Release Notes
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Service Packs are cumulative; Service Pack 1 contains all the fixes made in earlier Service Packs released for WebLogic Server 8.1.
The following sections describe problems that were resolved for the release of WebLogic Server 8.1 Service Pack 1.
All system-created temporary files are now removed when an auto-deployed application is removed while the Administration Server is down. The corresponding configuration and files are cleaned up the next time the Administration Server is started. |
||
Deployment failed for a Web application with a short name, such as
|
||
Duplicate state transition messages were being logged during deployment operations. |
||
A request to deactivate (undeploy) a non-existent JSP using This problem was resolved by modifying the code so that an error message containing information about how to undeploy a single JSP is returned. |
||
Javadoc for the |
||
Javadoc for the |
||
If security constraints on a Web application were modified and the Redeploy button for that Web application (in the Administration Console) was clicked, old security constraints were not removed. Note: This problem did not occur when the Stop and Deploy buttons were clicked instead of the Redeploy button. This problem was resolved by ensuring that the appropriate methods are called to notify the WebLogic Security Service any time the deployment descriptors are read and security might change. |
||
Please review the security advisory information at http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA03-28.01.jsp. |
In This problem was resolved by modifying the code to allow the switching of deployment descriptors at update time. The behavior of the |
||
Any war file containing a |
||
A split-directory EAR could not be deployed with a module-level This problem was resolved by a code fix. For more information about using module-level alt-dd deployment descriptor, see the "Module" table under Application Deployment Descriptor Elements in Developing WebLogic Server Applications. |
||
When an EAR was deployed security roles defined in the This problem was resolved by modifying the code so that all security roles defined in |
||
|
||
The This problem was resolved by adding support to wldeploy for application-level |
||
When specifying preprocessor names on the command line as shown below, any spaces before or after the classname were interpreted as part of the classname, and therefore, an otherwise legitimate class would not be found.
This problem was resolved by ensuring that any such spaces are not interpreted as part of the classname. |
The JVM has a bug whereby it is possible for it to crash while reading an FVD-described class under IIOP. This problem was made worse by a bug in WebLogic Server, whereby it was possible to trivially provoke the problem. This CR refers to the WebLogic bug so that it is no longer trivially possible to cause this crash. However, the bug in the JVM still exists and is only fixed in J2SE 1.4.1_03 (and 1.3.1_09). BEA recommends upgrading to 1.4.1_03 when it becomes available. |
||
Starting in WebLogic Server 8.1, jDriver makes a new JDK 1.4 feature, This problem was resolved by adding more international codesets to work around this JDK bug. The codesets include:
These names are based on JDK 1.4 internationalization. |
When using the Messaging Bridge, non-trusted domains only worked when using synchronous mode communications. This problem has been resolved so that non-trusted domains also work when using asynchronous mode communications. |
||
The This problem occurred because there was no way to obtain the current user for a given thread, and was resolved by adding code that does this. |
||
The ImportPrivateKey utility produced the following message when the wrong private key password was entered: This problem was resolved by modifying the error message to be more appropriate. |
||
The memory usage of the Embedded LDAP server was reduced by decreasing the size of a buffer used for logging. This reduced the total memory usage by 1.8 million bytes. |
||
The SSL Login Timeout attribute was unintentionally dropped from the WebLogic Server Administration Console. Support for the attribute was added back into the Administration Console. |
||
A |
||
The MBean implementations for the WebLogic Authentication provider and LDAP Authentication providers threw a This problem was resolved by removing the |
||
The SSL This problem occurred because the |
||
In 6.x, the t3 protocol sends authenticated user object between clients and servers. In 7.x and higher, the t3 protocol sends authenticated subject object (which extends the authenticated user object) between clients and servers. When a 7.x server communicates with a 6.x client, it converts any authenticated subjects back to authenticated users before sending them to a client. If the client was communicating with both 8.1 servers and 6.1 servers, it received an authenticated user when it created a context to a 6.x server. When it created a context to a 8.x server, it received an authenticated subject. Depending upon which context was created last, an authenticated subject or authenticated user would be sent to the client. If the context to the 8.1 server was created last, then the client identity was an authenticated subject, which would be passed to both the 6.1 and 8.1 servers. When the authenticated subject was passed to the 6.x server, the 8.1 client attempted to convert it into an authenticated user. The code to do this was only intended to be used on the server-side, so it was failing with an exception that eventually caused an assertion failure. When run with a 6.1 client, things worked correctly, as the client always received an authenticated user. This problem was resolved by modifying the code so that conversions from an authenticated subject to an authenticated user can be called on the client side. |
||
Attempts to use one Weblogic Server instance as a LDAP server to another WebLogic Server instance that had a LDAP Authentication provider configured failed. The server acting as the LDAP server threw a This problem was occurred because user and group DNs did not match the hierarchy in the embedded LDAP server for the other domain. This problem was resolved by modifying the code so that an informative error is returned when the credentials supplied are invalid. |
||
This problem was resolved by adding a verification to ensure that the case |
||
|
||
When a WebLogic Server instance was configured for two-way SSL and a WebLogic Identity Assertion provider was configured with the This problem occurred because a token of the wrong type was being passed to the WebLogic Identity Assertion provider. This problem was resolved by ensuring that an array of certificates is passed to the WebLogic Identity Assertion provider. |
||
Please review the security advisory information at http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA03-33.jsp. |
||
When logging into the Administration Console as a |
||
Currently WebLogic Server allows a JCE provider to be configured and used for SSL unless it is determined that the JCE provider is not working with Certicom. If the latter is the case, WebLogic Server adds it to the list of JCE providers known to cause problems. When Certicom discovers that the installed JCE provider is in this list, it ignores it and uses the Jsafe implementation instead. The IBM JCE provider has been added to this list, so it is now ignored by the Certicom SSL implementation, but is still available for other applications. |
When returning a license error, WebLogic Server produces a 403 page that explains the problem. However, this message has a content-type of This problem was resolved by modifying the content-type to be |
||
When using JISAutoDetect encoding (which is used to accept Shift-JIS, EUC-JP and ISO-2022-JP for input streams without code/configuration modification) with an HTTP request, an
This problem occurred when a JSP/servlet called This problem was caused because This problem was resolved by changing to |
||
A new installation of WebLogic Server threw a
Analysis revealed an error in |
||
In WebLogic Server 6.1 SP3 and SP4, servers misdirected output for JSP includes in JSP pages. The problem was resolved with changes to the servlet engine to unify handling of includes, forwards, wrapped-responses, and JSP BodyTags. |
||
According to the JVM specification, the size limit for a method is 64K. Some WebLogic Server customers have JSPs with many body tags, for which the generated Java code exceeded the 64K limit for the The problem was solved by a code change. Now, when an empty |
||
A new capability was added to allow a user to securely access HTTPS resources in a session that was initiated using HTTP, without loss of session data. To enable this new feature, add
This will cause an new secure cookie to be sent to the browser when authenticating via an HTTPS connection. Once set, the session can access other security-constrained HTTPS resources only if the cookie is sent from the browser. Note: If authenticating via plain HTTP, the secure cookie will not be set or required for any HTTPS resources. When accessing a non-protected HTTPS resource, the cookie will not be verified (since it will not have been sent from the browser). This allows the browser to access non-protected HTTPs resources without the user logging in. |
||
As a result, some of double byte characters were garbled because of the mismatch between the character's encoding specified in Analysis revealed an error in the precompiler. The problem was solved with a code fix. |
||
In WebLogic Server SP02, SP03, and SP04, when getting certain POST requests from WAP devices, a Web application encountered a
Analysis revealed that when a charset is associated with the request's The problem was resolved by a code change to set query parameters after they are wiped, so that the data can be read again when a charset is associated with the request's content-type. |
||
There was no timestamp associated with VM thread dumps. This problem was resolved by modifying the code so that a message of the following format is printed before a VM thread dump (applies only to thread dumps taken with the |
||
If |
||
You could not use JSTL tags in JSPs that included Japanese characters. When the JSP was executed, an error starting with the following lines would occur:
This problem occurred because of the following, conflicting conditions: This problem was resolved by modifying the encoding of the byte stream returned from the |
||
When multiple chunked requests were posted to a servlet, a number of the requests failed with a
This problem occurred because the code incorrectly attempted to detect the end of the chunk at the wrong place. This problem was resolved by modifying the code so that it reads until the end of the stream, and detects the end of the chunk correctly. |
||
The |
||
When an HTTP request was proxied by a WebLogic proxy to a cluster using the non-default network channel, the cluster list returned was with respect to the default channel. Thereafter, the plug-in started proxying to the default channel, instead of the original network channel, which may not have been reachable. This problem was resolved by modifying the code so that the dynamic server list is aware of non-default network channels. |
||
While saving changes for This problem was resolved by modifying the code so that the entries are only written to the |
||
Use of Use of the |
||
Including a static resource in a request with no buffer size (for example, |
||
The |
||
This problem was resolved by guarding against this condition. |
||
If an attribute was added to the request using the Web application classloader and if the request gets delegated to a child classloader of the Web application's classloader, upon The Web application container code will now be able to detect that the class was loaded by a parent classloader. If true, it will not deserialize. However, if the child places attributes into the request using You can workaround the second problem by pushing and popping the Web application classloader temporarily for |
||
A This problem was resolved by ensuring that if present, the old deployment model is handled correctly. |
||
ExternalDNSName is deprecated for Network Channels (not servers). Customers should make use of the new Public Address for channels, when a firewall is between a proxy Web server and a cluster. Additionally, customers should use paired channels for HTTP and HTTPS. More information is available in the Firewall Between Proxy Layer and Cluster section of Using WebLogic Server Clusters. |
||
A This problem has been resolved so that single character |
||
When the authentication method associated with a Web application module was invalid and the Web application module was being deployed, no error message was produced, and the authentication method was defaulted to BASIC authentication without notification. This problem was resolved by modifying the code so that a Web application module with an invalid authentication method will not be deployed, and a message indicating the problem will be displayed in the server log file, as well the Administration Console or stdout (depending on how the Web application module is deployed). |
||
If clients did not have session cookies enabled, users were not able to log in to secured Web sites over HTTPS. It was possible to workaround this problem by manually disabling the This problem was resolved by automatically disabling the |
||
WebLogic Server could not locate implicit TLDs when using the split directory feature. This problem occurred because the This problem was resolved by updating the |
||
The |
||
When PersistentStoreType was set to "replicated," customers who had successfully deployed an application received an "Internal Server error" message when attempting to access the application from a browser. In addition, the following exception was logged on the server:
This problem was resolved by modifying the code so that a session with session monitoring enabled could be successfully created. |
||
The |
||
'load-on-startup' JSP files were being compiled by This problem was resolved so that the specified compiler will be used. |
||
The deployment of a Web application with the This problem occurred because when This problem was resolved by modifying the code to properly pass the JSP file to the method that performs validation. |
Converting the
This problem was resolved by modifying the code so that a warning indicating how to obtain the old behavior is displayed:
|
||
Improvements were made to message catalog Detail/Cause/Action information, based upon BEA Support's review of existing System Administration catalog messages. |
||
When using the Security Service Provider Interfaces (SSPIs) to create MBeans to manage your custom security providers, if you attempted to use the same |
||
When starting up a server in an empty directory using the following command, the warning message transposed the Domain Name and Server Name:
The incorrect warning message was similar to:
This problem was resolved by correcting the warning to:
|
||
Security roles for an EAR that were only defined in This problem was resolved with a code fix, and these resources now appear in the Administration Console as expected. |
||
When attempting to log into UDDI after a server reboot, the following exception was thrown:
The exact steps to reproduce this problem are as follows: This problem is due to a change to ensure that access to protected attributes is not allowed unless users are granted the This problem was resolved by modifying the UDDI code to run as an identity that has administrative privileges. This way, it can obtain access to the embedded LDAP password attribute it requires. |
||
For any action that requires reading an encrypted password field (such as attempting to deploy a JDBC connection pool), users of the Administration Console who are granted the
This problem was resolved by modifying the code so that users granted the |
||
A WebLogic Server instance gave an The garbage collector was slow at reclaiming long lists that are freed. Breaking up the linked lists fixed the problem. |
||
In a cluster, a Managed Server attempting to update an Administration Server may have encountered a This problem occurred because of an issue with the registering of This problem was resolved by correcting the processing for registration/unregistration of |
||
The |
||
A warning and a This problem was resolved by modifying the code so that a management error is reported if a server name is not specified when booting an Administration Server. |
||
Domain log messages file resulted in a synchronous network IO, creating the possibility for deadlocks or other issues to arise. This problem was resolved by modifying the code so that messages are now broadcast to the domain log asynchronously. |
||
Customers who attempted to upgrade Web Service clients from WebLogic Server 7.1 to 8.1 may have experienced |
||
A deadlock condition occurred when the server and domain logs were being rotated at the same instant on the Administration Server. (See also CR102849.) This problem was resolved by modifying the code so that messages are now broadcast to the domain log asynchronously. |
||
After the error messages were printed to the domain log file, the server logging service was shut down. If the problem occurred, not all log messages were printed to the server log file. This problem occurred on both the Administration Server and the Managed Server(s). This problem occurred because in selecting the log file to rotate to, a log file that already existed on the file system would be chosen. Therefore, any attempt to rotate would result in a failure. When log files are rotating at a fast rate, it is possible that the file handle is still not released. As such, this problem was resolved by determining the oldest and latest files based on last modified timestamps, and offsetting the rotation size if any failure is encountered. |
||
The For more information, refer to SHUTDOWN and FORCESHUTDOWN in the WebLogic Server Command Reference. |
||
The HTTP log rotation time format was not consistent with the format indicated in the online help. If the format specified in the online help was used, a parse error would be seen the next time the WebLogic Server instance was started, and it would not start. If the expected date format ( |
||
The following exception was displayed during startup of cluster instances after an Open LDAP Authentication provider was added to a default (active) security realm:
This problem was resolved by having the Managed Server obtain the Administration Server's Encrypted Service and perform the proper Encryption. |
||
Exception propagation was not working properly because |
||
Some logging methods were inadvertently publicized. In the WebLogic Server 8.1 API Reference (Javadoc) for the In addition, in the API documentation for the |
![]() |
![]() |
![]() |