[JBoss JIRA] (WFLY-3910) To be added AJP connector connectionTimeout parameter
by Angel Ivanov (JIRA)
Angel Ivanov created WFLY-3910:
----------------------------------
Summary: To be added AJP connector connectionTimeout parameter
Key: WFLY-3910
URL: https://issues.jboss.org/browse/WFLY-3910
Project: WildFly
Issue Type: Feature Request
Components: ConfigAdmin
Affects Versions: 8.1.0.Final
Reporter: Angel Ivanov
Assignee: Thomas Diesler
Hi,
We need configuration parameter for Undertow to manage especially AJP connector connection timeout, because created threads staid alive forever.
In tomcat such kind of connector parameter was connectionTimeout.
--
This message was sent by Atlassian JIRA
(v6.3.1#6329)
10 years
[JBoss JIRA] (JGRP-1851) RSVP: add option to not block caller
by Bela Ban (JIRA)
[ https://issues.jboss.org/browse/JGRP-1851?page=com.atlassian.jira.plugin.... ]
Bela Ban commented on JGRP-1851:
--------------------------------
Reducing the messages won't work:
* A sends an mcast RSVP beacon
* B creates an mcast RSVP entry, but doesn't send the beacon because A already did
* The RSVP response is received and marks A's and B's entry as done
* If B's message is dropped, we won't continue sending an mcast RSVP beacon for B, so B's message won't get retransmitted
However, we could combine all RSVP beacon mesages to a given dest and send all of the IDs in an _array_ in *one beacon message* rather than in separate beacon messages.
> RSVP: add option to not block caller
> ------------------------------------
>
> Key: JGRP-1851
> URL: https://issues.jboss.org/browse/JGRP-1851
> Project: JGroups
> Issue Type: Feature Request
> Reporter: Bela Ban
> Assignee: Bela Ban
> Priority: Minor
> Fix For: 3.6
>
>
> In RSVP we have a {{resend_interval}} at which empty messages are sent to trigger retransmission and a {{timeout}} which is the max time a caller will block until all acks have been received.
> In the {{down()}} method, the caller blocks until all acks have been received or a timeout occured. Then the resend task is stopped and the entry removed from the {{ids}} map.
> In some cases, we may want to not block the caller, so that the calling thread returns immediately, but nevertheless perform resending until all acks have been received or the timeout occurred. This is a new property {{block}}.
> An example of where this is useful is {{RpcDispatcher.callRemoteMethodsWithFuture()}}: here, we want the call to return immediately with a future, and then - later - potentially block on it. However, if we have the RSVP flag set, then sending the message will block in RSVP until all acks have been received. This breaks the semantics of {{callRemoteMethodsWithFuture()}}.
> Another example is async RPCs (mode={{GET_NONE}}); here we'd block if RSVP is set even though we shouldn't.
--
This message was sent by Atlassian JIRA
(v6.3.1#6329)
10 years
[JBoss JIRA] (JGRP-1883) Extend SASL protocol to handle Quality of Protection
by Tristan Tarrant (JIRA)
[ https://issues.jboss.org/browse/JGRP-1883?page=com.atlassian.jira.plugin.... ]
Tristan Tarrant commented on JGRP-1883:
---------------------------------------
Using SASL for authentication makes it extremely simple to integrate it with WildFly's security realm, thus ensuring that role management is homogenous with the rest of the platform. Unfortunately, because of the PtP nature of the SASL QoP infrastructure it is not suitable for efficient group communication. For this reason, I really see no point in trying to shoehorn SASL as a replacement for ENCRYPT, and I'd much rather spend time describing why it is not suitable.
> Extend SASL protocol to handle Quality of Protection
> -----------------------------------------------------
>
> Key: JGRP-1883
> URL: https://issues.jboss.org/browse/JGRP-1883
> Project: JGroups
> Issue Type: Feature Request
> Affects Versions: 3.5
> Reporter: Richard Achmatowicz
> Assignee: Bela Ban
> Fix For: 3.6
>
>
> SASL implementations generally provide authentication and encryption services to communication protocols.
> At present, the JGroups SASL protocol layer handles only authentication of a client joining a group; it does not support encryption of messages (unicast and multicast) passing through the SASL layer. This is presently handled by the separate ENCRYPT layer.
> It would be nice to provide an integrated and complete solution for authentication and encryption for JGroups based on SASL. This could be achieved by adding functionality from ENCRYPT to the SASL layer.
--
This message was sent by Atlassian JIRA
(v6.3.1#6329)
10 years