[JBoss JIRA] (WFLY-9582) Service is not starting
by Roshan Royal (JIRA)
[ https://issues.jboss.org/browse/WFLY-9582?page=com.atlassian.jira.plugin.... ]
Roshan Royal updated WFLY-9582:
-------------------------------
Issue Type: Bug (was: Feature Request)
> Service is not starting
> -----------------------
>
> Key: WFLY-9582
> URL: https://issues.jboss.org/browse/WFLY-9582
> Project: WildFly
> Issue Type: Bug
> Components: Batch, Server
> Affects Versions: 9.0.2.Final
> Environment: Window 7 64-bit system
> Reporter: Roshan Royal
> Assignee: Cheng Fang
> Priority: Blocker
>
> Getting below error while trying to start server through windows service.
> [2017-11-29 14:24:47] [info] [14908] Commons Daemon procrun (1.0.15.0 64-bit) started
> [2017-11-29 14:24:47] [info] [14908] Starting service 'Wildfly' ...
> [2017-11-29 14:24:47] [info] [ 3760] Commons Daemon procrun (1.0.15.0 64-bit) started
> [2017-11-29 14:24:47] [info] [ 3760] Running 'Wildfly' Service...
> [2017-11-29 14:24:47] [info] [15500] Starting service...
> [2017-11-29 14:24:47] [info] [15500] Service started in 3 ms.
> [2017-11-29 14:24:47] [info] [ 3760] Run service finished.
> [2017-11-29 14:24:47] [info] [ 3760] Commons Daemon procrun finished
> [2017-11-29 14:24:48] [error] [14908] Failed to start 'Wildfly' service
> [2017-11-29 14:24:48] [error] [14908] The data area passed to a system call is too small.
> [2017-11-29 14:24:48] [info] [14908] Start service finished.
> [2017-11-29 14:24:48] [error] [14908] Commons Daemon procrun failed with exit value: 5 (Failed to start service)
> [2017-11-29 14:24:48] [error] [14908] The data area passed to a system call is too small.
--
This message was sent by Atlassian JIRA
(v7.5.0#75005)
7 years, 1 month
[JBoss JIRA] (WFLY-9582) Service is not starting
by Roshan Royal (JIRA)
Roshan Royal created WFLY-9582:
----------------------------------
Summary: Service is not starting
Key: WFLY-9582
URL: https://issues.jboss.org/browse/WFLY-9582
Project: WildFly
Issue Type: Feature Request
Components: Batch, Server
Affects Versions: 9.0.2.Final
Environment: Window 7 64-bit system
Reporter: Roshan Royal
Assignee: Cheng Fang
Priority: Blocker
Getting below error while trying to start server through windows service.
[2017-11-29 14:24:47] [info] [14908] Commons Daemon procrun (1.0.15.0 64-bit) started
[2017-11-29 14:24:47] [info] [14908] Starting service 'Wildfly' ...
[2017-11-29 14:24:47] [info] [ 3760] Commons Daemon procrun (1.0.15.0 64-bit) started
[2017-11-29 14:24:47] [info] [ 3760] Running 'Wildfly' Service...
[2017-11-29 14:24:47] [info] [15500] Starting service...
[2017-11-29 14:24:47] [info] [15500] Service started in 3 ms.
[2017-11-29 14:24:47] [info] [ 3760] Run service finished.
[2017-11-29 14:24:47] [info] [ 3760] Commons Daemon procrun finished
[2017-11-29 14:24:48] [error] [14908] Failed to start 'Wildfly' service
[2017-11-29 14:24:48] [error] [14908] The data area passed to a system call is too small.
[2017-11-29 14:24:48] [info] [14908] Start service finished.
[2017-11-29 14:24:48] [error] [14908] Commons Daemon procrun failed with exit value: 5 (Failed to start service)
[2017-11-29 14:24:48] [error] [14908] The data area passed to a system call is too small.
--
This message was sent by Atlassian JIRA
(v7.5.0#75005)
7 years, 1 month
[JBoss JIRA] (WFCORE-3437) CLI can't be started on Solaris
by Marek Kopecký (JIRA)
Marek Kopecký created WFCORE-3437:
-------------------------------------
Summary: CLI can't be started on Solaris
Key: WFCORE-3437
URL: https://issues.jboss.org/browse/WFCORE-3437
Project: WildFly Core
Issue Type: Bug
Components: CLI
Reporter: Marek Kopecký
Assignee: Jean-Francois Denise
Priority: Critical
CLI (WildFly master) can't be started on Solaris:
{noformat}
[hudson@dev34-02 bin]$ ./jboss-cli.sh
You are disconnected at the moment. Type 'connect' to connect to the server or 'help' for the list of supported commands.
java.io.IOException: Error executing 'stty size': unknown mode: size
: Error executing 'stty size': unknown mode: size
[hudson@dev34-02 bin]$
{noformat}
--
This message was sent by Atlassian JIRA
(v7.5.0#75005)
7 years, 1 month
[JBoss JIRA] (WFLY-8948) SAML2STSLoginModule cannot be configured with module options instead of configFile
by Vladimir Dosoudil (JIRA)
[ https://issues.jboss.org/browse/WFLY-8948?page=com.atlassian.jira.plugin.... ]
Vladimir Dosoudil updated WFLY-8948:
------------------------------------
Labels: downstream_dependency (was: )
> SAML2STSLoginModule cannot be configured with module options instead of configFile
> ----------------------------------------------------------------------------------
>
> Key: WFLY-8948
> URL: https://issues.jboss.org/browse/WFLY-8948
> Project: WildFly
> Issue Type: Bug
> Components: EJB, Security
> Reporter: Jiri Ondrusek
> Assignee: Jiri Ondrusek
> Labels: downstream_dependency
>
> It is not possible to configure the SAML2STSLoginModule by using module options instead of configFile:
> <security-domain name="sts" cache-type="default">
> <authentication>
> <login-module code="org.picketlink.identity.federation.bindings.jboss.auth.SAML2STSLoginModule" flag="required" module="org.picketlink">
> <module-option name="serviceName" value="PicketLinkSTS"/>
> <module-option name="portName" value="PicketLinkSTSPort"/>
> <module-option name="endpointAddress" value="http://localhost:8080/picketlink-sts/PicketLinkSTS"/>
> <module-option name="username" value="admin"/>
> <module-option name="password" value="admin"/>
> See BZ for more information.
--
This message was sent by Atlassian JIRA
(v7.5.0#75005)
7 years, 1 month
[JBoss JIRA] (WFCORE-3435) Expose capability/requirements to deployments
by Brian Stansberry (JIRA)
[ https://issues.jboss.org/browse/WFCORE-3435?page=com.atlassian.jira.plugi... ]
Brian Stansberry reassigned WFCORE-3435:
----------------------------------------
Assignee: (was: Jason Greene)
> Expose capability/requirements to deployments
> ---------------------------------------------
>
> Key: WFCORE-3435
> URL: https://issues.jboss.org/browse/WFCORE-3435
> Project: WildFly Core
> Issue Type: Enhancement
> Components: Domain Management
> Affects Versions: 3.0.9.Final
> Reporter: Bob McWhirter
>
> For WildFly Swarm, we use a fair amount of ServiceActivators in deployments.
> Moving to WF11, we have seen some of our dependencies on Service<T>, such as NamingService.SERVICE_NAME result in deprecation warnings suggesting we move to using CAPABILITY_NAME. From within a ServiceActivator, within a deployment, this appears to not be a possibility.
> Filed per [~ctomc]
--
This message was sent by Atlassian JIRA
(v7.5.0#75005)
7 years, 1 month
[JBoss JIRA] (WFCORE-3435) Expose capability/requirements to deployments
by Brian Stansberry (JIRA)
[ https://issues.jboss.org/browse/WFCORE-3435?page=com.atlassian.jira.plugi... ]
Brian Stansberry updated WFCORE-3435:
-------------------------------------
Component/s: Domain Management
> Expose capability/requirements to deployments
> ---------------------------------------------
>
> Key: WFCORE-3435
> URL: https://issues.jboss.org/browse/WFCORE-3435
> Project: WildFly Core
> Issue Type: Enhancement
> Components: Domain Management
> Affects Versions: 3.0.9.Final
> Reporter: Bob McWhirter
> Assignee: Jason Greene
>
> For WildFly Swarm, we use a fair amount of ServiceActivators in deployments.
> Moving to WF11, we have seen some of our dependencies on Service<T>, such as NamingService.SERVICE_NAME result in deprecation warnings suggesting we move to using CAPABILITY_NAME. From within a ServiceActivator, within a deployment, this appears to not be a possibility.
> Filed per [~ctomc]
--
This message was sent by Atlassian JIRA
(v7.5.0#75005)
7 years, 1 month
[JBoss JIRA] (ELY-1454) Introduce CredentialStore which works like FileSystemSecurityRealm
by David Lloyd (JIRA)
David Lloyd created ELY-1454:
--------------------------------
Summary: Introduce CredentialStore which works like FileSystemSecurityRealm
Key: ELY-1454
URL: https://issues.jboss.org/browse/ELY-1454
Project: WildFly Elytron
Issue Type: Enhancement
Components: Credential Store
Reporter: David Lloyd
Priority: Minor
It would be useful and convenient to have a credential store implementation using the same techniques – and ideally the same storage format and backend – as {{FileSystemSecurityRealm}}. Creating a basic abstraction of this format might be a reasonable first step, or it might make sense to implement either the realm in terms of the credential store, or the credential store in terms of the realm.
The credential store would probably not make any use of the attributes.
--
This message was sent by Atlassian JIRA
(v7.5.0#75005)
7 years, 1 month
[JBoss JIRA] (WFLY-5296) public final methods should be allowed for Local and Remote Business Interface View
by Tomasz Adamski (JIRA)
[ https://issues.jboss.org/browse/WFLY-5296?page=com.atlassian.jira.plugin.... ]
Tomasz Adamski closed WFLY-5296.
--------------------------------
Resolution: Rejected
EJB 3.2 specification says in point 4.9.6:
{panel}
The session bean class may define zero or more business methods whose signatures must follow these
rules:
(...)
* The method must not be declared as final or static.
(...)
{panel}
The issue of an exception being thrown has been addressed by WFLY-7085. From WildFly 12 you will be unable to deploy an application that does not follow the above contract. You will be provided with the information about the bean that is a problem. As a result, no exceptions will be thrown during runtime.
> public final methods should be allowed for Local and Remote Business Interface View
> -----------------------------------------------------------------------------------
>
> Key: WFLY-5296
> URL: https://issues.jboss.org/browse/WFLY-5296
> Project: WildFly
> Issue Type: Bug
> Components: EE
> Affects Versions: 9.0.1.Final
> Reporter: Andreas Liebscher
> Assignee: Tomasz Adamski
>
> The spec says:
> Only public methods of the bean class (and any superclasses) may be invoked through the no-interface view. Attempted invocations of methods with any other access modifiers via the no-interface view reference must result in the javax.ejb.EJBException.
> So it is not allowed to use public final methods when using no-interface view.
> But WF-9.0.1-Final does also throw an exception when using local business interface view:
> ERROR [org.jboss.as.ejb3.invocation] (default task-31) WFLYEJB0034: EJB Invocation failed on component XxxBean for method public abstract yyy: javax.ejb.EJBException: java.lang.IllegalStateException: WFLYEE0067: Method does not exist public final zzz
> With WF-8.1.0-Final this was no problem!
> What has been changed in WF-9?
--
This message was sent by Atlassian JIRA
(v7.5.0#75005)
7 years, 1 month
[JBoss JIRA] (WFCORE-3416) User redirected with HTTP 301 instead of 302 in admin-only mode
by Darran Lofthouse (JIRA)
[ https://issues.jboss.org/browse/WFCORE-3416?page=com.atlassian.jira.plugi... ]
Darran Lofthouse commented on WFCORE-3416:
------------------------------------------
I am currently experiencing a different issue that may also be improved by incorporating these changes.
If I connect my web browser over port 9990 and then subsequently enable SSL because the previous connection used a moved permanently redirect the web browser remembers this, the admin console previously loaded from port 9990 is used and the management request to port 9990 redirected to port 9993 but now it is a cross origin request so is rejected.
> User redirected with HTTP 301 instead of 302 in admin-only mode
> ---------------------------------------------------------------
>
> Key: WFCORE-3416
> URL: https://issues.jboss.org/browse/WFCORE-3416
> Project: WildFly Core
> Issue Type: Bug
> Components: Server
> Affects Versions: 4.0.0.Alpha2
> Environment: JBoss EAP 7.1.0.Alpha and 7.0.5
> OS : RHEL 7
> Reporter: Tomas Hofman
> Assignee: Tomas Hofman
>
> The issue isn't that the console isn't working in admin-only mode. It's that a permanent redirect is issued for a temporary condition. The redirect from the console root URL should use a 302, not a 301, since the appropriate target depends on whether the server was started in admin-only mode.
> The root URL of the admin console ( / ) does a permanent redirect (301) to the final target. Normally it's a redirect to /console/index.html. But if the server is started in admin-only mode then /console/index.html doesn't return a sensible error (Chrome reports that the connection to the server was lost). If a browser has cached the permanent redirect, it won't be clear why the console isn't working.
> On the other hand if the server is started in domain-only mode and the browser caches the permanent redirect to /consoleerror/noConsoleForAdminModeError.html, then the browser will continue to load /consoleerror/noConsoleForAdminModeError.html even after the server is started without --admin-only.
> A 301 redirect is inappropriate since "admin-only" isn't a permanent state.
--
This message was sent by Atlassian JIRA
(v7.5.0#75005)
7 years, 1 month
[JBoss JIRA] (WFCORE-3396) Provide certificate authority integration
by Farah Juma (JIRA)
[ https://issues.jboss.org/browse/WFCORE-3396?page=com.atlassian.jira.plugi... ]
Farah Juma updated WFCORE-3396:
-------------------------------
Description:
Let's Encrypt provide API to fully automate (gain/renew) certificate retrieval using ACME protocol. Integrate this capability into wildfly.
This can simplify administrator work. No need to perform certification renewal routine tasks.
This is follow up on WFCORE-3305 and piece of bigger task "Simplify SSL configuration in wildfly". That said it is just "User experience" issue. Administrator still can work with Let's Encrypt by third party client and just reference wildfly to this certificate.
[1] Latest draft: https://tools.ietf.org/html/draft-ietf-acme-acme-08
was:
Let's Encrypt provide API to fully automate (gain/renew) certificate retrieval using ACME protocol. Integrate this capability into wildfly.
This can simplify administrator work. No need to perform certification renewal routine tasks.
This is follow up on WFCORE-3305 and piece of bigger task "Simplify SSL configuration in wildfly". That said it is just "User experience" issue. Administrator still can work with Let's Encrypt by third party client and just reference wildfly to this certificate.
[1] https://tools.ietf.org/html/draft-ietf-acme-acme-07
> Provide certificate authority integration
> -----------------------------------------
>
> Key: WFCORE-3396
> URL: https://issues.jboss.org/browse/WFCORE-3396
> Project: WildFly Core
> Issue Type: Feature Request
> Components: Security
> Affects Versions: 4.0.0.Alpha2
> Reporter: Martin Choma
> Assignee: Darran Lofthouse
>
> Let's Encrypt provide API to fully automate (gain/renew) certificate retrieval using ACME protocol. Integrate this capability into wildfly.
> This can simplify administrator work. No need to perform certification renewal routine tasks.
> This is follow up on WFCORE-3305 and piece of bigger task "Simplify SSL configuration in wildfly". That said it is just "User experience" issue. Administrator still can work with Let's Encrypt by third party client and just reference wildfly to this certificate.
> [1] Latest draft: https://tools.ietf.org/html/draft-ietf-acme-acme-08
--
This message was sent by Atlassian JIRA
(v7.5.0#75005)
7 years, 1 month