5.2. Resolved Issues
- BZ-1333177 - ProtobufIndexedFieldProvider may mistakenly report nested fields as unindexed
- Nested indexed fields would sometimes be reported as unindexed even if the metadata says otherwise. This could cause a query to be run fully or partially unindexed, resulting in performance issues.This issue is resolved as of Red Hat JBoss Data Grid 6.6.1.
- BZ-1340827 - ContinuousQueryListener.resultJoining notifications generated by
modify
operations contain the old value not the new one ContinuousQueryListener.resultJoining
notifications generated bymodify
operations contain the old value not the new one. This issue only affected queries without projections.This issue is resolved as of Red Hat JBoss Data Grid 6.6.1.- BZ-1322679 - NullPointerException from HotRodDecoder when topology changed
- When a topology change occurs, such as a node joining the cluster, the connecting client receives
HotRodClientException
andInvalidResponseExceptions
whenever it would execute aget
operation.This issue is resolved as of Red Hat JBoss Data Grid 6.6.1. - BZ-1332272 - NullPointerException at org.infinispan.remoting.transport.jgroups.CommandAwareRpcDispatcher$FutureCollator.futureDone()
- A
NullPointerException
could be thrown during rebalancing. This exception was caused byFutureCollator.futures.get()
querying the map beforeFutureCollator.futures.put()
completed.This issue is resolved as of Red Hat JBoss Data Grid 6.6.1. - BZ-1342365 - Client doesn't retry a non-tx write operation when one of backups is suspected
- When using the Hot Rod Java client with multiple backpus it was possible to have the
Cache.remove()
method fail, without attempting a retry, if one of the backups is no longer available.This issue is resolved as of Red Hat JBoss Data Grid 6.6.1. - BZ-1293575 - Rolling upgrade fails with keySet larger than 2 GB
- Rolling upgrades failed if the key set was larger than 2 GB of memory. The process failed when calling
recordKnownGlobalKeyset
because the keys could not be dumped into a single byte array in the source cluster.This issue is resolved as of Red Hat JBoss Data Grid 6.6.1. - BZ-1324030 - ClassCastException at cache.getWithMetadata(key) in HotRod client during JDG rolling upgrade
- When performing a rolling upgrade a
ClassCastException
was thrown on eachgetWithMetadata()
for every key.This issue was related in theEntryWrapping
logic when reading data from a remote store, and is resolved as of Red Hat JBoss Data Grid 6.6.1. - BZ-1357823 - Expose configuration for the SSLContext protocol in the Hot Rod client
- Previously, the Hot Rod client had the
SSLContext
set with a hardcodedTLS
protocol. This prevented java 7 clients from usingTLSv1.2
, since it was not enabled by default.This has been addressed in JBoss Data Grid 6.6.1 by allowing clients to specify a SSL protocol via theinfinispan.client.hotrod.ssl_protocol
property. To use theTLSv1.2
protocol the following should be defined:infinispan.client.hotrod.ssl_protocol=TLSv1.2
If no protocol is defined JBoss Data Grid defaults to usingTLS
. - BZ-1312186 - Non-threadsafe use of HashSet in AdvancedAsyncCacheLoader
- A
HashSet
was created from theAdvancedAsyncCacheLoader$process
operation, which was then accessed by a series of tasks running in parallel, resulting in the possibility of infinite loops.This issue is resolved as of Red Hat JBoss Data Grid 6.6.1. - BZ-1300133 - JMX attribute evictions is always zero in Statistics and ClusterCacheStats MBeans
- The
evictions
attribute ofStatistics
andClusterCacheStats
components of the Cache MBean returned zero even though some eviction operations have been successfully performed. This issue only affected statistics, not the actual eviction process.This issue is resolved as of Red Hat JBoss Data Grid 6.6.1. - BZ-1303483 - Clear command causing deadlock when lock time out happens
- If a timeout occurred when using the
clear
command the lock it was holding was never released, resulting in a deadlock as the Hot Rod client retried the command on another node.This issue is resolved as of Red Hat JBoss Data Grid 6.6.1. - BZ-1309181 - Lock timeout when registering a queried class to the registry cache
- When starting a series of JBoss Data Grid nodes in parallel, and having each node register a queried class to the
__cluster_registry_cache__
, lock timeout errors were printed.This issue is resolved as of Red Hat JBoss Data Grid 6.6.1. - BZ-1312185 - Double invalidate of invalid Hot Rod connections
- When a Hot Rod operation resulted in an error,
RetryOnFailureOperation
would invalidate the connection twice. Initially in a catch block, and a second time in a finally block. This behavior resulted in theGenericKeyedObjectPool
counts to become unreliable.This issue is resolved as of Red Hat JBoss Data Grid 6.6.1. - BZ-1315393 - Hot Rod client stuck sporadical if a server node is shutting down
- When executing remote transactions as the server is shutting down, the client could become blocked or receive
TimeoutException
errors.This issue is resolved as of Red Hat JBoss Data Grid 6.6.1. - BZ-1306389 - JGRP-2014 FILE_PING destination file name can include File.separator characters
- Previously it was possible for the
FILE_PING
JGroups discovery method to include a file separator, such as/
or\
.This issue is resolved as of Red Hat JBoss Data Grid 6.6.1, as these characters are now replaced with-
. - BZ-1348404 - Coordinator failover is taking longer because VERIFY_SUSPECT runs twice
- When using the Hot Rod Java client the time to recover takes twice as long if the coordinator is killed. This was due to
VERIFY_SUSPECT
executing twice.This issue is resolved as of Red Hat JBoss Data Grid 6.6.1. - BZ-1310583 - TransactionTable should ignore view changes during shutdown
- During shutdown, the
TransactionTable
unregisters itself as a view change listener, but it can still receive view change notifications after it stopped the executor service. When this happens, it causes aRejectedExecutionException
that is eventually logged by JGroups.This issue is resolved as of Red Hat JBoss Data Grid 6.6.1. - BZ-1314084 - protostream.javassist.NotFoundException when using ProtoSchemabuilder to register class
- When configuring JBoss Data Virtualization to connect to a JBoss Data Grid remote cache using the Hot Rod EAP client modules,
ProtoSchemaBuilder
is called, resulting in aNotFoundException
error being thrown.This issue is resolved as of Red Hat JBoss Data Grid 6.6.1. - BZ-1332924 - JCache remote's getCache() should retrieve existing remote caches
- If a client used the JCache API together with the
remote-java-client
library agetCache(cacheName)
would returnNULL
, even if the cache is configured within the server. This was caused by the JCache API not examining remote caches.This issue is resolved as of Red Hat JBoss Data Grid 6.6.1. - BZ-1332936 - If Infinispan is used as a provider for JCache using the remote approach it will not pick up the hotrod-client.properties
- If an application used the JCache API together with the
infinispan-jcache-remote
library then theCacheManager
was created with default properties, as no property files were passed into the constructor.This issue is resolved as of Red Hat JBoss Data Grid 6.6.1. - BZ-1333098 - Add EXTERNAL SASL support to the client to be used with a JDG 7 server
- A JBoss Data Grid 6.x node communicating to a JBoss Data Grid 7 server was unable to authenticate using the
SASL_EXTERNAL
method, as this is a new feature in JBoss Data Grid 7.This issue is resolved for Red Hat JBoss Data Grid 6.6.1 clients. These clients may now use the server's SSL certificateCN
chain to authenticate the user. - BZ-1339313 - Configure Hot Rod client with properties
- Some properties, such as
SSL
,FILE_STORE
, andTRUST_STORE
, were only allowed to be defined programmatically, and could not be placed in thehotrod-client.properties
file.This issue is resolved for Red Hat JBoss Data Grid 6.6.1 clients, and these properties may be defined either programmatically or declaratively. - BZ-1313589 - (CVE-2016-2141) CVE-2016-2141 Authorization bypass in JGroups
- It was found that JGroups did not require necessary headers for encrypt and auth protocols from new nodes joining the cluster. An attacker could use this flaw to bypass security restrictions, and use this vulnerability to send and receive messages within the cluster, leading to information disclosure, message spoofing, or further possible attacks.This issue is resolved as of Red Hat JBoss Data Grid 6.6.1.