2 Known Issues and Workarounds

This chapter describes known issues and workarounds for Release 14c (14.1.2.0.0) of Oracle SOA Suite:

Note:

To apply patches noted in this guide, sign in to My Oracle Support and search for the patch numbers to locate and download the patches.

SOA Core Known Issues and Workarounds

Known issues and workarounds for Release 14c (14.1.2.0.0) of SOA Core are:

Secure Mode Disabled by Default in Upgraded Environment

Issue

Bug Number: 36735609

Impacted Releases: 14.1.2.0.0

Impacted Platforms: All

When you upgrade from 12.2.1.4 to 14.1.2.0.0, the secure mode is disabled by default in the upgraded Oracle SOA Suite environment. If you choose to enable secure mode, and as a result, if the protocol, host, and port combination changes, it might cause issues in the existing Oracle SOA Suite flow instances created before the migration.

The existing Oracle SOA Suite instances created before the migration might be impacted in the following cases.
  • If SSL is disabled in the source environment before the migration.
  • If there is an external reference from a SOA composite to another SOA composite WSDL or service using a non-SSL URL, which changes.

    Workaround:

    For this case, the SOA composite must be updated to avoid the usage of hard coded URL using a token or a Load Balancer URL, which remains valid after the upgrade.

  • All the call backs from external systems for the instances created before the upgrade might fail if the call back is made to the SOA instance with an old SOA server URL, which gets modified as part of the upgrade.

    Workaround:

    For this case, you can temporarily enable the non-SSL URL to recover call back of instances. However, this might not work for all the cases. Ensure that there are no open instances expecting call backs from external systems before the upgrade.

The existing Oracle SOA Suite instances created before the migration are not impacted in the following cases.
  • If SSL is enabled in the source environment before the migration, and the protocol, host, and port remain unchanged as part of the upgrade.
  • If the customer is using Oracle HTTP Server or Load Balancer URL as the SOA Server URL, which is used to route calls and if all the external interactions occur through the SOA Server URL (assuming that the URL remains unchanged).

When you switch from non-secure mode to secure mode for the first time, ensure that you update the external client with the new endpoint URL. The call back requests are then routed to the new call back composite endpoint URL. For subsequent switches between secure mode and non-secure mode, the endpoint URL remains unchanged and the call backs function seamlessly.

Restart in High Availability Secure Mode May Fail

Issue

Bug Number: 36733624

Impacted Releases: 14.1.2.0.0

Impacted Platforms: All

When you restart Oracle SOA Suite in high availability and secure mode, the Enterprise Manager Fusion Middleware Control may throw an error. This is an intermittent issue.
  • errorPage.jspx error is thrown when you access Enterprise Manager Fusion Middleware Control (https://hostname:port/em).
  • Failure of Web Server bridge: No backend server available for connection error is thrown when you access soa-infra node (https://hostname:port/soa-infra).

Workaround

None.

Managed Server Created in Secure Clustered Environment Fails to Start

Issue

Bug Number: 36735609

Impacted Releases: 14.1.2.0.0

Impacted Platforms: All

The managed server fails to start when created through remote console in 14.1.2.0.0 and throws "Keystore password was incorrect" error.

Workaround

To create and start a managed server through WebLogic Remote Console, log in to your WebLogic Remote Console and perform the following steps.
  1. Navigate to Edit Tree, under Environment select Servers.
  2. Click New.
  3. Specify a name for the managed server.
  4. From Copy settings from another server drop-down, select an existing managed server.
  5. Click Create.
  6. In Edit Tree, navigate to the newly created server. For example, WLS_SOA5.
  7. In the General tab, update and specify a unique number in the Local Administration Port Override field. Ensure that all the managed servers in the domain on the same machine have unique administration port values (>=1024).
  8. Click Save.

    A message confirms that the changes are added to the shopping cart.

  9. Navigate to the Security tab, and then select Keystores.
  10. In the Keystores tab, specify the Custom Identity Key Store Pass Phrase and Custom Trust Key Store Pass Phrase.
  11. Click Save.

    A message confirms that the changes are added to the shopping cart.

  12. Navigate to the SSL tab and specify the Server Private Key Pass Phrase.
  13. Click Save.

    A message confirms that the changes are added to the shopping cart.

  14. Navigate to the Shopping Cart in the top-right corner of the WebLogic Remote Console window and click Commit Changes.
  15. Start the managed server.

    Sample Command:

    cd /u02/oracle/config/domains/base_domain_1/bin
            ./startManagedWebLogic.sh WLS_SOA5
            https://soaexternal.oraclevcn.com:9002
            -Djavax.net.ssl.trustStore=/u01/oracle/config/keystores/soahost1/trust.p12
             
          -Djavax.net.ssl.trustStorePassword=WElcome1_1_

java.lang.reflect.UndeclaredThrowableException in Deployed Composite Tab

Issue

Bug Number: 36733516

Impacted Releases: 14.1.2.0.0

Impacted Platforms: All

Description of the issue and when it might occur.
  1. Log in to Enterprise Manager Fusion Middleware Control.
  2. Navigate to SOA Infrastructure and select SOA Folder.
  3. Select Default and then navigate to the Deployed Composite tab.

    The following error message is displayed in the browser: Retrieval failed with error java.lang.reflect.UndeclaredThrowableException. Please view the log file for details.

Workaround

None.

Plan Creation in SOAINFRA Fails with JAVA.LANG.ILLEGALSTATEEXCEPTION Error

Issue

Bug Number: 36907731

Impacted Releases: 14.1.2.0.0

Impacted Platforms: All

When you create a plan in SOAINFRA, the plan creation fails with the following error:
JAVA.LANG.ILLEGALSTATEEXCEPTION: CANNOT CONVERT VALUE OF TYPE 'JDK.PROXY7.$PROXY447

This error is caused when you update the transaction timeout value for FacadeFinderBean property in the Oracle WebLogic Remote Console.

  1. Navigate to the Monitoring Tree, and select Deployments.
  2. Select Subdeployments and then choose fabric-ejb.jar.
  3. Further, select FacadeFinderBean and then select Transaction Descriptor.
  4. Update the value of Transaction Timeout field as 600.
  5. Save and Redeploy the SOAINFRA application.

Workaround

You must manually modify the transaction timeout setting in your deployment archive.

  1. Open the fabric-ejb.jar file in your deployment archive.
  2. Increase the transaction timeout value in the META-INF/weblogic-ejb-jar.xml file to a larger value.
  3. Update the jar file.
  4. Restart the managed server that includes SOA infrastructure.

SOA Users with Application Roles Require Special Permissions to Perform Operations in Secure Mode

Issue

Bug Number: 36841322

Impacted Releases: 14.1.2.0.0

Impacted Platforms: All

Users with application roles such as default_composer, SOAOperator, SOAMonitor, and so on, face the following error when performing operations in secure mode.

[test_log] [INFO] [exec] Connecting to
        t3s://phxpffag40.dev2farmphx3.screvenfar02phx.oraclevcn.com:9002 with userid
        partitioncomposeruser ...
      [test_log] [INFO] [exec] <Jul 10, 2024, 6:14:55 AM Pacific Daylight Time> <Info>
          <Security> <BEA-090908> <Using the default WebLogic SSL Wildcard Hostname Verifier
          implementation.> 
      [test_log] [ERROR] [exec] This Exception occurred at Wed Jul 10 06:14:55 PDT
        2024.
      [test_log] [ERROR] [exec] java.lang.SecurityException: User partitioncomposeruser does
          not have access to the administrator port.

Workaround

When secure mode is enabled, all the admin traffic (including MBean Access) is directed to the admin channel. The admin channel is available only to users with an admin role. Thus, to perform operations in secure mode, users with application roles such as default_composer, SOAOperator, SOAMonitor, and so on, require access to AdminChannel. See Users, Groups, And Security Roles. Below are the list of roles and their corresponding access privilege to the admin channel.
  • Admin role : Read & Write Access
  • Monitor role : Read Access
  • App Tester role : Read Access

14.1.2.0.0 Post Upgrade CQs Related to Alerts and KPIs are Deregistered

Issue

Bug Number: 36907731

Impacted Releases: 14.1.2.0.0

Impacted Platforms: All

When you upgrade from 12.2.1.4 to 14.1.2.0.0, the previously registered CQs are deregistered after the upgrade is complete.

Workaround

After the upgrade process, register the CQs so that the KPIs start working.

Unable to Deploy SOA Composite Using the Application Server Connection Created with Hostname as Localhost

Issue

Bug Number: 37226467

Impacted Releases: 14.1.2.0.0

Impacted Platforms: All

If you create an application server connection by providing hostname as the localhost and try to deploy the SOA sample using this connection, the SOA servers are not listed in the deployment wizard.

Workaround

  1. Remove the application server connection created using the localhost.
  2. Remove the system file generated by the JDeveloper while starting the JDeveloper. For example : /home/<userid>/.jdeveloper.
  3. Open the JDeveloper and create the application server connection using the hostname as, for example, myhost.com.
  4. Now, deploy the SOA sample using the application server connection.