: java.security.NoSuchAlgorithmException: pbeWithSHA1AndRC4_128 SecretKeyFactory not available
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:91)
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:104)
at org.wildfly.security.password.impl.PasswordFactorySpiImpl.engineGeneratePassword(PasswordFactorySpiImpl.java:483)
at org.wildfly.security.password.PasswordFactory.generatePassword(PasswordFactory.java:151)
at org.wildfly.security.password.impl.MaskedPasswordTest.testEncryptableSpec(MaskedPasswordTest.java:104)
Caused by: java.security.NoSuchAlgorithmException: pbeWithSHA1AndRC4_128 SecretKeyFactory not available
at org.wildfly.security.password.impl.MaskedPasswordImpl.getCipher(MaskedPasswordImpl.java:189)
at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:87)
... 4 more
...
[hudson@csb-rhel7-medium-102630 impl]$
{noformat}
If this is excepted, MaskedPasswordTest needs to be fixed and proper explanation needs to be added to MaskedPassword interface (so far this interface suggest that only listed algorithms with @Deprecated annotation may be unavailable). If this is not excepted, then the bug needs to be fixed.
--
This message was sent by Atlassian Jira
(v7.13.8#713008)
4 years, 9 months
[Red Hat JIRA] (DROOLS-5669) DMN Decision Table Analysis integrated in Maven and Kogito
by Kris Verlaenen (Jira)
[ https://issues.redhat.com/browse/DROOLS-5669?page=com.atlassian.jira.plug... ]
Kris Verlaenen updated DROOLS-5669:
-----------------------------------
Sprint: 2020 Week 40-42 (from Sep 28), 2020 Week 43-45 (from Okt 19), 2020 Week 46-48 (from Nov 9), 2020 Week 49-51 (from Nov 30), 2020 Week 52-03 (from Dec 21) (was: 2020 Week 40-42 (from Sep 28), 2020 Week 43-45 (from Okt 19), 2020 Week 46-48 (from Nov 9), 2020 Week 49-51 (from Nov 30))
> DMN Decision Table Analysis integrated in Maven and Kogito
> ----------------------------------------------------------
>
> Key: DROOLS-5669
> URL: https://issues.redhat.com/browse/DROOLS-5669
> Project: Drools
> Issue Type: Story
> Components: dmn engine
> Reporter: Matteo Mortari
> Assignee: Matteo Mortari
> Priority: Major
>
> *Motivation*: currently DT (static) analysis is only available when editor is open
> *Goals*: perform DMN DT analysis during build time, so the user is not required to await when backend services are available, or even worse needed to open DMN files one by one and checking DT analysis manually per each file.
> *Impacts*: integration with kie-maven-plugin, Kogito codegen (which in turn is used by Kogito Quarkus extension AND Kogito maven plugin for SB)
--
This message was sent by Atlassian Jira
(v7.13.8#713008)
4 years, 9 months
[Red Hat JIRA] (DROOLS-5898) Make PMML-generated classes serializable
by Gabriele Cardosi (Jira)
[ https://issues.redhat.com/browse/DROOLS-5898?page=com.atlassian.jira.plug... ]
Gabriele Cardosi closed DROOLS-5898.
------------------------------------
> Make PMML-generated classes serializable
> ----------------------------------------
>
> Key: DROOLS-5898
> URL: https://issues.redhat.com/browse/DROOLS-5898
> Project: Drools
> Issue Type: Sub-task
> Reporter: Gabriele Cardosi
> Assignee: Gabriele Cardosi
> Priority: Major
> Labels: TrustyAI
>
> Currently generated PMML classes are not serializable, and some exception may arise
> e.g.:
> {code:java}
> 16:48:34,544 ERROR [org.guvnor.common.services.backend.exceptions.ExceptionUtilities] (default task-8) Exception thrown: java.io.NotSerializableException: categoricalvariablesregression.CategoricalVariablesRegression: java.lang.RuntimeException: java.io.NotSerializableException: categoricalvariablesregression.CategoricalVariablesRegression
> at deployment.business-central.war//org.drools.core.util.ClassUtils.deepClone(ClassUtils.java:761)
> at deployment.business-central.war//org.drools.core.definitions.impl.KnowledgePackageImpl.deepCloneIfAlreadyInUse(KnowledgePackageImpl.java:814)
> at deployment.business-central.war//org.drools.core.definitions.impl.KnowledgePackageImpl.deepCloneIfAlreadyInUse(KnowledgePackageImpl.java:69)
> at deployment.business-central.war//org.drools.core.impl.KnowledgeBaseImpl.addPackages(KnowledgeBaseImpl.java:723)
> at deployment.business-central.war//org.drools.compiler.kie.builder.impl.AbstractKieModule.createKieBase(AbstractKieModule.java:221)
> at deployment.business-central.war//org.drools.compiler.kie.builder.impl.KieContainerImpl.createKieBase(KieContainerImpl.java:470)
> at deployment.business-central.war//org.drools.compiler.kie.builder.impl.KieContainerImpl.getKieBase(KieContainerImpl.java:438)
> at deployment.business-central.war//org.drools.compiler.kie.builder.impl.KieContainerImpl.getKieBase(KieContainerImpl.java:419)
> at deployment.business-central.war//org.drools.scenariosimulation.backend.util.DMNSimulationUtils.extractDMNRuntime(DMNSimulationUtils.java:43)
> {code}
> Generated classes must be serializable
--
This message was sent by Atlassian Jira
(v7.13.8#713008)
4 years, 9 months
[Red Hat JIRA] (WFLY-14245) Integrate MP OpenAPI 2.0
by Paul Ferraro (Jira)
[ https://issues.redhat.com/browse/WFLY-14245?page=com.atlassian.jira.plugi... ]
Paul Ferraro moved EAP7-1605 to WFLY-14245:
-------------------------------------------
Project: WildFly (was: JBoss EAP Planning for version 7 and above)
Key: WFLY-14245 (was: EAP7-1605)
Issue Type: Feature Request (was: Requirement)
Workflow: GIT Pull Request workflow (was: EAP Agile Workflow 2.0)
Component/s: MP OpenAPI
(was: MicroProfile)
EAP PT Feature Implementation (FI): (was: TODO)
EAP PT Pre-Checked (PC): (was: TODO)
Target Release: (was: EAP-XP-3.0.0.GA)
EAP PT Community Docs (CD): (was: TODO)
EAP PT Product Docs (PD): (was: New)
EAP PT Test Dev (TD): (was: TODO)
EAP PT Docs Analysis (DA): (was: TODO)
EAP PT Test Plan (TP): (was: TODO)
EAP PT Analysis Document (AD): (was: TODO)
> Integrate MP OpenAPI 2.0
> ------------------------
>
> Key: WFLY-14245
> URL: https://issues.redhat.com/browse/WFLY-14245
> Project: WildFly
> Issue Type: Feature Request
> Components: MP OpenAPI
> Reporter: Paul Ferraro
> Assignee: Paul Ferraro
> Priority: Major
> Labels: MP4.0
>
> [https://github.com/eclipse/microprofile-open-api/blob/master/spec/src/mai...]
--
This message was sent by Atlassian Jira
(v7.13.8#713008)
4 years, 9 months
[Red Hat JIRA] (DROOLS-5426) Code completion with C3 for FEEL
by Kris Verlaenen (Jira)
[ https://issues.redhat.com/browse/DROOLS-5426?page=com.atlassian.jira.plug... ]
Kris Verlaenen updated DROOLS-5426:
-----------------------------------
Sprint: 2020 Week 40-42 (from Sep 28), 2020 Week 43-45 (from Okt 19), 2020 Week 46-48 (from Nov 9), 2020 Week 49-51 (from Nov 30), 2020 Week 52-03 (from Dec 21) (was: 2020 Week 40-42 (from Sep 28), 2020 Week 43-45 (from Okt 19), 2020 Week 46-48 (from Nov 9), 2020 Week 49-51 (from Nov 30))
> Code completion with C3 for FEEL
> --------------------------------
>
> Key: DROOLS-5426
> URL: https://issues.redhat.com/browse/DROOLS-5426
> Project: Drools
> Issue Type: Feature Request
> Reporter: Toni Rikkola
> Assignee: Toni Rikkola
> Priority: Major
>
> First iteration will more or less match the existing propositions. With some small benefits. For example the correct location detection of the identifiers and functions are improved.
--
This message was sent by Atlassian Jira
(v7.13.8#713008)
4 years, 9 months
[Red Hat JIRA] (DROOLS-5389) Create single abstract class for integration tests in new PMML implementation
by Kris Verlaenen (Jira)
[ https://issues.redhat.com/browse/DROOLS-5389?page=com.atlassian.jira.plug... ]
Kris Verlaenen updated DROOLS-5389:
-----------------------------------
Sprint: 2020 Week 22-24 (from May 25), 2020 Week 25-27 (from Jun 15), 2020 Week 28-30 (from Jul 6), 2020 Week 31-33 (from Jul 27), 2020 Week 34-36 (from Aug 17), 2020 Week 37-39 (from Sep 7), 2020 Week 40-42 (from Sep 28), 2020 Week 43-45 (from Okt 19), 2020 Week 46-48 (from Nov 9), 2020 Week 49-51 (from Nov 30), 2020 Week 52-03 (from Dec 21) (was: 2020 Week 22-24 (from May 25), 2020 Week 25-27 (from Jun 15), 2020 Week 28-30 (from Jul 6), 2020 Week 31-33 (from Jul 27), 2020 Week 34-36 (from Aug 17), 2020 Week 37-39 (from Sep 7), 2020 Week 40-42 (from Sep 28), 2020 Week 43-45 (from Okt 19), 2020 Week 46-48 (from Nov 9), 2020 Week 49-51 (from Nov 30))
> Create single abstract class for integration tests in new PMML implementation
> -----------------------------------------------------------------------------
>
> Key: DROOLS-5389
> URL: https://issues.redhat.com/browse/DROOLS-5389
> Project: Drools
> Issue Type: Task
> Reporter: Jiri Petrlik
> Assignee: Jiri Petrlik
> Priority: Major
> Labels: TrustyAI
>
> Currently there are multiple abstract classes for PMML integration tests such as AbstractPMMLTreeTest, AbstractPMMLRegressionTest etc. The goal of this JIRA is to unify them and create one single abstract class.
--
This message was sent by Atlassian Jira
(v7.13.8#713008)
4 years, 9 months
[Red Hat JIRA] (DROOLS-5282) Client side FEEL
by Kris Verlaenen (Jira)
[ https://issues.redhat.com/browse/DROOLS-5282?page=com.atlassian.jira.plug... ]
Kris Verlaenen updated DROOLS-5282:
-----------------------------------
Sprint: 2020 Week 16-18 (from Apr 13), 2020 Week 19-21 (from May 4), 2020 Week 22-24 (from May 25), 2020 Week 25-27 (from Jun 15), 2020 Week 28-30 (from Jul 6), 2020 Week 31-33 (from Jul 27), 2020 Week 34-36 (from Aug 17), 2020 Week 37-39 (from Sep 7), 2020 Week 40-42 (from Sep 28), 2020 Week 43-45 (from Okt 19), 2020 Week 46-48 (from Nov 9), 2020 Week 49-51 (from Nov 30), 2020 Week 52-03 (from Dec 21) (was: 2020 Week 16-18 (from Apr 13), 2020 Week 19-21 (from May 4), 2020 Week 22-24 (from May 25), 2020 Week 25-27 (from Jun 15), 2020 Week 28-30 (from Jul 6), 2020 Week 31-33 (from Jul 27), 2020 Week 34-36 (from Aug 17), 2020 Week 37-39 (from Sep 7), 2020 Week 40-42 (from Sep 28), 2020 Week 43-45 (from Okt 19), 2020 Week 46-48 (from Nov 9), 2020 Week 49-51 (from Nov 30))
> Client side FEEL
> ----------------
>
> Key: DROOLS-5282
> URL: https://issues.redhat.com/browse/DROOLS-5282
> Project: Drools
> Issue Type: Epic
> Components: DMN Editor
> Reporter: Toni Rikkola
> Assignee: Toni Rikkola
> Priority: Major
> Labels: drools-tools
>
> Make kie-dmn-feel usable in the client side.
> Notes:
> * FEEL functions use reflection, but many if not all of them can be hard coded
--
This message was sent by Atlassian Jira
(v7.13.8#713008)
4 years, 9 months