Release Notes
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Service Packs are cumulative; Service Pack 2 contains all the fixes made in earlier Service Packs released for WebLogic Server 8.1.
The following sections describe problems that were resolved for the release of WebLogic Server 8.1 Service Pack 2.
If you created a security role using the context-sensitive (right-click) menu item "Define Policies and Roles for individual beans..." and added the security role to the security policy (defined using the same context sensitive menu/form sequence), the desired WebLogic resource could not be used by an external JCom client. The context-sensitive menu items create a scoped role, and clients outside the scoped role could not use the WebLogic resource. Adding a "Define JCom Roles" menu item to the JCom node solved this problem by allowing revision of the scope to include the current client. |
||
Security settings in the Administration Console for Web services did not function properly. A code change removed the ability to set policy and roles for Web services in the Administration Console. |
||
Realms created by the Administration Console lacked the The Administration Console now creates a ULMbean when it creates a new realm. |
||
The cursors created by the Administration Console for listing users and groups caused potential memory leaks when they did not close. |
||
For a three-node cluster on separate Solaris 2.8 machines, the Administration Server threw an InstanceNotFound exception when accessing the default Execute Queue. |
||
After edits to Cookie Max Age Secs using the Administration Console, the value sometimes reverted to the value before the edit. A code change removing a lower limit to the value fixed the problem. |
||
WebLogic Server sometimes displayed the following
|
||
The The Administration Console was still calling the The MBean has been fixed to look for appropriate provider type. |
||
New testing with an Active Directory LDAP uncovered a problem where a call to |
||
Please review the security advisory information at http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA03-28.01.jsp. |
||
If there is only one server in a WebLogic Server domain, the WebLogic Server Administration Console does not display virtual hosts as potential targets during the deployment of a Web application. This was done to save users the extra step of having to select a target when there is only one target. However, this prevented users from deploying a Web application to a virtual host directly. Users could only deploy the Web application to the server and then re-target it to a virtual host. This worked fine for the first Web application, but for the second Web application, an exception was thrown indicating that the context was already in use. For Web applications, the Administration Console now checks for any virtual hosts configured in the domain and displays them as potential targets. As a result of this fix, customers should now be able to target Web applications to a virtual host directly from the Administration Console. If there are no virtual hosts, the Administration Console assumes that the lone server is the target for the Web application, just as it did prior to this fix. |
||
In the This fix causes WebLogic Server to extract the correct charset from the catalog and use that instead of defaulting to UTF-8. As a result of this change, paths are now displayed correctly (without any garbled characters). |
||
Users of the WebLogic Server Administration Console could not delete foreign JMS destinations. A trash can icon (delete) has been added to the foreign JMS destinations table. Users can now delete foreign JMS destinations. |
||
Editing the load order in the WebLogic Server Administration Console caused spaces to be embedded in the This problem occurred because the method The code was changed to remove these extra spaces. As a result of this fix, the extra spaces in the |
||
Please review the security advisory information at http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA03_41.00.jsp. |
Manually doing a lookup and then persisting and caching the handle did not work when the methods were conversational. Changes to serialization and deserialization of the |
||
When starting WebLogic Server as an Windows service using a classpath from a file, the error
was thrown if classpath file is over about 2k length. The problem was solved by correcting an error related to reading the classpath from a file. |
||
The CoreHealthMonitor was holding the ExecuteThreadManager lock while performing significant work, resulting in deadlocks and Administration Console freezes. The code was changed so that CoreHealthMontor now uses ExecuteThreadRuntimeMBean to get a list of stuck threads and avoids logging from all places in the ExecuteThreadManager if ETM lock is held. |
||
Stateful session EJB failover did not work when multiple failovers were required. In a three node cluster a JSP creates or calls a replica-aware stateful session EJB. The remote EJB stub is stored in the http session. After each call to the stateful session EJB the updated EJB stub is also updated in the HTTPsession to reflect any changes for the EJB replica list (primary/secondary). The following call sequence with the same browser window leads to a 2. Making a call to node1, create EJB and store remote in HTTP session (HTTP session replication is enabled) 4. Make a call to the secondary node2, the EJB remote is retrieved from the replicated HTTP session and the call to the EJB works fine. After this EJB call again the remote is stored in the HTTP session. WebLogic Server tries to lookup the EJB on node2 and does not try to use node3 (this should now be the new secondary). The following exception is thrown on node3:
|
||
A memory leak occurred when creating a A code change corrected memory leaks in |
||
The functionality to detect stuck threads in user-configured thread queues was not complete in WebLogic Server 7.0 and its service packs. Thread queues have been reworked and provisions made to identify an application thread from an internal server thread queue. Logic was added to loop through all application thread queues, checking for stuck threads. All application thread queues will now be monitored by the Core Health Monitoring Thread and proper warnings logged. |
||
User code such as servlet |
||
When nodes in a cluster tried to get session information, they were attempting a lookup from a remote server, hence making a remote call that blocked a thread on the local server. When all nodes were doing the lookup under load, the execute thread queues became blocked and no server was in a position to send a response to the remote call (as all local threads were blocked). WebLogic Server now creates the stubs locally to avoid a remote call, until the point where it is necessary. When WebLogic Server makes the remote call, it lands on a separate replication queue on the remote server and the process does not block there. The replication behavior is still unchanged. As a result of this change, WebLogic Server only ensures less contention, avoids a deadlock situation, and reduces the number of remote calls. |
||
Please review the security advisory information at http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA03-35.jsp. |
||
WebLogic Server did not collect timer threads during orderly shutdown. This did not result in any observable problems. Shutting down the ORB now shuts down heartbeat threads. This change should not result in any changed behavior. |
||
This problem occurred because the parallel XA implementation was using a Kernel method, which was assuming that all requests would be executed on a ExecuteThread, and this method was casting the current thread as an ExecuteThread. When the work ran in a user thread on the server side, the exception would be thrown. This problem was resolved by allowing the execution to happen on any thread. |
For a stateless session bean, when the
and the bean was deployed on a cluster, this error was generated:
This problem was resolved by a code fix to ensure that JNDI bindings for non-clustered stubs are not replicated. |
||
Before running a finder method on the BMP beans, the EJB container was not synchronizing the bean state with the database. BMP entity bean handling has been changed to conform to the EJB 2.0 specification. Per the EJB specification, the EJB container now synchronizes the entity bean state by invoking In a transaction, if a finder method is invoked on a BMP bean, it will now trigger the |
||
The This enhancement is made possible by introducing the new element |
||
Dynamic EJB-QL incorrectly passed long arguments as |
||
The container was failing to call |
||
Combining COUNT and EXISTS in a dynamic EJB-QL request resulted in invalid SQL and this exception:
An unnecessary column was being added to the main select list while parsing a subquery. A fix to the parser code solved the problem. |
||
ejbc generated invalid SQL for an |
||
A field optimization was implemented for EJB 1.1 CMP beans, so that fields that are updated, but whose value did not change, are not written to back to the database. The optimization is only done for primitives and immutable objects. |
||
Column version numbers were not updating correctly with Optimistic concurrency enabled, because blind writes were not checked . The code was changed so that blind writes are checked with Optimistic concurrency. |
||
In some bean-managed stateful session beans, an A code change results in the creation of one replacer per passivation request, so that each thread has its own replacer. |
||
It was reported that transaction timeouts on MDBs were not logged. When the time an MDB takes to process a message from a JMS Destination exceeds the transaction timeout limit, the transaction is rolled-back and the message is place backed on the destination for re-delivery, but no transaction-timeout or transaction-rollback messages were logged. This problem was resolved by a code change to the MDListener code to report the transaction timeouts. |
||
The JDBC driver from Microsoft has a limitation whereby for a given result set of rows and columns, the getXXX method can only be called once per row. This limitation applied only if the query columns included a text or image column. WebLogic Server-generated JDBC obtained the key value from a row—for example, using a getLong(1)—and then passed the result set to another routine that read all the column values, including the first, re-executing a getLong(1). This re-execution caused the Microsoft driver to throw an exception. The problem is resolved by a code fix that avoids parsing the primary key columns in the resultSet twice. |
||
EJBs with Bean-Managed Persistence and with concurrency set to exclusive called A code change resolved the problem so that the EJB finds the bean in the cache. |
||
ejbc now runs a compliance check that disallows optimistic concurrency for BMP (bean-managed persistence) beans. Optimistic concurrency is a feature of CMP (container-managed persistence) beans in EJB 2.0. See Choosing a Concurrency Strategy in Programming WebLogic Enterprise JavaBeans. |
||
Getter methods for a EJB 1.1 CMP bean did not call A session EJB called an entity EJB's getter methods. Both EJBs had container managed transaction with transaction attribute set to
|
||
Optimistic concurrency with a version column did not work in combination with bulk updates. (An "ORA-01008: not all variables bound" SQLException was thrown.) This problem was resolved by using the correct bean state tracking variable so the EJB container sets all of the variables in the SQL statement, including the version column. Optimistic concurrency with a version column now works in combination with bulk updates. |
||
The EJB QL query generator could not handle: where target is collection member variable as in:
This problem has been fixed. The EJB QL compiler now properly handles this case. |
||
The The duplicate entries occurred because of an unnecessary call to the |
||
With a CMR one-to-many relationship, in a single transaction, if the bean on the one side was accessed but not changed, the dependency between the database operations was not resolved properly by the container. This resulted in a java.sql.SQLException. This problem was resolved by storing the related bean to the database before checking the state of the current bean. |
||
The EJB container automatically detects situations where an EJB has been changed in a possibly incompatible way since it was last compiled. If such a change is detected, the EJB is automatically recompiled. Previously, any change to a deployment descriptor would result in such recompilation. Some changes, however, are guaranteed not to change the EJB, such as adding whitespace to a deployment descriptor. Such a change should not have caused the EJB to be recompiled. The algorithm used to determine whether an EJB needs to be recompiled now disregards whitespace in deployment descriptors when determining whether the descriptor has changed. Thus, an EJB is not recompiled needlessly when only whitespace is changed in a deployment descriptor. |
||
When using stateful session beans under load with WebLogic Server now unexports the proxy objects on the secondary server. When the Replicated bean receives a There should not be any negative side-effects on existing user applications. |
||
When a MDB and JMS server were targeted to different Weblogic Server instances, the MDB was not receiving messages. This problem occurred because the EJB container was not creating the necessary MDB pool, as they are not co-located. This problem has been fixed. When the MDB's destination is non-distributed and non-migratable, then the co-location rule is not applied. |
||
If an EJB uses container-managed transactions, the EJB specification requires transaction attributes to be set for all EJB methods (excluding methods of If any EJB methods are missing a transaction attribute setting, the default transaction attribute is still used for the method. However, a warning is now issued to alert users to the situation. Users can eliminate the warning by setting an explicit transaction attribute for the affected method(s) in the |
||
For BLOBs, in the generated code, WebLogic Server calls
then problems may occur because WebLogic Server uses
Note that, in versions prior to SP2, the default behavior was to serialize a |
||
Use of the XA driver meant there was no guarantee that WebLogic Server obtained the same connection from the DataSource even when in the same transaction. The Insert was made using one connection and then queried with SELECT SCOPE_IDENTITY using another connection. The SCOPE_IDENTITY produced incorrect results in this case. The auto-key-gen feature for SQLServer2000 required SELECT SCOPE_IDENTITY() to get the value of the auto-gen key. The SCOPE_IDENTITY function can now used in the same scope (that is, in the same stored procedure, function, or batch). The code generation was changed to perform a batched query when the database is SQLServer or SQLServer2000 and AutoKeyGen is turned on. The GenKeyQuery will be fired immediately after the INSERT as follows:
and the cmp-field will be assigned the auto generated key value. This change has no impact or side-effects other than resolving the problem of an incorrect primary key being returned when using SQLServer2000 with AutoKeyGen with a XA driver. |
||
The code to expand the size of the thread pool used for message-driven bean polling was failing due to a change in the "Kernel" APIs. The code for the MDB container was fixed to properly use the kernel APIs. Customers will now be able to deploy more than one MDB that receives messages from a foreign JMS provider with XA and have each MDB successfully receive messages. |
||
The This fix resolves the problem, but customers need to configure a security identity for an MDB. For instructions on how to do this, see Configuring a Security Identity for Message-Driven Beans in Programming WebLogic Enterprise JavaBeans. |
||
When the AutoKey was specified in the
(that is, the generator name is The schema name provided in the If the users specify the
If users specify the
In the second query, WebLogic Server makes use of the |
||
The This problem was resolved by replacing the |
||
The EJB container code was not expecting the "Adaptive Server Enterprise" string as the correct database product name for the Sybase database. It was expecting the "Sybase" string in the product name. Because the WebLogic Sybase JDBC driver sends the database product name as "Adaptive Server Enterprise," this string is now considered in the database type verification code of the cmp descriptors. |
||
An extra AND was appended for ANSI compliant LEFT OUTER JOIN for the following databases: SqlServer2000, Pointbase and DB2. The code was modified not to append AND while generating ANSI compliant LEFT OUTER JOIN for these databases. No side-effects should result from fixing this problem. |
||
The EJB was correctly failing to deploy because the database table it depended on did not exist. The EJB was configured so the table would be automatically created during deployment if it did not exist. However, the server was in production mode and the auto table creation feature is only supported when the server is in development mode, so the table was not created by the EJB container. There was a problem in that the EJB container was not communicating this information properly to customers. A message was added, explaining auto table creation settings will be disregarded when the server is in production mode. In addition, each Managed Server now logs when an EJB deployment fails because of a missing database table. |
||
The When the
|
||
The documentation for the procedure "Configure a Security Identity for a Message-Driven Bean" was missing some steps. This has been corrected, and the updated documentation can be found at http://download.oracle.com/docs/cd/E13222_01/wls/docs81/ejb/message_beans.html#ConfiguringaSecurityIdentityforaMessage-DrivenBean. |
WebLogic Server now provides support for Oracle Virtual Private Databases (VPDs). A VPD is an aggregation of server-enforced, application-defined fine-grained access control, combined with a secure application context in the Oracle 9i database server. For more information, see Programming with Oracle Virtual Private Databases in Programming WebLogic JDBC. |
||
WebLogic jDriver for Oracle/XA did not properly handle the NLS_NUMERIC_CHARACTERS parameter set by an Oracle RDBMS instance. This caused a
The problem did not occur with the non-XA version of WebLogic jDriver for Oracle. This problem was solved with a code fix. |
||
The WebLogic Server jDriver for MS SQLServer can mistakenly accept the |
||
|
||
Using LDAP with SSL caused a This problem occurred because the MuxableSocketLDAP registered itself directly (instead of the SSLFilter for itself) with the socket muxer. Thus, when SSL was used, it was not accessing the right muxable socket instance. This problem was resolved by a change the MuxableSocketLDAP code, so that it registers the SSLFilter with the socket muxer. |
||
A transactional (JTS) JDBC connection could falsely return true for the The cause of the problem was an unnecessary and failure-prone delegation of the The RMI connection object was modified to return the known state. User code now works as expected with |
||
When a JNDI lookup on a JDBC DataSource and then a
|
||
WebLogic Server's Oracle jDriver now understands the non-standard Oracle CURSOR output parameter type, whose numerical value is -10. Customers wanting to use WebLogic Server's Oracle jDriver to accommodate a WebLogic extension will no longer get exceptions. |
||
During EJB deployment time, certain validations are done to verify the table, check if connection pools exist or not, and so on. If any of these validations fail, a This problem occurred because in For the pool associated with the DataSource for the CMP EJB, WebLogic Server now checks that the pool exists in both the connection pool list and the MultiPool list. As a result, customers can use a DataSource mapped to a multipool inside a CMP EJB. |
||
Many of the Sybase JDBC driver's metadata methods, including
Code that is enacted (only) when the initial call to |
||
When running WebLogic Server with the WebLogic Sybase XA JDBC driver, attempts to create a table after suspending the current transaction and starting a new transaction failed, but no exception was thrown. This problem occurred because of cleanup processing WebLogic Server does inside the JDBC layer. When application code calls This problem was resolved by removing the call to |
||
A server thread dump showed a deadlock with one thread calling This problem occurred because A private locking object for the |
||
Oracle-related JDBC operations hung when the This problem occurred because A private locking object for the |
||
Oracle OCI NativeXA does not allow a connection to be used by threads other than the one where it is created. The WebLogic Server connection pooling algorithm assumed that a connection could be used by any thread, as this is the behavior of all other JDBC drivers (including the Oracle Thin Driver). Customers who used Oracle OCI NativeXA with this connection pooling algorithm received an This problem was resolved by pinning the connection to the thread. As a result of this fix, every thread now has its own connection for every connection pool. |
||
Applications with stringent RASP and HA requirements require Pools to be capable of gracefully recovering from failure conditions such as failure of the database server, the machine hosting the database server, network connectivity to the machine hosting the database server, and so on. The above requires applications to put upper bounds on: and require support from the JDBC driver; the BEA WebLogic Type 4 JDBC drivers now provide this support. Item 1 is configurable by simply setting the corresponding driver property in the connection pool definition. Item 2 requires support from WebLogic Server and is exposed via the following pool attributes:
For more information about the BEA WebLogic Type 4 JDBC drivers, see WebLogic Type 4 JDBC Drivers. |
Many parts of WebLogic Server encrypt credentials using a salt. When attempting to reuse the same file with a different salt, a "bad padding exception" (because of a salt mismatch) occurred. This exception was thrown when WebLogic Server was not able to decrypt the password written in a previous incarnation. WebLogic Server now catches this exception and prints a message stating the problem and the corrective action one should take. |
||
Node Manager's shared object code could cause a segment violation if certain code paths were taken while starting a server instance. The same code paths also failed when using IBM's zLinux JDK. These problems were solved with a code fix to Node Manager. |
||
Attempts to start multiple WebLogic Server instances using Node Manager on slower hardware produced the following error:
This problem occurred because Node Manager looked for the PID file before there had been a chance to write to that file. A new property allows users to specify how many times Node Manager will retry reading the PID from the file. Every retry will have a 2 second wait. The property introduced is |
||
If debug was turned on, the password for starting the Managed Server was being printed in plain text in the Node Manager logs. The password is no longer printed in the logs even if debug is turned on. |
||
Please review the security advisory information at http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA03_42.00.jsp. |
[Apache] In WebLogic Server 6.1 SP03, PathTrim and PathPrepend added an unexpected "/" at the end of URL. After PathTrim was applied to the original URL and it results to '/', an extra '/' was appended to the PathPrepend variable. |
||
(NSAPI) Plug-in did not read the Analysis revealed a problem in |
||
(Apache) the Apache plug-in did not read |
||
(NSAPI) A thread in the plug-in could obtain a critical lock for a long duration (5 minutes by default, or configured using |
||
(Apache) Because Hewlett-Packard ceased to support the HP Apache-based Web Server version 1.3.x, WebLogic Server removed the Apache 1.3 plug-in for HP. |
||
(ISAPI) The ISAPI plug-in logged an unhandled exception error in the Windows event log when it encountered a modified cookie. The event text began with the line:
This problem was solved with a code fix to the ISAPI plug-in. |
||
(NSAPI) The plug-in that shipped with WebLogic Server used the The code was fixed to include both the |
||
(Apache) The plug-in ignored configuration parameters that contained regular expressions other than wildcard characters (
|
||
(Apache) Not passing back the status from the Java command made it impossible to tell if the command executed successfully or not. The line: |
||
Please review the security advisory information at http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA03_39.00.jsp. |
||
(All) As of WebLogic Server 6.1 SP6, 7.0 SP5, and 8.1 SP2, the WebLogic plug-ins are now certified to proxy to any version of WebLogic, including 5.1. |
After creating a domain with one Administration Server and one Managed Server, enabling the This problem was resolved by updates to the |
||
The default value for backup minutes is now correctly calculated and reported under domain > Domain Wide Security Settings -> Embedded LDAP in the Administration Console. |
||
Construction of an The problem was resolved by a code change ensuring the propagation of errors. |
||
The The |
||
In previous releases of WebLogic Server, it was not possible to make a secure connection to a third-party XML server because the XML server did not support the SSL protocol. The following workaround is provided: 2. Create an Java authenticator class according to the Java specification. This authenticator should obtain a surname and password for the used to connect to the XML server. |
||
SSL initialization failed with a
A modification to the |
||
The WebLogic Server Administration Console hung while attempting to list the users and groups in an Active Directory. This problem occurred because the connection was hanging with LDAP results, causing a problem in iterating those results. The code was modified to release the connection with search results and was upgraded to new Netscape open source API. As a result of this change, the listing of users and groups in the Administration Console no longer hangs. |
||
Please review the security advisory information at http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA03-28.01.jsp. |
||
When multiple Authorization providers were installed, you could not define security policies on Web applications. |
||
If you created a user that contained special characters such as "
The user This problem was resolved by ensuring that special characters are escaped when retrieving the users from the Embedded LDAP server. This allows the user names with special characters to be created and displayed correctly. User names with special characters can now be successfully created and displayed by the console. |
||
Clients sending a request to a WebLogic Server instance were not able to parse the returned SOAP response. This problem occurred because WebLogic Server was using a static variable to hold the prefix that the runtime uses for the SOAP envelope. The output stream now picks up the prefix for the SOAP namespace from the stream. WebLogic Server looks for the namespace currently in use by the SOAP stack. There is also a SecureSoapOutputStream constructor that allows customers to specify a preferred SOAP envelope namespace. |
||
The identity assertion naming convention ( Filtering these headers as identity assertion headers avoided a Client-Cert identity assertion error. |
||
The Node Manager properties file is always created in the The problem was solved by a code change to create the Node Manager properties file in the directory specified by |
||
When using This problem occurred because |
||
The ServerIron monitoring product sends a request to the SSL port during a server health check. During this health check, the SSLIOConect and related SSL objects were not released, causing an out-of-memory error. |
||
The MedRec sample application has been enhanced to support identity assertion in the LoginModule. |
||
Performance regressed from WebLogic Server 7.0 when using SSL Web Services because socket pooling was disabled. In WebLogic Server 7.0, SSLSockets were pooled in the Web Service runtime, in the thread safe socket pool that is a singleton shared across all invocations in the VM. In cases where SSL Client Authentication is used, this may lead to a problem: If there are multiple clients invoking the service within the application with different identities, the second client will possibly get the SSL Socket from the first client—this connection on this socket carries the first client identity. This is potentially a severe problem when using the client in a server setting—a transaction may occur while authenticated under the wrong identity, and this may lead to unprivileged users executing privileged actions. The shared socket pool has been replaced with a single socket that is shared only for a single client in the HTTPS binding. The socket sharing is disabled by default, however it can be enabled using either the system property or the new API provided. The default operational characteristics out of the box remain the same as WebLogic Server 8.1, with socket sharing disabled. Turning this feature on allows multiple serial invocations to share the same socket, but has the following properties that users must understand and accept:
|
||
Please review the security advisory information at http://dev2dev/resourcelibrary/advisoriesnotifications/BEA03_43.00.jsp. |
||
Please review the security advisory information at http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA03_42.00.jsp. |
||
WebLogic Server Version 8.1 uses the SUN JDK 1.4 which does not support RSA keys larger than 2048 bits. Therefore, certificates with 4096 bit keys can not be used. |
When multiple elements in WebLogic Server's |
||
The
|
||
Setting a JMSServer's Store property via the
resulted in the following exception:
This problem was partially fixed by checking when setting an attribute that is a |
||
Some load-balancing applications such as Cisco Loadbalancer became unable to use session stickiness because of a change to the SessionID format. A new server startup flag, |
||
Exception propagation was not working properly because |
||
An exploded Web application was allowed to load classes from the docroot. This inappropriate classloading behavior has been disallowed. |
||
On A code change resolved this problem so that member names containing commas are now accepted. |
||
The log handlers assumed that only A |
||
During server startup in a cluster on WebLogic Platform, the following error occurred: <Jun 18, 2003 4:46:53 PM EDT> <Error> <Management> <BEA-141009> <Error occurred in the file distribution servlet while processing request type "wl_ear_resource_request", java.net.SocketException: Software caused connection abort: socket write error. java.net.SocketException: Software caused connection abort: socket write error at java.net.SocketOutputStream.socketWrite0(Native Method) at java.net.SocketOutputStream.socketWrite(SocketOutputStream.java:92) at java.net.SocketOutputStream.write(SocketOutputStream.java:136) at weblogic.servlet.internal.ChunkUtils.writeChunkNoTransfer(ChunkUtils.java:263) at weblogic.servlet.internal.ChunkUtils.writeChunks(ChunkUtils.java:228) at weblogic.servlet.internal.ChunkOutput.flush(ChunkOutput.java:296) at weblogic.servlet.internal.ChunkOutput.checkForFlush(ChunkOutput.java:371) at weblogic.servlet.internal.ChunkOutput.write(ChunkOutput.java:241) at weblogic.servlet.internal.ChunkOutputWrapper.write(ChunkOutputWrapper.java:114) at weblogic.servlet.internal.ServletOutputStreamImpl.write(ServletOutputStreamImpl.java:171) at weblogic.management.servlet.FileDistributionServlet.returnInputStream (FileDistributionServlet.java:568) at weblogic.management.servlet.FileDistributionServlet.doGetEarResourceR equest(FileDistributionServlet.java:787) at weblogic.management.servlet.FileDistributionServlet.doGet(FileDistributionServlet.java:500) at javax.servlet.http.HttpServlet.service(HttpServlet.java:740) at javax.servlet.http.HttpServlet.service(HttpServlet.java:853) at weblogic.servlet.internal.ServletStubImpl$ServletInvocationAction.run (ServletStubImpl.java:1053) at weblogic.servlet.internal.ServletStubImpl.invokeServlet(ServletStubImpl.java:387) at weblogic.servlet.internal.ServletStubImpl.invokeServlet(ServletStubImpl.java:305) at weblogic.servlet.internal.WebAppServletContext$ServletInvocationActio n.run(WebAppServletContext.java:6310) at weblogic.security.acl.internal.AuthenticatedSubject.doAs(AuthenticatedSubject.java:317) at weblogic.security.service.SecurityManager.runAs(SecurityManager.java:118) at weblogic.servlet.internal.WebAppServletContext.invokeServlet(WebAppServletContext.java:3622) at weblogic.servlet.internal.ServletRequestImpl.execute(ServletRequestImpl.java:2564) at weblogic.kernel.ExecuteThread.execute(ExecuteThread.java:197) at weblogic.kernel.ExecuteThread.run(ExecuteThread.java:170) |
||
For any |
||
In WebLogic Server 8.1 and below, Weblogic MBeans ( The |
||
Three commands— For As a result, usernames and passwords can be omitted from ant scripts, as long as an administrator has created the user config/key files (for |
||
A This problem occurred because WebLogic Server MBeans were not yet initialized, and the encryption service relied on getting the salt from these MBeans. The |
||
There were multiple issues associated with this CR. 1. 2. Whenever a 3. For read-only operations that required access to Embedded LDAP, WebLogic Server would always attempt to obtain this information from the Administration Server's LDAP. Whenever the Administration Server was down, exceptions were thrown in different layers. 4. Even after these problems were fixed, the response was slow when the Administration Server was down (what took about 30 seconds would have taken 3-5 seconds if the Administration Server was running). This was because WebLogic Server attempted to initialize the |
||
A startup class failed to access the local instance's MBeanHome. It failed with the following error message when the startup class was deployed with
This problem occurred because WebLogic Server 8.1 SP1 could not get the local instance's |
The JSSEAdapter was pending a change to JDK 1.4, and therefore was not complete. The JSSEAdapter has been brought up to parity with the WLSSLAdapter for strict checking, verbose and localIdentity features. As a result of this change, the JSSEAdapter now provides the same functionality as the WLSSLAdapter. |
||
A client running behind a firewall needed to set properties on a Web service stub. The problem was resolved by the introduction of two new properties, |
||
The Web Service test page did not support the Support for testing the |
||
Some properties set on the stub were not copied into the MessageContext. After a code change, WebLogic Server now supports the following usecases: |
||
If you used a .NET C# client to access a WebLogic Server Web service and requested two strings returned, the first a result and the second an in/out parameter, the order of the strings returned was incorrect. The second string returned as the result, and the in/out parameter returned as null. A code change ensures that the first accessor returned is the return value. |
||
The command-line flag This error message was wrong, since the flag was being recognized by WebLogic Server. This message has been removed. |
||
A Web Service whose method contains multi-byte characters could not be accessed from the testing page in the Administration Console. (The client application can, however, access the Web Service.) This problem occurred because a request parameter was being parsed using ISO-8859-1 encoding. It was resolved by modifying the code to set a character encoding before parsing a request parameter. |
||
This problem has been resolved by adding support for Note: |
||
Running with
This behavior was exhibited in both "rpc" and "document" style Web services. Running with Microsoft's A code change stopped the generation of output messages in one-way bindings, resolving the problem. |
||
Namespaces of attributes are now written out if |
||
The servicegen task did not support the "mergewithexistingws" attribute, resulting in a build failure. This problem occurred because no The following method is now part of the
|
||
When casting an
This problem was caused by an incomplete feature addition. The |
||
Exceptions were always being printed to Logging on the client side now only happens if the system property |
||
Passing
|
||
When the Web Service runtime attempted to find out the encoding of the XML represented by the Source object, its underlying stream was read and not reset. |
||
Clients failed with an This problem occurred because the argument used for creating a new array instance was null because of missing size information. For a SOAP array of an unspecified size, objects are now stored in a list first, and then the array is created. |
||
A document or literal Web Service involving arrays generated a SOAP response message whereby the namespaces were not being applied properly. This resulted in .Net clients to ignore some of the data. WebLogic Server ant tasks ( This problem was resolved by modifying the code to write proper namespaces to the generated codec. |
||
When iterating through the child nodes of the SOAP header, empty text nodes were casted to Text nodes are now discarded. However, there was another change required to make the |
||
In the A code change causes the method to use the length of the body, instead of the end, resolving the problem. |
||
A |
||
Customers could not specify a Customers can now specify any supported
|
||
WebLogic Server did not provide a timeout to a Web Service invocation on the client-side. To timeout a Web Service invocation on the client-side in WebLogic Server SP 2:
Note: In WebLogic Server 8.1 SP1, |
||
When using Mixed style is only supported on the client-side but not on the server-side. As a result of this change, Note: Prior to this change, |
||
WebLogic Server 8.1 supported an old version of the SOAP 1.2 specification. In WebLogic Server 8.1 SP2, support for the latest SOAP1.2 specification has been added. |
||
A
|
||
While calling the
an exception starting with the following lines was thrown:
This exception has been eliminated, and the correct |
||
The following classes were missing from
|
||
A class required to process client-side JAX-RPC handlers ( The required class was added to |
||
Static clients did not throw the correct exception when multiple exceptions are thrown from a EJB method. For example, a static client for the method signature:
always threw The static client now throws the exception which matches the one thrown from server-side. |
||
If an authenticated subject has been set on the message context, it is now used for invoking the backend component. |
||
In WebLogic Server 8.1 SP1, an MDB is published as a Web Service using
The |
||
The If the |
||
Clientgen failed to compile a generated class for an extended type if the base type had a different namespace. This problem occurred because base classes from different packages were not being imported. Base class names are now generated with complete package names. |
||
A code fix resolved this problem. The fix also requires |
||
WebLogic Server generated a MIME header with the string
This problem was resolved by modifying WebLogic Server to generate the correct " |
![]() ![]() |
![]() |
![]() |