[JBoss JIRA] (DROOLS-1125) Google App Engine support: ClassLoader.getSystemClassLoader() throws exception
by Geoffrey De Smet (JIRA)
[ https://issues.jboss.org/browse/DROOLS-1125?page=com.atlassian.jira.plugi... ]
Geoffrey De Smet edited comment on DROOLS-1125 at 4/20/16 10:28 AM:
--------------------------------------------------------------------
Looks like it needs to by a try-catch of RuntimeException (or even AccessControlException).
>From a stackoverflow question (also confirmed by user):
{code}
java.security.AccessControlException: access denied (java.lang.RuntimePermission getClassLoader)
at java.security.AccessControlContext.checkPermission(AccessControlContext.java:355)
at java.security.AccessController.checkPermission(AccessController.java:567)
at java.lang.SecurityManager.checkPermission(Unknown Source)
at com.google.apphosting.runtime.security.CustomSecurityManager.checkPermission(CustomSecurityManager.java:45)
at java.lang.ClassLoader.getSystemClassLoader(Unknown Source)
{code}
was (Author: ge0ffrey):
Looks like it needs to by a try-catch of RuntimeException (or even AccessControlException).
>From a stackoverflow question (not yet confirmed by user):
{code}
java.security.AccessControlException: access denied (java.lang.RuntimePermission getClassLoader)
at java.security.AccessControlContext.checkPermission(AccessControlContext.java:355)
at java.security.AccessController.checkPermission(AccessController.java:567)
at java.lang.SecurityManager.checkPermission(Unknown Source)
at com.google.apphosting.runtime.security.CustomSecurityManager.checkPermission(CustomSecurityManager.java:45)
at java.lang.ClassLoader.getSystemClassLoader(Unknown Source)
{code}
> Google App Engine support: ClassLoader.getSystemClassLoader() throws exception
> ------------------------------------------------------------------------------
>
> Key: DROOLS-1125
> URL: https://issues.jboss.org/browse/DROOLS-1125
> Project: Drools
> Issue Type: Enhancement
> Components: core engine
> Reporter: Geoffrey De Smet
> Assignee: Mario Fusco
> Fix For: 7.0.0.Beta1
>
>
> Class org.kie.internal.utils.ChainedProperties
> Every call to get the System Class Loader
> confClassLoader = ClassLoader.getSystemClassLoader(); (i.e. lines 133, 169)
> raises an exception.
> Todo: figure out which particular exception.
--
This message was sent by Atlassian JIRA
(v6.4.11#64026)
10 years
[JBoss JIRA] (WFCORE-1431) Look into loading Sasl providers on jigsaw
by Richard Opalka (JIRA)
[ https://issues.jboss.org/browse/WFCORE-1431?page=com.atlassian.jira.plugi... ]
Richard Opalka updated WFCORE-1431:
-----------------------------------
Description:
With JDK9 jigsaw builds remoting and most tests related to it fail.
{noformat}
java.lang.IllegalAccessException: class org.xnio.sasl.SaslUtils cannot access class com.sun.security.sasl.ntlm.FactoryImpl (in module java.security.sasl) because module java.security.sasl does not export com.sun.security.sasl.ntlm to unnamed module @a67c67e
at sun.reflect.Reflection.throwIllegalAccessException(java.base@9-ea/Reflection.java:411)
at sun.reflect.Reflection.throwIllegalAccessException(java.base@9-ea/Reflection.java:402)
at sun.reflect.Reflection.ensureMemberAccess(java.base@9-ea/Reflection.java:99)
at java.lang.Class.newInstance(java.base@9-ea/Class.java:545)
at org.xnio.sasl.SaslUtils.getFactories(SaslUtils.java:138)
at org.xnio.sasl.SaslUtils.getSaslServerFactories(SaslUtils.java:87)
at Test.main(Test.java:3)
java.lang.IllegalAccessException: class org.xnio.sasl.SaslUtils cannot access class com.sun.security.sasl.digest.FactoryImpl (in module java.security.sasl) because module java.security.sasl does not export com.sun.security.sasl.digest to unnamed module @a67c67e
at sun.reflect.Reflection.throwIllegalAccessException(java.base@9-ea/Reflection.java:411)
at sun.reflect.Reflection.throwIllegalAccessException(java.base@9-ea/Reflection.java:402)
at sun.reflect.Reflection.ensureMemberAccess(java.base@9-ea/Reflection.java:99)
at java.lang.Class.newInstance(java.base@9-ea/Class.java:545)
at org.xnio.sasl.SaslUtils.getFactories(SaslUtils.java:138)
at org.xnio.sasl.SaslUtils.getSaslServerFactories(SaslUtils.java:87)
at Test.main(Test.java:3)
java.lang.IllegalAccessException: class org.xnio.sasl.SaslUtils cannot access class com.sun.security.sasl.ServerFactoryImpl (in module java.security.sasl) because module java.security.sasl does not export com.sun.security.sasl to unnamed module @a67c67e
at sun.reflect.Reflection.throwIllegalAccessException(java.base@9-ea/Reflection.java:411)
at sun.reflect.Reflection.throwIllegalAccessException(java.base@9-ea/Reflection.java:402)
at sun.reflect.Reflection.ensureMemberAccess(java.base@9-ea/Reflection.java:99)
at java.lang.Class.newInstance(java.base@9-ea/Class.java:545)
at org.xnio.sasl.SaslUtils.getFactories(SaslUtils.java:138)
at org.xnio.sasl.SaslUtils.getSaslServerFactories(SaslUtils.java:87)
at Test.main(Test.java:3)
java.lang.IllegalAccessException: class org.xnio.sasl.SaslUtils cannot access class com.sun.security.sasl.gsskerb.FactoryImpl (in module jdk.security.jgss) because module jdk.security.jgss does not export com.sun.security.sasl.gsskerb to unnamed module @a67c67e
at sun.reflect.Reflection.throwIllegalAccessException(java.base@9-ea/Reflection.java:411)
at sun.reflect.Reflection.throwIllegalAccessException(java.base@9-ea/Reflection.java:402)
at sun.reflect.Reflection.ensureMemberAccess(java.base@9-ea/Reflection.java:99)
at java.lang.Class.newInstance(java.base@9-ea/Class.java:545)
at org.xnio.sasl.SaslUtils.getFactories(SaslUtils.java:138)
at org.xnio.sasl.SaslUtils.getSaslServerFactories(SaslUtils.java:87)
at Test.main(Test.java:3)
{noformat}
Problem is in org.xnio.sasl.SaslUtil.getFactories()
Which doesn't work correctly on Jigsaw as it prevents us form loading classes from java base image as they are not exported.
as workaround we have
{noformat}
-XaddExports:java.security.sasl/com.sun.security.sasl.digest=ALL-UNNAMED,java.security.sasl/com.sun.security.sasl=ALL-UNNAMED
{noformat}
but we should have proper solution.
The stack trace we see on JDK9 is:
was:
With JDK9 jigsaw builds remoting and most tests related to it fail.
Problem is in org.xnio.sasl.SaslUtil.getFactories()
Which doesn't work correctly on Jigsaw as it prevents us form loading classes from java base image as they are not exported.
as workaround we have
{noformat}
-XaddExports:java.security.sasl/com.sun.security.sasl.digest=ALL-UNNAMED,java.security.sasl/com.sun.security.sasl=ALL-UNNAMED
{noformat}
but we should have proper solution.
The stack trace we see on JDK9 is:
{noformat}
java.lang.IllegalAccessException: class org.xnio.sasl.SaslUtils cannot access class com.sun.security.sasl.ntlm.FactoryImpl (in module java.security.sasl) because module java.security.sasl does not export com.sun.security.sasl.ntlm to unnamed module @a67c67e
at sun.reflect.Reflection.throwIllegalAccessException(java.base@9-ea/Reflection.java:411)
at sun.reflect.Reflection.throwIllegalAccessException(java.base@9-ea/Reflection.java:402)
at sun.reflect.Reflection.ensureMemberAccess(java.base@9-ea/Reflection.java:99)
at java.lang.Class.newInstance(java.base@9-ea/Class.java:545)
at org.xnio.sasl.SaslUtils.getFactories(SaslUtils.java:138)
at org.xnio.sasl.SaslUtils.getSaslServerFactories(SaslUtils.java:87)
at Test.main(Test.java:3)
java.lang.IllegalAccessException: class org.xnio.sasl.SaslUtils cannot access class com.sun.security.sasl.digest.FactoryImpl (in module java.security.sasl) because module java.security.sasl does not export com.sun.security.sasl.digest to unnamed module @a67c67e
at sun.reflect.Reflection.throwIllegalAccessException(java.base@9-ea/Reflection.java:411)
at sun.reflect.Reflection.throwIllegalAccessException(java.base@9-ea/Reflection.java:402)
at sun.reflect.Reflection.ensureMemberAccess(java.base@9-ea/Reflection.java:99)
at java.lang.Class.newInstance(java.base@9-ea/Class.java:545)
at org.xnio.sasl.SaslUtils.getFactories(SaslUtils.java:138)
at org.xnio.sasl.SaslUtils.getSaslServerFactories(SaslUtils.java:87)
at Test.main(Test.java:3)
java.lang.IllegalAccessException: class org.xnio.sasl.SaslUtils cannot access class com.sun.security.sasl.ServerFactoryImpl (in module java.security.sasl) because module java.security.sasl does not export com.sun.security.sasl to unnamed module @a67c67e
at sun.reflect.Reflection.throwIllegalAccessException(java.base@9-ea/Reflection.java:411)
at sun.reflect.Reflection.throwIllegalAccessException(java.base@9-ea/Reflection.java:402)
at sun.reflect.Reflection.ensureMemberAccess(java.base@9-ea/Reflection.java:99)
at java.lang.Class.newInstance(java.base@9-ea/Class.java:545)
at org.xnio.sasl.SaslUtils.getFactories(SaslUtils.java:138)
at org.xnio.sasl.SaslUtils.getSaslServerFactories(SaslUtils.java:87)
at Test.main(Test.java:3)
java.lang.IllegalAccessException: class org.xnio.sasl.SaslUtils cannot access class com.sun.security.sasl.gsskerb.FactoryImpl (in module jdk.security.jgss) because module jdk.security.jgss does not export com.sun.security.sasl.gsskerb to unnamed module @a67c67e
at sun.reflect.Reflection.throwIllegalAccessException(java.base@9-ea/Reflection.java:411)
at sun.reflect.Reflection.throwIllegalAccessException(java.base@9-ea/Reflection.java:402)
at sun.reflect.Reflection.ensureMemberAccess(java.base@9-ea/Reflection.java:99)
at java.lang.Class.newInstance(java.base@9-ea/Class.java:545)
at org.xnio.sasl.SaslUtils.getFactories(SaslUtils.java:138)
at org.xnio.sasl.SaslUtils.getSaslServerFactories(SaslUtils.java:87)
at Test.main(Test.java:3)
{noformat}
> Look into loading Sasl providers on jigsaw
> ------------------------------------------
>
> Key: WFCORE-1431
> URL: https://issues.jboss.org/browse/WFCORE-1431
> Project: WildFly Core
> Issue Type: Sub-task
> Components: Remoting
> Affects Versions: 2.1.0.CR1
> Environment: JDK9 Jigsaw
> Reporter: Tomaz Cerar
> Assignee: Tomaz Cerar
>
> With JDK9 jigsaw builds remoting and most tests related to it fail.
> {noformat}
> java.lang.IllegalAccessException: class org.xnio.sasl.SaslUtils cannot access class com.sun.security.sasl.ntlm.FactoryImpl (in module java.security.sasl) because module java.security.sasl does not export com.sun.security.sasl.ntlm to unnamed module @a67c67e
> at sun.reflect.Reflection.throwIllegalAccessException(java.base@9-ea/Reflection.java:411)
> at sun.reflect.Reflection.throwIllegalAccessException(java.base@9-ea/Reflection.java:402)
> at sun.reflect.Reflection.ensureMemberAccess(java.base@9-ea/Reflection.java:99)
> at java.lang.Class.newInstance(java.base@9-ea/Class.java:545)
> at org.xnio.sasl.SaslUtils.getFactories(SaslUtils.java:138)
> at org.xnio.sasl.SaslUtils.getSaslServerFactories(SaslUtils.java:87)
> at Test.main(Test.java:3)
> java.lang.IllegalAccessException: class org.xnio.sasl.SaslUtils cannot access class com.sun.security.sasl.digest.FactoryImpl (in module java.security.sasl) because module java.security.sasl does not export com.sun.security.sasl.digest to unnamed module @a67c67e
> at sun.reflect.Reflection.throwIllegalAccessException(java.base@9-ea/Reflection.java:411)
> at sun.reflect.Reflection.throwIllegalAccessException(java.base@9-ea/Reflection.java:402)
> at sun.reflect.Reflection.ensureMemberAccess(java.base@9-ea/Reflection.java:99)
> at java.lang.Class.newInstance(java.base@9-ea/Class.java:545)
> at org.xnio.sasl.SaslUtils.getFactories(SaslUtils.java:138)
> at org.xnio.sasl.SaslUtils.getSaslServerFactories(SaslUtils.java:87)
> at Test.main(Test.java:3)
> java.lang.IllegalAccessException: class org.xnio.sasl.SaslUtils cannot access class com.sun.security.sasl.ServerFactoryImpl (in module java.security.sasl) because module java.security.sasl does not export com.sun.security.sasl to unnamed module @a67c67e
> at sun.reflect.Reflection.throwIllegalAccessException(java.base@9-ea/Reflection.java:411)
> at sun.reflect.Reflection.throwIllegalAccessException(java.base@9-ea/Reflection.java:402)
> at sun.reflect.Reflection.ensureMemberAccess(java.base@9-ea/Reflection.java:99)
> at java.lang.Class.newInstance(java.base@9-ea/Class.java:545)
> at org.xnio.sasl.SaslUtils.getFactories(SaslUtils.java:138)
> at org.xnio.sasl.SaslUtils.getSaslServerFactories(SaslUtils.java:87)
> at Test.main(Test.java:3)
> java.lang.IllegalAccessException: class org.xnio.sasl.SaslUtils cannot access class com.sun.security.sasl.gsskerb.FactoryImpl (in module jdk.security.jgss) because module jdk.security.jgss does not export com.sun.security.sasl.gsskerb to unnamed module @a67c67e
> at sun.reflect.Reflection.throwIllegalAccessException(java.base@9-ea/Reflection.java:411)
> at sun.reflect.Reflection.throwIllegalAccessException(java.base@9-ea/Reflection.java:402)
> at sun.reflect.Reflection.ensureMemberAccess(java.base@9-ea/Reflection.java:99)
> at java.lang.Class.newInstance(java.base@9-ea/Class.java:545)
> at org.xnio.sasl.SaslUtils.getFactories(SaslUtils.java:138)
> at org.xnio.sasl.SaslUtils.getSaslServerFactories(SaslUtils.java:87)
> at Test.main(Test.java:3)
> {noformat}
> Problem is in org.xnio.sasl.SaslUtil.getFactories()
> Which doesn't work correctly on Jigsaw as it prevents us form loading classes from java base image as they are not exported.
> as workaround we have
> {noformat}
> -XaddExports:java.security.sasl/com.sun.security.sasl.digest=ALL-UNNAMED,java.security.sasl/com.sun.security.sasl=ALL-UNNAMED
> {noformat}
> but we should have proper solution.
> The stack trace we see on JDK9 is:
--
This message was sent by Atlassian JIRA
(v6.4.11#64026)
10 years
[JBoss JIRA] (WFCORE-1431) Look into loading Sasl providers on jigsaw
by Richard Opalka (JIRA)
[ https://issues.jboss.org/browse/WFCORE-1431?page=com.atlassian.jira.plugi... ]
Richard Opalka updated WFCORE-1431:
-----------------------------------
Description:
With JDK9 jigsaw builds remoting and most tests related to it fail.
Problem is in org.xnio.sasl.SaslUtil.getFactories()
Which doesn't work correctly on Jigsaw as it prevents us form loading classes from java base image as they are not exported.
as workaround we have
{noformat}
-XaddExports:java.security.sasl/com.sun.security.sasl.digest=ALL-UNNAMED,java.security.sasl/com.sun.security.sasl=ALL-UNNAMED
{noformat}
but we should have proper solution.
The stack trace we see on JDK9 is:
{noformat}
java.lang.IllegalAccessException: class org.xnio.sasl.SaslUtils cannot access class com.sun.security.sasl.ntlm.FactoryImpl (in module java.security.sasl) because module java.security.sasl does not export com.sun.security.sasl.ntlm to unnamed module @a67c67e
at sun.reflect.Reflection.throwIllegalAccessException(java.base@9-ea/Reflection.java:411)
at sun.reflect.Reflection.throwIllegalAccessException(java.base@9-ea/Reflection.java:402)
at sun.reflect.Reflection.ensureMemberAccess(java.base@9-ea/Reflection.java:99)
at java.lang.Class.newInstance(java.base@9-ea/Class.java:545)
at org.xnio.sasl.SaslUtils.getFactories(SaslUtils.java:138)
at org.xnio.sasl.SaslUtils.getSaslServerFactories(SaslUtils.java:87)
at Test.main(Test.java:3)
java.lang.IllegalAccessException: class org.xnio.sasl.SaslUtils cannot access class com.sun.security.sasl.digest.FactoryImpl (in module java.security.sasl) because module java.security.sasl does not export com.sun.security.sasl.digest to unnamed module @a67c67e
at sun.reflect.Reflection.throwIllegalAccessException(java.base@9-ea/Reflection.java:411)
at sun.reflect.Reflection.throwIllegalAccessException(java.base@9-ea/Reflection.java:402)
at sun.reflect.Reflection.ensureMemberAccess(java.base@9-ea/Reflection.java:99)
at java.lang.Class.newInstance(java.base@9-ea/Class.java:545)
at org.xnio.sasl.SaslUtils.getFactories(SaslUtils.java:138)
at org.xnio.sasl.SaslUtils.getSaslServerFactories(SaslUtils.java:87)
at Test.main(Test.java:3)
java.lang.IllegalAccessException: class org.xnio.sasl.SaslUtils cannot access class com.sun.security.sasl.ServerFactoryImpl (in module java.security.sasl) because module java.security.sasl does not export com.sun.security.sasl to unnamed module @a67c67e
at sun.reflect.Reflection.throwIllegalAccessException(java.base@9-ea/Reflection.java:411)
at sun.reflect.Reflection.throwIllegalAccessException(java.base@9-ea/Reflection.java:402)
at sun.reflect.Reflection.ensureMemberAccess(java.base@9-ea/Reflection.java:99)
at java.lang.Class.newInstance(java.base@9-ea/Class.java:545)
at org.xnio.sasl.SaslUtils.getFactories(SaslUtils.java:138)
at org.xnio.sasl.SaslUtils.getSaslServerFactories(SaslUtils.java:87)
at Test.main(Test.java:3)
java.lang.IllegalAccessException: class org.xnio.sasl.SaslUtils cannot access class com.sun.security.sasl.gsskerb.FactoryImpl (in module jdk.security.jgss) because module jdk.security.jgss does not export com.sun.security.sasl.gsskerb to unnamed module @a67c67e
at sun.reflect.Reflection.throwIllegalAccessException(java.base@9-ea/Reflection.java:411)
at sun.reflect.Reflection.throwIllegalAccessException(java.base@9-ea/Reflection.java:402)
at sun.reflect.Reflection.ensureMemberAccess(java.base@9-ea/Reflection.java:99)
at java.lang.Class.newInstance(java.base@9-ea/Class.java:545)
at org.xnio.sasl.SaslUtils.getFactories(SaslUtils.java:138)
at org.xnio.sasl.SaslUtils.getSaslServerFactories(SaslUtils.java:87)
at Test.main(Test.java:3)
{noformat}
was:
With JDK9 jigsaw builds remoting and most tests related to it fail.
Problem is in org.xnio.sasl.SaslUtil.getFactories()
Which doesn't work correctly on Jigsaw as it prevents us form loading classes from java base image as they are not exported.
as workaround we have
{noformat}
-XaddExports:java.security.sasl/com.sun.security.sasl.digest=ALL-UNNAMED,java.security.sasl/com.sun.security.sasl=ALL-UNNAMED
{noformat}
but we should have proper solution.
> Look into loading Sasl providers on jigsaw
> ------------------------------------------
>
> Key: WFCORE-1431
> URL: https://issues.jboss.org/browse/WFCORE-1431
> Project: WildFly Core
> Issue Type: Sub-task
> Components: Remoting
> Affects Versions: 2.1.0.CR1
> Environment: JDK9 Jigsaw
> Reporter: Tomaz Cerar
> Assignee: Tomaz Cerar
>
> With JDK9 jigsaw builds remoting and most tests related to it fail.
> Problem is in org.xnio.sasl.SaslUtil.getFactories()
> Which doesn't work correctly on Jigsaw as it prevents us form loading classes from java base image as they are not exported.
> as workaround we have
> {noformat}
> -XaddExports:java.security.sasl/com.sun.security.sasl.digest=ALL-UNNAMED,java.security.sasl/com.sun.security.sasl=ALL-UNNAMED
> {noformat}
> but we should have proper solution.
> The stack trace we see on JDK9 is:
> {noformat}
> java.lang.IllegalAccessException: class org.xnio.sasl.SaslUtils cannot access class com.sun.security.sasl.ntlm.FactoryImpl (in module java.security.sasl) because module java.security.sasl does not export com.sun.security.sasl.ntlm to unnamed module @a67c67e
> at sun.reflect.Reflection.throwIllegalAccessException(java.base@9-ea/Reflection.java:411)
> at sun.reflect.Reflection.throwIllegalAccessException(java.base@9-ea/Reflection.java:402)
> at sun.reflect.Reflection.ensureMemberAccess(java.base@9-ea/Reflection.java:99)
> at java.lang.Class.newInstance(java.base@9-ea/Class.java:545)
> at org.xnio.sasl.SaslUtils.getFactories(SaslUtils.java:138)
> at org.xnio.sasl.SaslUtils.getSaslServerFactories(SaslUtils.java:87)
> at Test.main(Test.java:3)
> java.lang.IllegalAccessException: class org.xnio.sasl.SaslUtils cannot access class com.sun.security.sasl.digest.FactoryImpl (in module java.security.sasl) because module java.security.sasl does not export com.sun.security.sasl.digest to unnamed module @a67c67e
> at sun.reflect.Reflection.throwIllegalAccessException(java.base@9-ea/Reflection.java:411)
> at sun.reflect.Reflection.throwIllegalAccessException(java.base@9-ea/Reflection.java:402)
> at sun.reflect.Reflection.ensureMemberAccess(java.base@9-ea/Reflection.java:99)
> at java.lang.Class.newInstance(java.base@9-ea/Class.java:545)
> at org.xnio.sasl.SaslUtils.getFactories(SaslUtils.java:138)
> at org.xnio.sasl.SaslUtils.getSaslServerFactories(SaslUtils.java:87)
> at Test.main(Test.java:3)
> java.lang.IllegalAccessException: class org.xnio.sasl.SaslUtils cannot access class com.sun.security.sasl.ServerFactoryImpl (in module java.security.sasl) because module java.security.sasl does not export com.sun.security.sasl to unnamed module @a67c67e
> at sun.reflect.Reflection.throwIllegalAccessException(java.base@9-ea/Reflection.java:411)
> at sun.reflect.Reflection.throwIllegalAccessException(java.base@9-ea/Reflection.java:402)
> at sun.reflect.Reflection.ensureMemberAccess(java.base@9-ea/Reflection.java:99)
> at java.lang.Class.newInstance(java.base@9-ea/Class.java:545)
> at org.xnio.sasl.SaslUtils.getFactories(SaslUtils.java:138)
> at org.xnio.sasl.SaslUtils.getSaslServerFactories(SaslUtils.java:87)
> at Test.main(Test.java:3)
> java.lang.IllegalAccessException: class org.xnio.sasl.SaslUtils cannot access class com.sun.security.sasl.gsskerb.FactoryImpl (in module jdk.security.jgss) because module jdk.security.jgss does not export com.sun.security.sasl.gsskerb to unnamed module @a67c67e
> at sun.reflect.Reflection.throwIllegalAccessException(java.base@9-ea/Reflection.java:411)
> at sun.reflect.Reflection.throwIllegalAccessException(java.base@9-ea/Reflection.java:402)
> at sun.reflect.Reflection.ensureMemberAccess(java.base@9-ea/Reflection.java:99)
> at java.lang.Class.newInstance(java.base@9-ea/Class.java:545)
> at org.xnio.sasl.SaslUtils.getFactories(SaslUtils.java:138)
> at org.xnio.sasl.SaslUtils.getSaslServerFactories(SaslUtils.java:87)
> at Test.main(Test.java:3)
> {noformat}
--
This message was sent by Atlassian JIRA
(v6.4.11#64026)
10 years
[JBoss JIRA] (ELY-504) Add ability to suspend and resume HTTP requests.
by Darran Lofthouse (JIRA)
Darran Lofthouse created ELY-504:
------------------------------------
Summary: Add ability to suspend and resume HTTP requests.
Key: ELY-504
URL: https://issues.jboss.org/browse/ELY-504
Project: WildFly Elytron
Issue Type: Enhancement
Components: HTTP
Reporter: Darran Lofthouse
Assignee: Darran Lofthouse
Fix For: 1.1.0.Beta6
For mechanisms such as HTTP authentication the authentication may be triggered as the client has sent in a full request, rather than requiring the mechanism to handle this situation we should adjust the API so that a request can be suspended and subsequently resumed once authentication is complete.
--
This message was sent by Atlassian JIRA
(v6.4.11#64026)
10 years
[JBoss JIRA] (WFLY-6540) Batch thread pool keepAlive setting seems to be ignored
by Martin Kouba (JIRA)
Martin Kouba created WFLY-6540:
----------------------------------
Summary: Batch thread pool keepAlive setting seems to be ignored
Key: WFLY-6540
URL: https://issues.jboss.org/browse/WFLY-6540
Project: WildFly
Issue Type: Bug
Components: Batch
Affects Versions: 10.0.0.Final
Reporter: Martin Kouba
Assignee: Cheng Fang
Maybe I'm missing something but although the default _keepAlive_ is set to 30 seconds, the threads seem to run indefinitely - see also steps to reproduce.
Snippet from the default config file:
{code}
<thread-pool name="batch">
<max-threads count="10"/>
<keepalive-time time="30" unit="seconds"/>
</thread-pool>
{code}
Anyway, the {{UnboundedQueueThreadPoolService}}, or the underlying {{JBossThreadPoolExecutor}} respectively, used by the Batch subsystem is using the same {{corePoolSize}} and {{maximumPoolSize}} and it seems the core threads are not allowed to time out, i.e. {{org.jboss.threads.JBossThreadPoolExecutor.setAllowCoreThreadTimeout(boolean)}} is not used.
Moreover, a {{JBossThreadPoolExecutor.setAllowCoreThreadTimeout(boolean)}} invocation would probably result in infinite loop:
{code}
public void setAllowCoreThreadTimeout(final boolean allow) {
setAllowCoreThreadTimeout(allow);
}
{code}
should be replaced with:
{code}
public void setAllowCoreThreadTimeout(final boolean allow) {
allowCoreThreadTimeOut(allow);
}
{code}
Given that {{JBossThreadPoolExecutor}} is used by more subsystems this issue may affect other subsystems as well.
--
This message was sent by Atlassian JIRA
(v6.4.11#64026)
10 years
[JBoss JIRA] (WFLY-5930) Unable to load deployments
by Roy Willemse (JIRA)
[ https://issues.jboss.org/browse/WFLY-5930?page=com.atlassian.jira.plugin.... ]
Roy Willemse commented on WFLY-5930:
------------------------------------
We see this frequently (we're running Wildfly 10.0.0.Final) and usually there's one deployment causing problems. We can identify and undeploy it via the JBoss CLI, after which the deployments overview starts working again (no restart).
> Unable to load deployments
> --------------------------
>
> Key: WFLY-5930
> URL: https://issues.jboss.org/browse/WFLY-5930
> Project: WildFly
> Issue Type: Feature Request
> Components: Web Console
> Affects Versions: 9.0.2.Final
> Reporter: Hamed Abdollahpour
> Assignee: Heiko Braun
>
> Fail to get list of deployment on application server with this error:
> 12:19:40,130 ERROR [org.jboss.as.controller.management-operation] (XNIO-1 task-3) WFLYCTL0013: Operation ("read-attribute") failed - address: ([
> ("deployment" => "discripto-ear.ear"),
> ("subdeployment" => "discripto-rest.war"),
> ("subsystem" => "undertow"),
> ("servlet" => "com.wpic.discripto.rest.App")
> ]): java.lang.NullPointerException
> at org.wildfly.extension.undertow.DeploymentServletDefinition$AbstractMetricsHandler.execute(DeploymentServletDefinition.java:121)
> at org.jboss.as.controller.operations.global.ReadAttributeHandler.doExecuteInternal(ReadAttributeHandler.java:174)
> at org.jboss.as.controller.operations.global.ReadAttributeHandler.doExecute(ReadAttributeHandler.java:137)
> at org.jboss.as.controller.operations.global.GlobalOperationHandlers$AbstractMultiTargetHandler.execute(GlobalOperationHandlers.java:196)
> at org.jboss.as.controller.operations.global.GlobalOperationHandlers$AvailableResponseWrapper.execute(GlobalOperationHandlers.java:641)
> at org.jboss.as.controller.AbstractOperationContext.executeStep(AbstractOperationContext.java:803)
> at org.jboss.as.controller.AbstractOperationContext.doCompleteStep(AbstractOperationContext.java:601)
> at org.jboss.as.controller.AbstractOperationContext.completeStepInternal(AbstractOperationContext.java:354)
> at org.jboss.as.controller.AbstractOperationContext.executeOperation(AbstractOperationContext.java:330)
> at org.jboss.as.controller.OperationContextImpl.executeOperation(OperationContextImpl.java:1183)
> at org.jboss.as.controller.ModelControllerImpl.internalExecute(ModelControllerImpl.java:362)
> at org.jboss.as.controller.ModelControllerImpl.execute(ModelControllerImpl.java:218)
> at org.jboss.as.domain.http.server.DomainApiHandler.handleRequest(DomainApiHandler.java:208)
> at io.undertow.server.handlers.encoding.EncodingHandler.handleRequest(EncodingHandler.java:72)
> at org.jboss.as.domain.http.server.security.SubjectDoAsHandler$1.run(SubjectDoAsHandler.java:72)
> at org.jboss.as.domain.http.server.security.SubjectDoAsHandler$1.run(SubjectDoAsHandler.java:68)
> at java.security.AccessController.doPrivileged(Native Method)
> at javax.security.auth.Subject.doAs(Subject.java:415)
> at org.jboss.as.controller.AccessAuditContext.doAs(AccessAuditContext.java:92)
> at org.jboss.as.domain.http.server.security.SubjectDoAsHandler.handleRequest(SubjectDoAsHandler.java:68)
> at org.jboss.as.domain.http.server.security.SubjectDoAsHandler.handleRequest(SubjectDoAsHandler.java:63)
> at io.undertow.server.handlers.BlockingHandler.handleRequest(BlockingHandler.java:56)
> at org.jboss.as.domain.http.server.DomainApiCheckHandler.handleRequest(DomainApiCheckHandler.java:95)
> at io.undertow.security.handlers.AuthenticationCallHandler.handleRequest(AuthenticationCallHandler.java:52)
> at io.undertow.server.Connectors.executeRootHandler(Connectors.java:199)
> at io.undertow.server.HttpServerExchange$1.run(HttpServerExchange.java:774)
> at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1145)
> at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:615)
> at java.lang.Thread.run(Thread.java:745)
> 12:21:20,258 ERROR [org.jboss.as.controller.management-operation] (XNIO-1 task-2) WFLYCTL0013: Operation ("read-attribute") failed - address: ([
> ("deployment" => "discripto-ear.ear"),
> ("subdeployment" => "discripto-rest.war"),
> ("subsystem" => "undertow"),
> ("servlet" => "com.wpic.discripto.rest.App")
> ]): java.lang.NullPointerException
> at org.wildfly.extension.undertow.DeploymentServletDefinition$AbstractMetricsHandler.execute(DeploymentServletDefinition.java:121)
> at org.jboss.as.controller.operations.global.ReadAttributeHandler.doExecuteInternal(ReadAttributeHandler.java:174)
> at org.jboss.as.controller.operations.global.ReadAttributeHandler.doExecute(ReadAttributeHandler.java:137)
> at org.jboss.as.controller.operations.global.GlobalOperationHandlers$AbstractMultiTargetHandler.execute(GlobalOperationHandlers.java:196)
> at org.jboss.as.controller.operations.global.GlobalOperationHandlers$AvailableResponseWrapper.execute(GlobalOperationHandlers.java:641)
> at org.jboss.as.controller.AbstractOperationContext.executeStep(AbstractOperationContext.java:803)
> at org.jboss.as.controller.AbstractOperationContext.doCompleteStep(AbstractOperationContext.java:601)
> at org.jboss.as.controller.AbstractOperationContext.completeStepInternal(AbstractOperationContext.java:354)
> at org.jboss.as.controller.AbstractOperationContext.executeOperation(AbstractOperationContext.java:330)
> at org.jboss.as.controller.OperationContextImpl.executeOperation(OperationContextImpl.java:1183)
> at org.jboss.as.controller.ModelControllerImpl.internalExecute(ModelControllerImpl.java:362)
> at org.jboss.as.controller.ModelControllerImpl.execute(ModelControllerImpl.java:218)
> at org.jboss.as.domain.http.server.DomainApiHandler.handleRequest(DomainApiHandler.java:208)
> at io.undertow.server.handlers.encoding.EncodingHandler.handleRequest(EncodingHandler.java:72)
> at org.jboss.as.domain.http.server.security.SubjectDoAsHandler$1.run(SubjectDoAsHandler.java:72)
> at org.jboss.as.domain.http.server.security.SubjectDoAsHandler$1.run(SubjectDoAsHandler.java:68)
> at java.security.AccessController.doPrivileged(Native Method)
> at javax.security.auth.Subject.doAs(Subject.java:415)
> at org.jboss.as.controller.AccessAuditContext.doAs(AccessAuditContext.java:92)
> at org.jboss.as.domain.http.server.security.SubjectDoAsHandler.handleRequest(SubjectDoAsHandler.java:68)
> at org.jboss.as.domain.http.server.security.SubjectDoAsHandler.handleRequest(SubjectDoAsHandler.java:63)
> at io.undertow.server.handlers.BlockingHandler.handleRequest(BlockingHandler.java:56)
> at org.jboss.as.domain.http.server.DomainApiCheckHandler.handleRequest(DomainApiCheckHandler.java:95)
> at io.undertow.security.handlers.AuthenticationCallHandler.handleRequest(AuthenticationCallHandler.java:52)
> at io.undertow.server.Connectors.executeRootHandler(Connectors.java:199)
> at io.undertow.server.HttpServerExchange$1.run(HttpServerExchange.java:774)
> at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1145)
> at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:615)
> at java.lang.Thread.run(Thread.java:745)
> It works perfect after restarting.
--
This message was sent by Atlassian JIRA
(v6.4.11#64026)
10 years
[JBoss JIRA] (WFCORE-1485) ":read-resource(recursive=true)" generates output with random order, could be ordered alphabetically by keys
by Ladislav Thon (JIRA)
[ https://issues.jboss.org/browse/WFCORE-1485?page=com.atlassian.jira.plugi... ]
Ladislav Thon updated WFCORE-1485:
----------------------------------
Git Pull Request: https://github.com/wildfly/wildfly-core/pull/1511
> ":read-resource(recursive=true)" generates output with random order, could be ordered alphabetically by keys
> ------------------------------------------------------------------------------------------------------------
>
> Key: WFCORE-1485
> URL: https://issues.jboss.org/browse/WFCORE-1485
> Project: WildFly Core
> Issue Type: Bug
> Components: Domain Management
> Reporter: Ladislav Thon
> Assignee: Ladislav Thon
>
> ":read-resource(recursive=true)" generates output with random order, could it be ordered alphabetically by keys
> Now I can't do simple diff of changes, it's necessary to parse output to get valid list of changes.
> I expect output is stored in some structure data format before processed/printed out, could you use some sorted structure (Tree* stuff) ?
> Command to generate output and diff
> {code}
> jboss-eap-7.0/bin/jboss-cli.sh -c ":read-resource(recursive=true)" > 01 && jboss-eap-7.0/bin/jboss-cli.sh -c ":read-resource(recursive=true)" > 02
> diff 01 02 ## meld kdiff3 or your diff favorite tool
> {code}
> Diff in my case:
> {code:diff}
> > 02 && diff 01 02
> 50c50,67
> < "security" => {"classification" => {"security-domain" => {
> ---
> > "logging" => {"classification" => {
> > "logger" => {
> > "configured-application" => undefined,
> > "default-application" => false,
> > "applies-to" => undefined
> > },
> > "logging-profile" => {
> > "configured-application" => undefined,
> > "default-application" => false,
> > "applies-to" => undefined
> > }
> > }},
> > "naming" => {"classification" => {"binding" => {
> > "configured-application" => undefined,
> > "default-application" => false,
> > "applies-to" => undefined
> > }}},
> > "mail" => {"classification" => {"mail-session" => {
> 64a82,86
> > "security" => {"classification" => {"security-domain" => {
> > "configured-application" => undefined,
> > "default-application" => false,
> > "applies-to" => undefined
> > }}},
> 66,70d87
> < "data-source" => {
> < "configured-application" => undefined,
> < "default-application" => false,
> < "applies-to" => undefined
> < },
> 80,86d96
> < }
> < }},
> < "logging" => {"classification" => {
> < "logging-profile" => {
> < "configured-application" => undefined,
> < "default-application" => false,
> < "applies-to" => undefined
> 88c98
> < "logger" => {
> ---
> > "data-source" => {
> 93,103c103
> < }},
> < "mail" => {"classification" => {"mail-session" => {
> < "configured-application" => undefined,
> < "default-application" => false,
> < "applies-to" => undefined
> < }}},
> < "naming" => {"classification" => {"binding" => {
> < "configured-application" => undefined,
> < "default-application" => false,
> < "applies-to" => undefined
> < }}}
> ---
> > }}
> 106,114d105
> < "mail" => {"classification" => {"mail-server-security" => {
> < "configured-requires-addressable" => undefined,
> < "configured-requires-read" => undefined,
> < "configured-requires-write" => undefined,
> < "default-requires-addressable" => false,
> < "default-requires-read" => false,
> < "default-requires-write" => true,
> < "applies-to" => undefined
> < }}},
> 116c107
> < "naming-binding" => {
> ---
> > "jndi-view" => {
> 121,122c112,113
> < "default-requires-read" => false,
> < "default-requires-write" => false,
> ---
> > "default-requires-read" => true,
> > "default-requires-write" => true,
> 125c116
> < "jndi-view" => {
> ---
> > "naming-binding" => {
> 130,131c121,122
> < "default-requires-read" => true,
> < "default-requires-write" => true,
> ---
> > "default-requires-read" => false,
> > "default-requires-write" => false,
> 153,162c144
> < "remoting" => {"classification" => {"remoting-security" => {
> < "configured-requires-addressable" => undefined,
> < "configured-requires-read" => undefined,
> < "configured-requires-write" => undefined,
> < "default-requires-addressable" => false,
> < "default-requires-read" => true,
> < "default-requires-write" => true,
> < "applies-to" => undefined
> < }}},
> < "security" => {"classification" => {"misc-security" => {
> ---
> > "logging" => {"classification" => {"view-server-logs" => {
> 167,168c149,150
> < "default-requires-read" => true,
> < "default-requires-write" => true,
> ---
> > "default-requires-read" => false,
> > "default-requires-write" => false,
> 171,172c153,154
> < "undertow" => {"classification" => {
> < "undertow-handler" => {
> ---
> > "core" => {"classification" => {
> > "security-realm-ref" => {
> 176,178c158,160
> < "default-requires-addressable" => false,
> < "default-requires-read" => false,
> < "default-requires-write" => false,
> ---
> > "default-requires-addressable" => true,
> > "default-requires-read" => true,
> > "default-requires-write" => true,
> 181c163
> < "undertow-filter" => {
> ---
> > "server-ssl" => {
> 185,187c167,169
> < "default-requires-addressable" => false,
> < "default-requires-read" => false,
> < "default-requires-write" => false,
> ---
> > "default-requires-addressable" => true,
> > "default-requires-read" => true,
> > "default-requires-write" => true,
> 190c172
> < "web-connector" => {
> ---
> > "service-container" => {
> 196c178
> < "default-requires-write" => false,
> ---
> > "default-requires-write" => true,
> 199c181
> < "web-access-log" => {
> ---
> > "extensions" => {
> 205c187
> < "default-requires-write" => false,
> ---
> > "default-requires-write" => true,
> 207,237c189,190
> < }
> < }},
> < "logging" => {"classification" => {"view-server-logs" => {
> < "configured-requires-addressable" => undefined,
> < "configured-requires-read" => undefined,
> < "configured-requires-write" => undefined,
> < "default-requires-addressable" => false,
> < "default-requires-read" => false,
> < "default-requires-write" => false,
> < "applies-to" => undefined
> < }}},
> < "datasources" => {"classification" => {"data-source-security" => {
> < "configured-requires-addressable" => undefined,
> < "configured-requires-read" => undefined,
> < "configured-requires-write" => undefined,
> < "default-requires-addressable" => false,
> < "default-requires-read" => true,
> < "default-requires-write" => true,
> < "applies-to" => undefined
> < }}},
> < "resource-adapters" => {"classification" => {"resource-adapter-security" => {
> < "configured-requires-addressable" => undefined,
> < "configured-requires-read" => undefined,
> < "configured-requires-write" => undefined,
> < "default-requires-addressable" => false,
> < "default-requires-read" => true,
> < "default-requires-write" => true,
> < "applies-to" => undefined
> < }}},
> < "core" => {"classification" => {
> < "extensions" => {
> ---
> > },
> > "system-property" => {
> 246c199
> < "service-container" => {
> ---
> > "module-loading" => {
> 255c208
> < "domain-controller" => {
> ---
> > "jvm" => {
> 264c217
> < "domain-names" => {
> ---
> > "snapshots" => {
> 270c223
> < "default-requires-write" => true,
> ---
> > "default-requires-write" => false,
> 273c226
> < "security-domain-ref" => {
> ---
> > "access-control" => {
> 291c244
> < "management-interfaces" => {
> ---
> > "credential" => {
> 296c249
> < "default-requires-read" => false,
> ---
> > "default-requires-read" => true,
> 300c253
> < "socket-binding-ref" => {
> ---
> > "management-interfaces" => {
> 306c259
> < "default-requires-write" => false,
> ---
> > "default-requires-write" => true,
> 309c262
> < "socket-config" => {
> ---
> > "security-domain" => {
> 313,314c266,267
> < "default-requires-addressable" => false,
> < "default-requires-read" => false,
> ---
> > "default-requires-addressable" => true,
> > "default-requires-read" => true,
> 318c271
> < "security-vault" => {
> ---
> > "patching" => {
> 323c276
> < "default-requires-read" => true,
> ---
> > "default-requires-read" => false,
> 327c280
> < "server-ssl" => {
> ---
> > "read-whole-config" => {
> 331c284
> < "default-requires-addressable" => true,
> ---
> > "default-requires-addressable" => false,
> 336c289
> < "jvm" => {
> ---
> > "domain-controller" => {
> 345c298
> < "module-loading" => {
> ---
> > "security-vault" => {
> 350c303
> < "default-requires-read" => false,
> ---
> > "default-requires-read" => true,
> 354c307
> < "security-domain" => {
> ---
> > "security-domain-ref" => {
> 363c316
> < "snapshots" => {
> ---
> > "socket-binding-ref" => {
> 372c325
> < "credential" => {
> ---
> > "domain-names" => {
> 377c330
> < "default-requires-read" => true,
> ---
> > "default-requires-read" => false,
> 381c334
> < "read-whole-config" => {
> ---
> > "socket-config" => {
> 386c339
> < "default-requires-read" => true,
> ---
> > "default-requires-read" => false,
> 389,390c342,363
> < },
> < "patching" => {
> ---
> > }
> > }},
> > "mail" => {"classification" => {"mail-server-security" => {
> > "configured-requires-addressable" => undefined,
> > "configured-requires-read" => undefined,
> > "configured-requires-write" => undefined,
> > "default-requires-addressable" => false,
> > "default-requires-read" => false,
> > "default-requires-write" => true,
> > "applies-to" => undefined
> > }}},
> > "resource-adapters" => {"classification" => {"resource-adapter-security" => {
> > "configured-requires-addressable" => undefined,
> > "configured-requires-read" => undefined,
> > "configured-requires-write" => undefined,
> > "default-requires-addressable" => false,
> > "default-requires-read" => true,
> > "default-requires-write" => true,
> > "applies-to" => undefined
> > }}},
> > "undertow" => {"classification" => {
> > "undertow-filter" => {
> 396c369
> < "default-requires-write" => true,
> ---
> > "default-requires-write" => false,
> 399c372
> < "access-control" => {
> ---
> > "web-connector" => {
> 403,405c376,378
> < "default-requires-addressable" => true,
> < "default-requires-read" => true,
> < "default-requires-write" => true,
> ---
> > "default-requires-addressable" => false,
> > "default-requires-read" => false,
> > "default-requires-write" => false,
> 408c381
> < "system-property" => {
> ---
> > "undertow-handler" => {
> 414c387
> < "default-requires-write" => true,
> ---
> > "default-requires-write" => false,
> 417c390
> < "security-realm-ref" => {
> ---
> > "web-access-log" => {
> 421,423c394,396
> < "default-requires-addressable" => true,
> < "default-requires-read" => true,
> < "default-requires-write" => true,
> ---
> > "default-requires-addressable" => false,
> > "default-requires-read" => false,
> > "default-requires-write" => false,
> 426c399,426
> < }}
> ---
> > }},
> > "datasources" => {"classification" => {"data-source-security" => {
> > "configured-requires-addressable" => undefined,
> > "configured-requires-read" => undefined,
> > "configured-requires-write" => undefined,
> > "default-requires-addressable" => false,
> > "default-requires-read" => true,
> > "default-requires-write" => true,
> > "applies-to" => undefined
> > }}},
> > "remoting" => {"classification" => {"remoting-security" => {
> > "configured-requires-addressable" => undefined,
> > "configured-requires-read" => undefined,
> > "configured-requires-write" => undefined,
> > "default-requires-addressable" => false,
> > "default-requires-read" => true,
> > "default-requires-write" => true,
> > "applies-to" => undefined
> > }}},
> > "security" => {"classification" => {"misc-security" => {
> > "configured-requires-addressable" => undefined,
> > "configured-requires-read" => undefined,
> > "configured-requires-write" => undefined,
> > "default-requires-addressable" => false,
> > "default-requires-read" => true,
> > "default-requires-write" => true,
> > "applies-to" => undefined
> > }}}
> {code}
--
This message was sent by Atlassian JIRA
(v6.4.11#64026)
10 years
[JBoss JIRA] (WFCORE-1485) ":read-resource(recursive=true)" generates output with random order, could be ordered alphabetically by keys
by Brian Stansberry (JIRA)
[ https://issues.jboss.org/browse/WFCORE-1485?page=com.atlassian.jira.plugi... ]
Brian Stansberry commented on WFCORE-1485:
------------------------------------------
I don't want to use TreeSet etc to impose a canonical ordering, but the PR is very much welcome, as the design intent was to preserve the original order.
> ":read-resource(recursive=true)" generates output with random order, could be ordered alphabetically by keys
> ------------------------------------------------------------------------------------------------------------
>
> Key: WFCORE-1485
> URL: https://issues.jboss.org/browse/WFCORE-1485
> Project: WildFly Core
> Issue Type: Bug
> Components: Domain Management
> Reporter: Ladislav Thon
> Assignee: Ladislav Thon
>
> ":read-resource(recursive=true)" generates output with random order, could it be ordered alphabetically by keys
> Now I can't do simple diff of changes, it's necessary to parse output to get valid list of changes.
> I expect output is stored in some structure data format before processed/printed out, could you use some sorted structure (Tree* stuff) ?
> Command to generate output and diff
> {code}
> jboss-eap-7.0/bin/jboss-cli.sh -c ":read-resource(recursive=true)" > 01 && jboss-eap-7.0/bin/jboss-cli.sh -c ":read-resource(recursive=true)" > 02
> diff 01 02 ## meld kdiff3 or your diff favorite tool
> {code}
> Diff in my case:
> {code:diff}
> > 02 && diff 01 02
> 50c50,67
> < "security" => {"classification" => {"security-domain" => {
> ---
> > "logging" => {"classification" => {
> > "logger" => {
> > "configured-application" => undefined,
> > "default-application" => false,
> > "applies-to" => undefined
> > },
> > "logging-profile" => {
> > "configured-application" => undefined,
> > "default-application" => false,
> > "applies-to" => undefined
> > }
> > }},
> > "naming" => {"classification" => {"binding" => {
> > "configured-application" => undefined,
> > "default-application" => false,
> > "applies-to" => undefined
> > }}},
> > "mail" => {"classification" => {"mail-session" => {
> 64a82,86
> > "security" => {"classification" => {"security-domain" => {
> > "configured-application" => undefined,
> > "default-application" => false,
> > "applies-to" => undefined
> > }}},
> 66,70d87
> < "data-source" => {
> < "configured-application" => undefined,
> < "default-application" => false,
> < "applies-to" => undefined
> < },
> 80,86d96
> < }
> < }},
> < "logging" => {"classification" => {
> < "logging-profile" => {
> < "configured-application" => undefined,
> < "default-application" => false,
> < "applies-to" => undefined
> 88c98
> < "logger" => {
> ---
> > "data-source" => {
> 93,103c103
> < }},
> < "mail" => {"classification" => {"mail-session" => {
> < "configured-application" => undefined,
> < "default-application" => false,
> < "applies-to" => undefined
> < }}},
> < "naming" => {"classification" => {"binding" => {
> < "configured-application" => undefined,
> < "default-application" => false,
> < "applies-to" => undefined
> < }}}
> ---
> > }}
> 106,114d105
> < "mail" => {"classification" => {"mail-server-security" => {
> < "configured-requires-addressable" => undefined,
> < "configured-requires-read" => undefined,
> < "configured-requires-write" => undefined,
> < "default-requires-addressable" => false,
> < "default-requires-read" => false,
> < "default-requires-write" => true,
> < "applies-to" => undefined
> < }}},
> 116c107
> < "naming-binding" => {
> ---
> > "jndi-view" => {
> 121,122c112,113
> < "default-requires-read" => false,
> < "default-requires-write" => false,
> ---
> > "default-requires-read" => true,
> > "default-requires-write" => true,
> 125c116
> < "jndi-view" => {
> ---
> > "naming-binding" => {
> 130,131c121,122
> < "default-requires-read" => true,
> < "default-requires-write" => true,
> ---
> > "default-requires-read" => false,
> > "default-requires-write" => false,
> 153,162c144
> < "remoting" => {"classification" => {"remoting-security" => {
> < "configured-requires-addressable" => undefined,
> < "configured-requires-read" => undefined,
> < "configured-requires-write" => undefined,
> < "default-requires-addressable" => false,
> < "default-requires-read" => true,
> < "default-requires-write" => true,
> < "applies-to" => undefined
> < }}},
> < "security" => {"classification" => {"misc-security" => {
> ---
> > "logging" => {"classification" => {"view-server-logs" => {
> 167,168c149,150
> < "default-requires-read" => true,
> < "default-requires-write" => true,
> ---
> > "default-requires-read" => false,
> > "default-requires-write" => false,
> 171,172c153,154
> < "undertow" => {"classification" => {
> < "undertow-handler" => {
> ---
> > "core" => {"classification" => {
> > "security-realm-ref" => {
> 176,178c158,160
> < "default-requires-addressable" => false,
> < "default-requires-read" => false,
> < "default-requires-write" => false,
> ---
> > "default-requires-addressable" => true,
> > "default-requires-read" => true,
> > "default-requires-write" => true,
> 181c163
> < "undertow-filter" => {
> ---
> > "server-ssl" => {
> 185,187c167,169
> < "default-requires-addressable" => false,
> < "default-requires-read" => false,
> < "default-requires-write" => false,
> ---
> > "default-requires-addressable" => true,
> > "default-requires-read" => true,
> > "default-requires-write" => true,
> 190c172
> < "web-connector" => {
> ---
> > "service-container" => {
> 196c178
> < "default-requires-write" => false,
> ---
> > "default-requires-write" => true,
> 199c181
> < "web-access-log" => {
> ---
> > "extensions" => {
> 205c187
> < "default-requires-write" => false,
> ---
> > "default-requires-write" => true,
> 207,237c189,190
> < }
> < }},
> < "logging" => {"classification" => {"view-server-logs" => {
> < "configured-requires-addressable" => undefined,
> < "configured-requires-read" => undefined,
> < "configured-requires-write" => undefined,
> < "default-requires-addressable" => false,
> < "default-requires-read" => false,
> < "default-requires-write" => false,
> < "applies-to" => undefined
> < }}},
> < "datasources" => {"classification" => {"data-source-security" => {
> < "configured-requires-addressable" => undefined,
> < "configured-requires-read" => undefined,
> < "configured-requires-write" => undefined,
> < "default-requires-addressable" => false,
> < "default-requires-read" => true,
> < "default-requires-write" => true,
> < "applies-to" => undefined
> < }}},
> < "resource-adapters" => {"classification" => {"resource-adapter-security" => {
> < "configured-requires-addressable" => undefined,
> < "configured-requires-read" => undefined,
> < "configured-requires-write" => undefined,
> < "default-requires-addressable" => false,
> < "default-requires-read" => true,
> < "default-requires-write" => true,
> < "applies-to" => undefined
> < }}},
> < "core" => {"classification" => {
> < "extensions" => {
> ---
> > },
> > "system-property" => {
> 246c199
> < "service-container" => {
> ---
> > "module-loading" => {
> 255c208
> < "domain-controller" => {
> ---
> > "jvm" => {
> 264c217
> < "domain-names" => {
> ---
> > "snapshots" => {
> 270c223
> < "default-requires-write" => true,
> ---
> > "default-requires-write" => false,
> 273c226
> < "security-domain-ref" => {
> ---
> > "access-control" => {
> 291c244
> < "management-interfaces" => {
> ---
> > "credential" => {
> 296c249
> < "default-requires-read" => false,
> ---
> > "default-requires-read" => true,
> 300c253
> < "socket-binding-ref" => {
> ---
> > "management-interfaces" => {
> 306c259
> < "default-requires-write" => false,
> ---
> > "default-requires-write" => true,
> 309c262
> < "socket-config" => {
> ---
> > "security-domain" => {
> 313,314c266,267
> < "default-requires-addressable" => false,
> < "default-requires-read" => false,
> ---
> > "default-requires-addressable" => true,
> > "default-requires-read" => true,
> 318c271
> < "security-vault" => {
> ---
> > "patching" => {
> 323c276
> < "default-requires-read" => true,
> ---
> > "default-requires-read" => false,
> 327c280
> < "server-ssl" => {
> ---
> > "read-whole-config" => {
> 331c284
> < "default-requires-addressable" => true,
> ---
> > "default-requires-addressable" => false,
> 336c289
> < "jvm" => {
> ---
> > "domain-controller" => {
> 345c298
> < "module-loading" => {
> ---
> > "security-vault" => {
> 350c303
> < "default-requires-read" => false,
> ---
> > "default-requires-read" => true,
> 354c307
> < "security-domain" => {
> ---
> > "security-domain-ref" => {
> 363c316
> < "snapshots" => {
> ---
> > "socket-binding-ref" => {
> 372c325
> < "credential" => {
> ---
> > "domain-names" => {
> 377c330
> < "default-requires-read" => true,
> ---
> > "default-requires-read" => false,
> 381c334
> < "read-whole-config" => {
> ---
> > "socket-config" => {
> 386c339
> < "default-requires-read" => true,
> ---
> > "default-requires-read" => false,
> 389,390c342,363
> < },
> < "patching" => {
> ---
> > }
> > }},
> > "mail" => {"classification" => {"mail-server-security" => {
> > "configured-requires-addressable" => undefined,
> > "configured-requires-read" => undefined,
> > "configured-requires-write" => undefined,
> > "default-requires-addressable" => false,
> > "default-requires-read" => false,
> > "default-requires-write" => true,
> > "applies-to" => undefined
> > }}},
> > "resource-adapters" => {"classification" => {"resource-adapter-security" => {
> > "configured-requires-addressable" => undefined,
> > "configured-requires-read" => undefined,
> > "configured-requires-write" => undefined,
> > "default-requires-addressable" => false,
> > "default-requires-read" => true,
> > "default-requires-write" => true,
> > "applies-to" => undefined
> > }}},
> > "undertow" => {"classification" => {
> > "undertow-filter" => {
> 396c369
> < "default-requires-write" => true,
> ---
> > "default-requires-write" => false,
> 399c372
> < "access-control" => {
> ---
> > "web-connector" => {
> 403,405c376,378
> < "default-requires-addressable" => true,
> < "default-requires-read" => true,
> < "default-requires-write" => true,
> ---
> > "default-requires-addressable" => false,
> > "default-requires-read" => false,
> > "default-requires-write" => false,
> 408c381
> < "system-property" => {
> ---
> > "undertow-handler" => {
> 414c387
> < "default-requires-write" => true,
> ---
> > "default-requires-write" => false,
> 417c390
> < "security-realm-ref" => {
> ---
> > "web-access-log" => {
> 421,423c394,396
> < "default-requires-addressable" => true,
> < "default-requires-read" => true,
> < "default-requires-write" => true,
> ---
> > "default-requires-addressable" => false,
> > "default-requires-read" => false,
> > "default-requires-write" => false,
> 426c399,426
> < }}
> ---
> > }},
> > "datasources" => {"classification" => {"data-source-security" => {
> > "configured-requires-addressable" => undefined,
> > "configured-requires-read" => undefined,
> > "configured-requires-write" => undefined,
> > "default-requires-addressable" => false,
> > "default-requires-read" => true,
> > "default-requires-write" => true,
> > "applies-to" => undefined
> > }}},
> > "remoting" => {"classification" => {"remoting-security" => {
> > "configured-requires-addressable" => undefined,
> > "configured-requires-read" => undefined,
> > "configured-requires-write" => undefined,
> > "default-requires-addressable" => false,
> > "default-requires-read" => true,
> > "default-requires-write" => true,
> > "applies-to" => undefined
> > }}},
> > "security" => {"classification" => {"misc-security" => {
> > "configured-requires-addressable" => undefined,
> > "configured-requires-read" => undefined,
> > "configured-requires-write" => undefined,
> > "default-requires-addressable" => false,
> > "default-requires-read" => true,
> > "default-requires-write" => true,
> > "applies-to" => undefined
> > }}}
> {code}
--
This message was sent by Atlassian JIRA
(v6.4.11#64026)
10 years