[JBoss JIRA] Created: (RF-7322) DropdownMenu: invalid parameters submitted
by Nick Belaevski (JIRA)
DropdownMenu: invalid parameters submitted
------------------------------------------
Key: RF-7322
URL: https://jira.jboss.org/jira/browse/RF-7322
Project: RichFaces
Issue Type: Bug
Components: component-menu
Affects Versions: 3.3.2.CR1
Environment: MyFaces 1.2.6
Reporter: Nick Belaevski
Assignee: Nick Belaevski
Priority: Critical
Fix For: 3.3.2.CR1
<h:form>
<rich:dropDownMenu value="menu">
<rich:menuItem target="_blank" submitMode="server" value="Submit" />
</rich:dropDownMenu>
</h:form>
Leads to: javax.crypto.IllegalBlockSizeException: Input length must be multiple of 8 when decrypting with padded cipher
Also submitted parameters contain number of functions:
2
l
3
a
4
n
5
k
blank
function () {
return /^\s*$/.test(this);
}
camelize
function () {
var parts = this.split("-"), len = parts.length;
if (len == 1) {
return parts[0];
}
var camelized = this.charAt(0) == "-" ? parts[0].charAt(0).toUpperCase() + parts[0].substring(1)
: parts[0];
for (var i = 1; i < len; i++) {
camelized += parts[i].charAt(0).toUpperCase() + parts[i].substring(1);
}
return camelized;
}
capitalize
function () {
return this.charAt(0).toUpperCase() + this.substring(1).toLowerCase();
}
dasherize
function () {
return this.gsub(/_/, "-");
}
empty
function () {
return this == "";
}
endsWith
function (pattern) {
var d = this.length - pattern.length;
return d >= 0 && this.lastIndexOf(pattern) === d;
}
escapeHTML
function () {
var self = arguments.callee;
self.text.data = this;
return self.div.innerHTML;
}
evalJSON
function (sanitize) {
var json = this.unfilterJSON();
try {
if (!sanitize || json.isJSON()) {
return eval("(" + json + ")");
}
} catch (e) {
}
throw new SyntaxError("Badly formed JSON string: " + this.inspect());
}
evalScripts
function () {
return this.extractScripts().map(function (script) {return eval(script);});
}
extractScripts
function () {
var matchAll = new RegExp(Prototype.ScriptFragment, "img");
var matchOne = new RegExp(Prototype.ScriptFragment, "im");
return (this.match(matchAll) || []).map(function (scriptTag) {var result = (scriptTag.match(matchOne
) || ["", ""])[1];result = result.replace(/</, "<").replace(/\s*<!--[^\r\n]*/, "");return result
;});
}
gsub
function (pattern, replacement) {
var result = "", source = this, match;
replacement = arguments.callee.prepareReplacement(replacement);
while (source.length > 0) {
if (match = source.match(pattern)) {
result += source.slice(0, match.index);
result += String.interpret(replacement(match));
source = source.slice(match.index + match[0].length);
} else {
result += source, source = "";
}
}
return result;
}
include
function (pattern) {
return this.indexOf(pattern) > -1;
}
inspect
function (useDoubleQuotes) {
var escapedString = this.gsub(/[\x00-\x1f\\]/, function (match) {var character = String.specialChar
[match[0]];return character ? character : "\\u00" + match[0].charCodeAt().toPaddedString(2, 16);});
if (useDoubleQuotes) {
return "\"" + escapedString.replace(/"/g, "\\\"") + "\"";
}
return "'" + escapedString.replace(/'/g, "\\'") + "'";
}
interpolate
function (object, pattern) {
return (new Template(this, pattern)).evaluate(object);
}
isJSON
function () {
var str = this;
if (str.blank()) {
return false;
}
str = this.replace(/\\./g, "@").replace(/"[^"\\\n\r]*"/g, "");
return /^[,:{}\[\]0-9.\-+Eaeflnr-u \n\r\t]*$/.test(str);
}
j_id2_SUBMIT
_
javax.faces.ViewState
b
parseQuery
function (separator) {
var match = this.strip().match(/([^?#]*)(#.*)?$/);
if (!match) {
return {};
}
return match[1].split(separator || "&").inject({}, function (hash, pair) {if ((pair = pair.split
("="))[0]) {var key = decodeURIComponent(pair.shift());var value = pair.length > 1 ? pair.join("=")
: pair[0];if (value != undefined) {value = decodeURIComponent(value);}if (key in hash) {if (!Object.isArray
(hash[key])) {hash[key] = [hash[key]];}hash[key].push(value);} else {hash[key] = value;}}return hash
;});
}
scan
function (pattern, iterator) {
this.gsub(pattern, iterator);
return String(this);
}
startsWith
function (pattern) {
return this.indexOf(pattern) === 0;
}
strip
function () {
return this.replace(/^\s+/, "").replace(/\s+$/, "");
}
stripScripts
function () {
return this.replace(new RegExp(Prototype.ScriptFragment, "img"), "");
}
stripTags
function () {
return this.replace(/<\/?[^>]+>/gi, "");
}
succ
function () {
return this.slice(0, this.length - 1) + String.fromCharCode(this.charCodeAt(this.length - 1) + 1
);
}
times
function (count) {
return count < 1 ? "" : (new Array(count + 1)).join(this);
}
toArray
function () {
return this.split("");
}
toJSON
function () {
return this.inspect(true);
}
toQueryParams
function (separator) {
var match = this.strip().match(/([^?#]*)(#.*)?$/);
if (!match) {
return {};
}
return match[1].split(separator || "&").inject({}, function (hash, pair) {if ((pair = pair.split
("="))[0]) {var key = decodeURIComponent(pair.shift());var value = pair.length > 1 ? pair.join("=")
: pair[0];if (value != undefined) {value = decodeURIComponent(value);}if (key in hash) {if (!Object.isArray
(hash[key])) {hash[key] = [hash[key]];}hash[key].push(value);} else {hash[key] = value;}}return hash
;});
}
truncate
function (length, truncation) {
length = length || 30;
truncation = Object.isUndefined(truncation) ? "..." : truncation;
return this.length > length ? this.slice(0, length - truncation.length) + truncation : String(this
);
}
underscore
function () {
return this.gsub(/::/, "/").gsub(/([A-Z]+)([A-Z][a-z])/, "#{1}_#{2}").gsub(/([a-z\d])([A-Z])/, "
#{1}_#{2}").gsub(/-/, "_").toLowerCase();
}
unescapeHTML
function () {
var div = new Element("div");
div.innerHTML = this.stripTags();
return div.childNodes[0] ? div.childNodes.length > 1 ? $A(div.childNodes).inject("", function (memo
, node) {return memo + node.nodeValue;}) : div.childNodes[0].nodeValue : "";
}
unfilterJSON
function (filter) {
return this.sub(filter || Prototype.JSONFilter, "#{1}");
}
--
This message is automatically generated by JIRA.
-
If you think it was sent incorrectly contact one of the administrators: https://jira.jboss.org/jira/secure/Administrators.jspa
-
For more information on JIRA, see: http://www.atlassian.com/software/jira
16 years, 7 months
[JBoss JIRA] Created: (RF-7190) rich:fileUpload broken in IE8
by Cody Lerum (JIRA)
rich:fileUpload broken in IE8
-----------------------------
Key: RF-7190
URL: https://jira.jboss.org/jira/browse/RF-7190
Project: RichFaces
Issue Type: Bug
Components: browser compatibility
Affects Versions: 3.3.1
Environment: JBAS 4.2.3GA
SEAM 2.1.1GA
RF 3.3.1 GA
Reporter: Cody Lerum
Attachments: ui.pack.js
I'm seeing an issue where the rich:fileUpload component isn't working under IE8. Seems to be working fine under Chrome, Safari, FF3 and IE7 (as well as IE8 Compatibility Mode). In IE8 the "Add Files" button is grayed out.
The IE8 script debugger says the issue is with an invalid argument at line 8259 character 25 of ui.pack.js
Here is the line:
if(typeof q.addRule==Q){q.addRule(v,r)
My component is used like so.
<rich:modalPanel id="fileUpload" width="420" height="205" keepVisualState="true">
<f:facet name="header">
<h:outputText value="Upload Files" />
</f:facet>
<f:facet name="controls">
<h:panelGroup>
<h:graphicImage value="/img/close.png" styleClass="hidelink" id="hidelinkFile"/>
<rich:componentControl for="fileUpload" attachTo="hidelinkFile" operation="hide" event="onclick"/>
</h:panelGroup>
</f:facet>
<h:form id="fileUploadForm">
<rich:fileUpload fileUploadListener="#{sfopportunity.uploadSFOpportunityFile}"
listHeight="125"
maxFilesQuantity="10"
id="upload"
addControlLabel="Add Files"
immediateUpload="false"
acceptedTypes="pdf, doc, docx, xls, xlsx, txt, csv, jpg, jpeg, gif, bmp, tif, tiff" allowFlash="true" autoclear="true">
<a:support event="onuploadcomplete" reRender="info" oncomplete="#{rich:component('fileUpload')}.hide()"/>
<f:facet name="label">
<h:outputText value="{_KB}KB of {KB}KB uploaded --- {mm}:{ss}" />
</f:facet>
</rich:fileUpload>
</h:form>
</rich:modalPanel>
Attaching the js file as well.
--
This message is automatically generated by JIRA.
-
If you think it was sent incorrectly contact one of the administrators: https://jira.jboss.org/jira/secure/Administrators.jspa
-
For more information on JIRA, see: http://www.atlassian.com/software/jira
16 years, 7 months
[JBoss JIRA] Created: (RF-7417) realworld/search: An error has appeared after some steps in Search
by Inna Shchibrya (JIRA)
realworld/search: An error has appeared after some steps in Search
------------------------------------------------------------------
Key: RF-7417
URL: https://jira.jboss.org/jira/browse/RF-7417
Project: RichFaces
Issue Type: Bug
Components: examples
Affects Versions: 3.3.2.CR1
Environment: All browsers
Local
Reporter: Inna Shchibrya
Assignee: Andrey Markhel
Priority: Minor
1. Open the application.
2. Enter "a,b" in Search input field and click on Find button. --> Search results for all options of "a" keyword are present. It's ok.
3. Unselect "in Shared" check-box and click on Find button. --> The error window with "You must specify where to execute the search" message has appeared. It's ok.
4. Close the error window.
5. Click on "b" in "Keywords:" section. --> An error window has appeared. See attachment.
6. Close the error window and click on any search result. --> The page with selected search result is opened.
Expected result: The application should allow selecting all keywords of the last valid search without the error messages.
--
This message is automatically generated by JIRA.
-
If you think it was sent incorrectly contact one of the administrators: https://jira.jboss.org/jira/secure/Administrators.jspa
-
For more information on JIRA, see: http://www.atlassian.com/software/jira
16 years, 7 months
[JBoss JIRA] Created: (RF-7346) FileUpload failed to work in application with Trinidad.
by Ilya Shaikovsky (JIRA)
FileUpload failed to work in application with Trinidad.
-------------------------------------------------------
Key: RF-7346
URL: https://jira.jboss.org/jira/browse/RF-7346
Project: RichFaces
Issue Type: Bug
Components: component-input
Affects Versions: 3.3.1
Reporter: Ilya Shaikovsky
Assignee: Nick Belaevski
12:06:11,781 WARN [ExceptionFilter] handling uncaught exception
java.lang.NullPointerException
at org.ajax4jsf.request.MultipartRequest.readData(MultipartRequest.java:468)
at org.ajax4jsf.request.MultipartRequest.readNext(MultipartRequest.java:428)
at org.ajax4jsf.request.MultipartRequest.getParam(MultipartRequest.java:807)
at org.ajax4jsf.request.MultipartRequest.getParameter(MultipartRequest.java:870)
at javax.servlet.ServletRequestWrapper.getParameter(ServletRequestWrapper.java:158)
at org.apache.myfaces.trinidadinternal.context.external.ServletRequestParameterMap.getAttribute(Ser
vletRequestParameterMap.java:43)
at org.apache.myfaces.trinidadinternal.context.external.ServletRequestParameterMap.getAttribute(Ser
vletRequestParameterMap.java:31)
at org.apache.myfaces.trinidadinternal.context.external.AbstractAttributeMap.get(AbstractAttributeM
ap.java:73)
at org.apache.myfaces.trinidadinternal.renderkit.core.CoreRenderKit.isPartialRequest(CoreRenderKit.
java:163)
at org.apache.myfaces.trinidadinternal.webapp.TrinidadFilterImpl.doFilter(TrinidadFilterImpl.java:1
50)
at org.apache.myfaces.trinidad.webapp.TrinidadFilter.doFilter(TrinidadFilter.java:92)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:235
)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206)
at org.jboss.seam.servlet.SeamFilter$FilterChainImpl.doFilter(SeamFilter.java:83)
at org.jboss.seam.web.IdentityFilter.doFilter(IdentityFilter.java:40)
at org.jboss.seam.servlet.SeamFilter$FilterChainImpl.doFilter(SeamFilter.java:69)
at org.jboss.seam.web.MultipartFilter.doFilter(MultipartFilter.java:90)
at org.jboss.seam.servlet.SeamFilter$FilterChainImpl.doFilter(SeamFilter.java:69)
at org.jboss.seam.web.ExceptionFilter.doFilter(ExceptionFilter.java:64)
at org.jboss.seam.servlet.SeamFilter$FilterChainImpl.doFilter(SeamFilter.java:69)
at org.jboss.seam.web.RedirectFilter.doFilter(RedirectFilter.java:45)
at org.jboss.seam.servlet.SeamFilter$FilterChainImpl.doFilter(SeamFilter.java:69)
at org.ajax4jsf.webapp.BaseXMLFilter.doXmlFilter(BaseXMLFilter.java:178)
at org.ajax4jsf.webapp.BaseFilter.handleRequest(BaseFilter.java:290)
at org.ajax4jsf.webapp.BaseFilter.processUploadsAndHandleRequest(BaseFilter.java:347)
at org.ajax4jsf.webapp.BaseFilter.doFilter(BaseFilter.java:495)
at org.jboss.seam.web.Ajax4jsfFilter.doFilter(Ajax4jsfFilter.java:56)
at org.jboss.seam.servlet.SeamFilter$FilterChainImpl.doFilter(SeamFilter.java:69)
at org.jboss.seam.web.LoggingFilter.doFilter(LoggingFilter.java:58)
at org.jboss.seam.servlet.SeamFilter$FilterChainImpl.doFilter(SeamFilter.java:69)
at org.jboss.seam.web.HotDeployFilter.doFilter(HotDeployFilter.java:53)
at org.jboss.seam.servlet.SeamFilter$FilterChainImpl.doFilter(SeamFilter.java:69)
at org.jboss.seam.servlet.SeamFilter.doFilter(SeamFilter.java:158)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:235
)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206)
at org.jboss.web.tomcat.filters.ReplyHeaderFilter.doFilter(ReplyHeaderFilter.java:96)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:235
)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206)
at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:230)
at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:175)
at org.jboss.web.tomcat.security.SecurityAssociationValve.invoke(SecurityAssociationValve.java:179)
at org.jboss.web.tomcat.security.JaccContextValve.invoke(JaccContextValve.java:84)
at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:127)
at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:102)
at org.jboss.web.tomcat.service.jca.CachedConnectionValve.invoke(CachedConnectionValve.java:157)
at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:109)
at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:262)
at org.apache.coyote.http11.Http11Processor.process(Http11Processor.java:844)
at org.apache.coyote.http11.Http11Protocol$Http11ConnectionHandler.process(Http11Protocol.java:583)
at org.apache.tomcat.util.net.JIoEndpoint$Worker.run(JIoEndpoint.java:446)
at java.lang.Thread.run(Unknown Source)
12:06:11,781 WARN [ExceptionFilter] exception root cause
12:06:11,781 WARN [ExceptionFilter] running exception handlers
--
This message is automatically generated by JIRA.
-
If you think it was sent incorrectly contact one of the administrators: https://jira.jboss.org/jira/secure/Administrators.jspa
-
For more information on JIRA, see: http://www.atlassian.com/software/jira
16 years, 7 months