[Red Hat JIRA] (ELY-2063) MaskedPassword interface contains 8 algorighms those are unavailable on IBM JDK8
by Darran Lofthouse (Jira)
[ https://issues.redhat.com/browse/ELY-2063?page=com.atlassian.jira.plugin.... ]
Darran Lofthouse resolved ELY-2063.
-----------------------------------
Fix Version/s: 1.14.1.CR1
Resolution: Done
> MaskedPassword interface contains 8 algorighms those are unavailable on IBM JDK8
> --------------------------------------------------------------------------------
>
> Key: ELY-2063
> URL: https://issues.redhat.com/browse/ELY-2063
> Project: WildFly Elytron
> Issue Type: Bug
> Reporter: Marek Kopecky
> Assignee: Sonia Zaldana
> Priority: Major
> Fix For: 1.14.1.CR1
>
>
> MaskedPassword interface contains 8 algorighms those are unavailable on IBM JDK8:
> * masked-SHA1-RC2-40
> * masked-SHA1-RC2-40-CBC-PKCS5
> * masked-SHA1-RC2-128
> * masked-SHA1-RC2-128-CBC-PKCS5
> * masked-SHA1-RC4-40
> * masked-SHA1-RC4-40-ECB
> * masked-SHA1-RC4-128
> * masked-SHA1-RC4-128-ECB
> This leads to MaskedPasswordTest errors on IBM JDK8.
> If this is excepted, MaskedPasswordTest needs to be fixed and proper explanation needs to be added to MaskedPassword interface (so far this interface suggest that only listed algorithms with @Deprecated annotation may be unavailable). If this is not excepted, then the bug needs to be fixed.
> {noformat}
> [hudson@csb-rhel7-medium-102630 impl]$ mvn clean install -Dmaven.repo.local=/tmp/mkopecky/repo -Dtest=MaskedPasswordTest -P skip-default-tests -Djava8.home=/path/to/ibm-java-x86_64-sdk-8.0-6.16
> ...
> Running org.wildfly.security.password.impl.MaskedPasswordTest
> Tests run: 48, Failures: 0, Errors: 16, Skipped: 0, Time elapsed: 1.688 sec <<< FAILURE! - in org.wildfly.security.password.impl.MaskedPasswordTest
> testClearSpec[6: masked-SHA1-RC2-40](org.wildfly.security.password.impl.MaskedPasswordTest) Time elapsed: 0.006 sec <<< ERROR!
> java.security.spec.InvalidKeySpecException: java.security.NoSuchAlgorithmException: PBEwithSHA1AndRC2_40 SecretKeyFactory not available
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:91)
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:100)
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:120)
> at org.wildfly.security.password.impl.PasswordFactorySpiImpl.engineGeneratePassword(PasswordFactorySpiImpl.java:492)
> at org.wildfly.security.password.PasswordFactory.generatePassword(PasswordFactory.java:151)
> at org.wildfly.security.password.impl.MaskedPasswordTest.testClearSpec(MaskedPasswordTest.java:84)
> Caused by: java.security.NoSuchAlgorithmException: PBEwithSHA1AndRC2_40 SecretKeyFactory not available
> at org.wildfly.security.password.impl.MaskedPasswordImpl.getCipher(MaskedPasswordImpl.java:189)
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:87)
> ... 5 more
> testEncryptableSpec[6: masked-SHA1-RC2-40](org.wildfly.security.password.impl.MaskedPasswordTest) Time elapsed: 0 sec <<< ERROR!
> java.security.spec.InvalidKeySpecException: java.security.NoSuchAlgorithmException: PBEwithSHA1AndRC2_40 SecretKeyFactory not available
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:91)
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:104)
> at org.wildfly.security.password.impl.PasswordFactorySpiImpl.engineGeneratePassword(PasswordFactorySpiImpl.java:483)
> at org.wildfly.security.password.PasswordFactory.generatePassword(PasswordFactory.java:151)
> at org.wildfly.security.password.impl.MaskedPasswordTest.testEncryptableSpec(MaskedPasswordTest.java:104)
> Caused by: java.security.NoSuchAlgorithmException: PBEwithSHA1AndRC2_40 SecretKeyFactory not available
> at org.wildfly.security.password.impl.MaskedPasswordImpl.getCipher(MaskedPasswordImpl.java:189)
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:87)
> ... 4 more
> testClearSpec[7: masked-SHA1-RC2-40-CBC-PKCS5](org.wildfly.security.password.impl.MaskedPasswordTest) Time elapsed: 0.002 sec <<< ERROR!
> java.security.spec.InvalidKeySpecException: java.security.NoSuchAlgorithmException: PBEwithSHA1Andrc2_40 SecretKeyFactory not available
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:91)
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:100)
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:120)
> at org.wildfly.security.password.impl.PasswordFactorySpiImpl.engineGeneratePassword(PasswordFactorySpiImpl.java:492)
> at org.wildfly.security.password.PasswordFactory.generatePassword(PasswordFactory.java:151)
> at org.wildfly.security.password.impl.MaskedPasswordTest.testClearSpec(MaskedPasswordTest.java:84)
> Caused by: java.security.NoSuchAlgorithmException: PBEwithSHA1Andrc2_40 SecretKeyFactory not available
> at org.wildfly.security.password.impl.MaskedPasswordImpl.getCipher(MaskedPasswordImpl.java:189)
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:87)
> ... 5 more
> testEncryptableSpec[7: masked-SHA1-RC2-40-CBC-PKCS5](org.wildfly.security.password.impl.MaskedPasswordTest) Time elapsed: 0.001 sec <<< ERROR!
> java.security.spec.InvalidKeySpecException: java.security.NoSuchAlgorithmException: PBEwithSHA1Andrc2_40 SecretKeyFactory not available
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:91)
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:104)
> at org.wildfly.security.password.impl.PasswordFactorySpiImpl.engineGeneratePassword(PasswordFactorySpiImpl.java:483)
> at org.wildfly.security.password.PasswordFactory.generatePassword(PasswordFactory.java:151)
> at org.wildfly.security.password.impl.MaskedPasswordTest.testEncryptableSpec(MaskedPasswordTest.java:104)
> Caused by: java.security.NoSuchAlgorithmException: PBEwithSHA1Andrc2_40 SecretKeyFactory not available
> at org.wildfly.security.password.impl.MaskedPasswordImpl.getCipher(MaskedPasswordImpl.java:189)
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:87)
> ... 4 more
> testClearSpec[8: masked-SHA1-RC2-128](org.wildfly.security.password.impl.MaskedPasswordTest) Time elapsed: 0.001 sec <<< ERROR!
> java.security.spec.InvalidKeySpecException: java.security.NoSuchAlgorithmException: PBEWithSHA1AndRC2_128 SecretKeyFactory not available
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:91)
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:100)
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:120)
> at org.wildfly.security.password.impl.PasswordFactorySpiImpl.engineGeneratePassword(PasswordFactorySpiImpl.java:492)
> at org.wildfly.security.password.PasswordFactory.generatePassword(PasswordFactory.java:151)
> at org.wildfly.security.password.impl.MaskedPasswordTest.testClearSpec(MaskedPasswordTest.java:84)
> Caused by: java.security.NoSuchAlgorithmException: PBEWithSHA1AndRC2_128 SecretKeyFactory not available
> at org.wildfly.security.password.impl.MaskedPasswordImpl.getCipher(MaskedPasswordImpl.java:189)
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:87)
> ... 5 more
> testEncryptableSpec[8: masked-SHA1-RC2-128](org.wildfly.security.password.impl.MaskedPasswordTest) Time elapsed: 0.001 sec <<< ERROR!
> java.security.spec.InvalidKeySpecException: java.security.NoSuchAlgorithmException: PBEWithSHA1AndRC2_128 SecretKeyFactory not available
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:91)
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:104)
> at org.wildfly.security.password.impl.PasswordFactorySpiImpl.engineGeneratePassword(PasswordFactorySpiImpl.java:483)
> at org.wildfly.security.password.PasswordFactory.generatePassword(PasswordFactory.java:151)
> at org.wildfly.security.password.impl.MaskedPasswordTest.testEncryptableSpec(MaskedPasswordTest.java:104)
> Caused by: java.security.NoSuchAlgorithmException: PBEWithSHA1AndRC2_128 SecretKeyFactory not available
> at org.wildfly.security.password.impl.MaskedPasswordImpl.getCipher(MaskedPasswordImpl.java:189)
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:87)
> ... 4 more
> testClearSpec[9: masked-SHA1-RC2-128-CBC-PKCS5](org.wildfly.security.password.impl.MaskedPasswordTest) Time elapsed: 0.001 sec <<< ERROR!
> java.security.spec.InvalidKeySpecException: java.security.NoSuchAlgorithmException: PBEWithSHA1andRC2_128 SecretKeyFactory not available
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:91)
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:100)
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:120)
> at org.wildfly.security.password.impl.PasswordFactorySpiImpl.engineGeneratePassword(PasswordFactorySpiImpl.java:492)
> at org.wildfly.security.password.PasswordFactory.generatePassword(PasswordFactory.java:151)
> at org.wildfly.security.password.impl.MaskedPasswordTest.testClearSpec(MaskedPasswordTest.java:84)
> Caused by: java.security.NoSuchAlgorithmException: PBEWithSHA1andRC2_128 SecretKeyFactory not available
> at org.wildfly.security.password.impl.MaskedPasswordImpl.getCipher(MaskedPasswordImpl.java:189)
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:87)
> ... 5 more
> testEncryptableSpec[9: masked-SHA1-RC2-128-CBC-PKCS5](org.wildfly.security.password.impl.MaskedPasswordTest) Time elapsed: 0 sec <<< ERROR!
> java.security.spec.InvalidKeySpecException: java.security.NoSuchAlgorithmException: PBEWithSHA1andRC2_128 SecretKeyFactory not available
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:91)
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:104)
> at org.wildfly.security.password.impl.PasswordFactorySpiImpl.engineGeneratePassword(PasswordFactorySpiImpl.java:483)
> at org.wildfly.security.password.PasswordFactory.generatePassword(PasswordFactory.java:151)
> at org.wildfly.security.password.impl.MaskedPasswordTest.testEncryptableSpec(MaskedPasswordTest.java:104)
> Caused by: java.security.NoSuchAlgorithmException: PBEWithSHA1andRC2_128 SecretKeyFactory not available
> at org.wildfly.security.password.impl.MaskedPasswordImpl.getCipher(MaskedPasswordImpl.java:189)
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:87)
> ... 4 more
> testClearSpec[10: masked-SHA1-RC4-40](org.wildfly.security.password.impl.MaskedPasswordTest) Time elapsed: 0.001 sec <<< ERROR!
> java.security.spec.InvalidKeySpecException: java.security.NoSuchAlgorithmException: PBEWithSHA1AndRC4_40 SecretKeyFactory not available
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:91)
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:100)
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:120)
> at org.wildfly.security.password.impl.PasswordFactorySpiImpl.engineGeneratePassword(PasswordFactorySpiImpl.java:492)
> at org.wildfly.security.password.PasswordFactory.generatePassword(PasswordFactory.java:151)
> at org.wildfly.security.password.impl.MaskedPasswordTest.testClearSpec(MaskedPasswordTest.java:84)
> Caused by: java.security.NoSuchAlgorithmException: PBEWithSHA1AndRC4_40 SecretKeyFactory not available
> at org.wildfly.security.password.impl.MaskedPasswordImpl.getCipher(MaskedPasswordImpl.java:189)
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:87)
> ... 5 more
> testEncryptableSpec[10: masked-SHA1-RC4-40](org.wildfly.security.password.impl.MaskedPasswordTest) Time elapsed: 0.001 sec <<< ERROR!
> java.security.spec.InvalidKeySpecException: java.security.NoSuchAlgorithmException: PBEWithSHA1AndRC4_40 SecretKeyFactory not available
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:91)
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:104)
> at org.wildfly.security.password.impl.PasswordFactorySpiImpl.engineGeneratePassword(PasswordFactorySpiImpl.java:483)
> at org.wildfly.security.password.PasswordFactory.generatePassword(PasswordFactory.java:151)
> at org.wildfly.security.password.impl.MaskedPasswordTest.testEncryptableSpec(MaskedPasswordTest.java:104)
> Caused by: java.security.NoSuchAlgorithmException: PBEWithSHA1AndRC4_40 SecretKeyFactory not available
> at org.wildfly.security.password.impl.MaskedPasswordImpl.getCipher(MaskedPasswordImpl.java:189)
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:87)
> ... 4 more
> testClearSpec[11: masked-SHA1-RC4-40-ECB](org.wildfly.security.password.impl.MaskedPasswordTest) Time elapsed: 0.002 sec <<< ERROR!
> java.security.spec.InvalidKeySpecException: java.security.NoSuchAlgorithmException: PBEWithsha1AndRC4_40 SecretKeyFactory not available
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:91)
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:100)
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:120)
> at org.wildfly.security.password.impl.PasswordFactorySpiImpl.engineGeneratePassword(PasswordFactorySpiImpl.java:492)
> at org.wildfly.security.password.PasswordFactory.generatePassword(PasswordFactory.java:151)
> at org.wildfly.security.password.impl.MaskedPasswordTest.testClearSpec(MaskedPasswordTest.java:84)
> Caused by: java.security.NoSuchAlgorithmException: PBEWithsha1AndRC4_40 SecretKeyFactory not available
> at org.wildfly.security.password.impl.MaskedPasswordImpl.getCipher(MaskedPasswordImpl.java:189)
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:87)
> ... 5 more
> testEncryptableSpec[11: masked-SHA1-RC4-40-ECB](org.wildfly.security.password.impl.MaskedPasswordTest) Time elapsed: 0.002 sec <<< ERROR!
> java.security.spec.InvalidKeySpecException: java.security.NoSuchAlgorithmException: PBEWithsha1AndRC4_40 SecretKeyFactory not available
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:91)
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:104)
> at org.wildfly.security.password.impl.PasswordFactorySpiImpl.engineGeneratePassword(PasswordFactorySpiImpl.java:483)
> at org.wildfly.security.password.PasswordFactory.generatePassword(PasswordFactory.java:151)
> at org.wildfly.security.password.impl.MaskedPasswordTest.testEncryptableSpec(MaskedPasswordTest.java:104)
> Caused by: java.security.NoSuchAlgorithmException: PBEWithsha1AndRC4_40 SecretKeyFactory not available
> at org.wildfly.security.password.impl.MaskedPasswordImpl.getCipher(MaskedPasswordImpl.java:189)
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:87)
> ... 4 more
> testClearSpec[12: masked-SHA1-RC4-128](org.wildfly.security.password.impl.MaskedPasswordTest) Time elapsed: 0.001 sec <<< ERROR!
> java.security.spec.InvalidKeySpecException: java.security.NoSuchAlgorithmException: PBEWithSHA1AndRC4_128 SecretKeyFactory not available
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:91)
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:100)
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:120)
> at org.wildfly.security.password.impl.PasswordFactorySpiImpl.engineGeneratePassword(PasswordFactorySpiImpl.java:492)
> at org.wildfly.security.password.PasswordFactory.generatePassword(PasswordFactory.java:151)
> at org.wildfly.security.password.impl.MaskedPasswordTest.testClearSpec(MaskedPasswordTest.java:84)
> Caused by: java.security.NoSuchAlgorithmException: PBEWithSHA1AndRC4_128 SecretKeyFactory not available
> at org.wildfly.security.password.impl.MaskedPasswordImpl.getCipher(MaskedPasswordImpl.java:189)
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:87)
> ... 5 more
> testEncryptableSpec[12: masked-SHA1-RC4-128](org.wildfly.security.password.impl.MaskedPasswordTest) Time elapsed: 0.002 sec <<< ERROR!
> java.security.spec.InvalidKeySpecException: java.security.NoSuchAlgorithmException: PBEWithSHA1AndRC4_128 SecretKeyFactory not available
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:91)
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:104)
> at org.wildfly.security.password.impl.PasswordFactorySpiImpl.engineGeneratePassword(PasswordFactorySpiImpl.java:483)
> at org.wildfly.security.password.PasswordFactory.generatePassword(PasswordFactory.java:151)
> at org.wildfly.security.password.impl.MaskedPasswordTest.testEncryptableSpec(MaskedPasswordTest.java:104)
> Caused by: java.security.NoSuchAlgorithmException: PBEWithSHA1AndRC4_128 SecretKeyFactory not available
> at org.wildfly.security.password.impl.MaskedPasswordImpl.getCipher(MaskedPasswordImpl.java:189)
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:87)
> ... 4 more
> testClearSpec[13: masked-SHA1-RC4-128-ECB](org.wildfly.security.password.impl.MaskedPasswordTest) Time elapsed: 0 sec <<< ERROR!
> java.security.spec.InvalidKeySpecException: java.security.NoSuchAlgorithmException: pbeWithSHA1AndRC4_128 SecretKeyFactory not available
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:91)
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:100)
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:120)
> at org.wildfly.security.password.impl.PasswordFactorySpiImpl.engineGeneratePassword(PasswordFactorySpiImpl.java:492)
> at org.wildfly.security.password.PasswordFactory.generatePassword(PasswordFactory.java:151)
> at org.wildfly.security.password.impl.MaskedPasswordTest.testClearSpec(MaskedPasswordTest.java:84)
> Caused by: java.security.NoSuchAlgorithmException: pbeWithSHA1AndRC4_128 SecretKeyFactory not available
> at org.wildfly.security.password.impl.MaskedPasswordImpl.getCipher(MaskedPasswordImpl.java:189)
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:87)
> ... 5 more
> testEncryptableSpec[13: masked-SHA1-RC4-128-ECB](org.wildfly.security.password.impl.MaskedPasswordTest) Time elapsed: 0 sec <<< ERROR!
> java.security.spec.InvalidKeySpecException: java.security.NoSuchAlgorithmException: pbeWithSHA1AndRC4_128 SecretKeyFactory not available
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:91)
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:104)
> at org.wildfly.security.password.impl.PasswordFactorySpiImpl.engineGeneratePassword(PasswordFactorySpiImpl.java:483)
> at org.wildfly.security.password.PasswordFactory.generatePassword(PasswordFactory.java:151)
> at org.wildfly.security.password.impl.MaskedPasswordTest.testEncryptableSpec(MaskedPasswordTest.java:104)
> Caused by: java.security.NoSuchAlgorithmException: pbeWithSHA1AndRC4_128 SecretKeyFactory not available
> at org.wildfly.security.password.impl.MaskedPasswordImpl.getCipher(MaskedPasswordImpl.java:189)
> at org.wildfly.security.password.impl.MaskedPasswordImpl.<init>(MaskedPasswordImpl.java:87)
> ... 4 more
> ...
> [hudson@csb-rhel7-medium-102630 impl]$
> {noformat}
--
This message was sent by Atlassian Jira
(v8.13.1#813001)
3 years, 4 months
[Red Hat JIRA] (WFLY-14258) The first websocket that gets triggered from any deployed war file on server prevents all websockets in all other deployed war files from working
by Ronald Feicht (Jira)
[ https://issues.redhat.com/browse/WFLY-14258?page=com.atlassian.jira.plugi... ]
Ronald Feicht commented on WFLY-14258:
--------------------------------------
Yes and it is even worse with 21.0.2.Final, because a server restart does not "reset" the issue. Instead one needs to undeploy the war files to "reset" their behavior.
> The first websocket that gets triggered from any deployed war file on server prevents all websockets in all other deployed war files from working
> -------------------------------------------------------------------------------------------------------------------------------------------------
>
> Key: WFLY-14258
> URL: https://issues.redhat.com/browse/WFLY-14258
> Project: WildFly
> Issue Type: Bug
> Components: JSF, Web Sockets
> Reporter: Ronald Feicht
> Assignee: Farah Juma
> Priority: Major
> Attachments: ws1.tar.gz, ws2.tar.gz
>
>
> *Two* war files are deployed on the same Wildfly instance and both use websockets. The *first* page with f:websocket that gets loaded by the browser works perfectly well. Any websocket on any other page of the *same* war file also works perfectly well. Yet, any websocket of the *second* war file will not work until the server is restartet. Then the first page with a websocket that gets loaded determines which war file's websockets will work.
> Example:
> # WS1/index.xhtml --> websocket works
> # WS2/index.xhtml --> websocket does not work (because it seems to be closed on the server side?)
> # restart Wildfly
> # WS2/index.xhtml --> websocket works
> # WS1/index.xhtml --> websocket does not work (because it seems to be closed on the server side?)
> # if we had a WS3/index.xhtml its websockets would also not work
> issue found on: Mojarra 2.3.9.SP11 on WildFly Full 20.0.1.Final (WildFly Core 12.0.3.Final)
> Example war files attached for you to easily confirm this issue:
> ws1.tar.gz
> ws2.tar.gz
>
> Created the same bug report here because I cannot tell whether the bug is in Mojarra or the Wildfly integration of Mojarra: [https://github.com/eclipse-ee4j/mojarra/issues/4799]
--
This message was sent by Atlassian Jira
(v8.13.1#813001)
3 years, 4 months
[Red Hat JIRA] (DROOLS-5926) Executable Model compiler interprets numeric strings with leading 0 as Octal values
by Mario Fusco (Jira)
[ https://issues.redhat.com/browse/DROOLS-5926?page=com.atlassian.jira.plug... ]
Mario Fusco updated DROOLS-5926:
--------------------------------
Sprint: 2020 Week 52-03 (from Dec 21)
> Executable Model compiler interprets numeric strings with leading 0 as Octal values
> -----------------------------------------------------------------------------------
>
> Key: DROOLS-5926
> URL: https://issues.redhat.com/browse/DROOLS-5926
> Project: Drools
> Issue Type: Bug
> Components: core engine
> Affects Versions: 7.47.0.Final
> Reporter: Matteo Casalino
> Assignee: Mario Fusco
> Priority: Major
> Attachments: integer-string-interpreted-as-octal-value-with-exec-model.zip
>
>
> The Executable Model compiler interprets numeric strings with leading 0 as Octal values. This behaviour breaks compatibility with the MVEL compiler, which interprets them as decimal.
> For example the following rule will fail to compile with Executable Model, because 800 is not a valid octal value:
> {noformat}
> rule "Test"
> when
> Fact(x == "0800")
> then
> end
> {noformat}
> The following error is given at compilation time:
> {noformat}
> Error Messages:
> Message [id=1, level=ERROR, path=src/main/java/org/build/example/rules/Rules3F1F75C706B36DFEDB0E8DD2A7622BF6RuleMethods0.java, line=23, column=123
> text=integer number too large]
> {noformat}
> The compilation works fine with the MVEL compiler.
--
This message was sent by Atlassian Jira
(v8.13.1#813001)
3 years, 4 months