[GitHub] [ofbiz-framework] ieugen commented on pull request #354: Improved: Upgrade to gradle 7.3 to support jdk 17 (OFBIZ-12400)

2021-12-14 Thread GitBox


ieugen commented on pull request #354:
URL: https://github.com/apache/ofbiz-framework/pull/354#issuecomment-993652625


   @JacquesLeRoux : I just bought a Windows 10 license and I will try to build 
it there once I set it up. 


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: notifications-unsubscr...@ofbiz.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org




[jira] [Commented] (OFBIZ-12449) [SECURITY] CVE-2021-44228: Apache Log4j2

2021-12-14 Thread ASF subversion and git services (Jira)


[ 
https://issues.apache.org/jira/browse/OFBIZ-12449?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17459101#comment-17459101
 ] 

ASF subversion and git services commented on OFBIZ-12449:
-

Commit e83559d1516f69b127552a58c1e7fb288030abf2 in ofbiz-framework's branch 
refs/heads/release18.12 from Jacques Le Roux
[ https://gitbox.apache.org/repos/asf?p=ofbiz-framework.git;h=e83559d ]

Improved: Apache Log4j2 (OFBIZ-12449)

Updates log4j2 from 2.15.0 to 2.16.0 because of
https://lists.apache.org/thread/d6v4r6nosxysyq9rvnr779336yf0woz4

It's not a security issue, I lazily use OFBIZ-12449 because it can improve
security even if it's not necessary (dixit the announce)


> [SECURITY] CVE-2021-44228: Apache Log4j2
> 
>
> Key: OFBIZ-12449
> URL: https://issues.apache.org/jira/browse/OFBIZ-12449
> Project: OFBiz
>  Issue Type: Sub-task
>  Components: ALL COMPONENTS
>Affects Versions: Trunk
>Reporter: Jacques Le Roux
>Assignee: Jacques Le Roux
>Priority: Blocker
> Fix For: 18.12.03
>
>
> CVE-2021-44228: Apache Log4j2 JNDI features do not protect against attacker 
> controlled LDAP and other JNDI related endpoints:
> https://logging.apache.org/log4j/2.x/security.html
> I'm not sure we are concerned, have no time to check, better safe than 
> sorry...



--
This message was sent by Atlassian Jira
(v8.20.1#820001)


[jira] [Commented] (OFBIZ-12449) [SECURITY] CVE-2021-44228: Apache Log4j2

2021-12-14 Thread ASF subversion and git services (Jira)


[ 
https://issues.apache.org/jira/browse/OFBIZ-12449?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17459094#comment-17459094
 ] 

ASF subversion and git services commented on OFBIZ-12449:
-

Commit 479e222bbb7ecb81fdbf123cc6cfcc10f8dbac4a in ofbiz-framework's branch 
refs/heads/trunk from Jacques Le Roux
[ https://gitbox.apache.org/repos/asf?p=ofbiz-framework.git;h=479e222 ]

Improved: Apache Log4j2 (OFBIZ-12449)

Updates log4j2 from 2.15.0 to 2.16.0 because of
https://lists.apache.org/thread/d6v4r6nosxysyq9rvnr779336yf0woz4

It's not a security issue, I lazily use OFBIZ-12449 because it can improve
security even if it's not necessary (dixit the announce)


> [SECURITY] CVE-2021-44228: Apache Log4j2
> 
>
> Key: OFBIZ-12449
> URL: https://issues.apache.org/jira/browse/OFBIZ-12449
> Project: OFBiz
>  Issue Type: Sub-task
>  Components: ALL COMPONENTS
>Affects Versions: Trunk
>Reporter: Jacques Le Roux
>Assignee: Jacques Le Roux
>Priority: Blocker
> Fix For: 18.12.03
>
>
> CVE-2021-44228: Apache Log4j2 JNDI features do not protect against attacker 
> controlled LDAP and other JNDI related endpoints:
> https://logging.apache.org/log4j/2.x/security.html
> I'm not sure we are concerned, have no time to check, better safe than 
> sorry...



--
This message was sent by Atlassian Jira
(v8.20.1#820001)


[GitHub] [ofbiz-framework] sonarcloud[bot] commented on pull request #415: Improved: Invoice - CommonInvoiceDecorator (OFBIZ-12458)

2021-12-14 Thread GitBox


sonarcloud[bot] commented on pull request #415:
URL: https://github.com/apache/ofbiz-framework/pull/415#issuecomment-993405770


   Kudos, SonarCloud Quality Gate passed!  ![Quality Gate 
passed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/passed-16px.png
 'Quality Gate passed')
   
   
[![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png
 
'Bug')](https://sonarcloud.io/project/issues?id=apache_ofbiz-framework=415=false=BUG)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_ofbiz-framework=415=false=BUG)
 [0 
Bugs](https://sonarcloud.io/project/issues?id=apache_ofbiz-framework=415=false=BUG)
  
   
[![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png
 
'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_ofbiz-framework=415=false=VULNERABILITY)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_ofbiz-framework=415=false=VULNERABILITY)
 [0 
Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_ofbiz-framework=415=false=VULNERABILITY)
  
   [![Security 
Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png
 'Security 
Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_ofbiz-framework=415=false=SECURITY_HOTSPOT)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/security_hotspots?id=apache_ofbiz-framework=415=false=SECURITY_HOTSPOT)
 [0 Security 
Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_ofbiz-framework=415=false=SECURITY_HOTSPOT)
  
   [![Code 
Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png
 'Code 
Smell')](https://sonarcloud.io/project/issues?id=apache_ofbiz-framework=415=false=CODE_SMELL)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_ofbiz-framework=415=false=CODE_SMELL)
 [0 Code 
Smells](https://sonarcloud.io/project/issues?id=apache_ofbiz-framework=415=false=CODE_SMELL)
   
   [![No Coverage 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/NoCoverageInfo-16px.png
 'No Coverage 
information')](https://sonarcloud.io/component_measures?id=apache_ofbiz-framework=415)
 No Coverage information  
   
[![0.0%](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/3-16px.png
 
'0.0%')](https://sonarcloud.io/component_measures?id=apache_ofbiz-framework=415=new_duplicated_lines_density=list)
 [0.0% 
Duplication](https://sonarcloud.io/component_measures?id=apache_ofbiz-framework=415=new_duplicated_lines_density=list)
   
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: notifications-unsubscr...@ofbiz.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org




[GitHub] [ofbiz-framework] PierreSmits opened a new pull request #415: Improved: Invoice - CommonInvoiceDecorator (OFBIZ-12458)

2021-12-14 Thread GitBox


PierreSmits opened a new pull request #415:
URL: https://github.com/apache/ofbiz-framework/pull/415


   Modified: InvoiceScreens.xml
   - moved invoice menus to pre-body decorator section
   - moved label to above menus for the invoice
   - additional cleanup


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: notifications-unsubscr...@ofbiz.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org




[jira] [Updated] (OFBIZ-12458) Invoice - CommonInvoiceDecorator

2021-12-14 Thread Pierre Smits (Jira)


 [ 
https://issues.apache.org/jira/browse/OFBIZ-12458?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Pierre Smits updated OFBIZ-12458:
-
Description: label for invoice is shown below Invoice menus

> Invoice - CommonInvoiceDecorator
> 
>
> Key: OFBIZ-12458
> URL: https://issues.apache.org/jira/browse/OFBIZ-12458
> Project: OFBiz
>  Issue Type: Improvement
>  Components: accounting
>Affects Versions: Trunk
> Environment: label for invoice is shown below Invoice menus
>Reporter: Pierre Smits
>Assignee: Pierre Smits
>Priority: Major
>  Labels: invoice, usability
>
> label for invoice is shown below Invoice menus



--
This message was sent by Atlassian Jira
(v8.20.1#820001)


[jira] [Created] (OFBIZ-12458) Invoice - CommonInvoiceDecorator

2021-12-14 Thread Pierre Smits (Jira)
Pierre Smits created OFBIZ-12458:


 Summary: Invoice - CommonInvoiceDecorator
 Key: OFBIZ-12458
 URL: https://issues.apache.org/jira/browse/OFBIZ-12458
 Project: OFBiz
  Issue Type: Improvement
  Components: accounting
Affects Versions: Trunk
 Environment: label for invoice is shown below Invoice menus
Reporter: Pierre Smits
Assignee: Pierre Smits






--
This message was sent by Atlassian Jira
(v8.20.1#820001)


[GitHub] [ofbiz-framework] sonarcloud[bot] commented on pull request #414: Improved: VIEW permissions BillingAccount (OFBIZ-12457)

2021-12-14 Thread GitBox


sonarcloud[bot] commented on pull request #414:
URL: https://github.com/apache/ofbiz-framework/pull/414#issuecomment-993353921


   Kudos, SonarCloud Quality Gate passed!  ![Quality Gate 
passed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/passed-16px.png
 'Quality Gate passed')
   
   
[![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png
 
'Bug')](https://sonarcloud.io/project/issues?id=apache_ofbiz-framework=414=false=BUG)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_ofbiz-framework=414=false=BUG)
 [0 
Bugs](https://sonarcloud.io/project/issues?id=apache_ofbiz-framework=414=false=BUG)
  
   
[![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png
 
'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_ofbiz-framework=414=false=VULNERABILITY)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_ofbiz-framework=414=false=VULNERABILITY)
 [0 
Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_ofbiz-framework=414=false=VULNERABILITY)
  
   [![Security 
Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png
 'Security 
Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_ofbiz-framework=414=false=SECURITY_HOTSPOT)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/security_hotspots?id=apache_ofbiz-framework=414=false=SECURITY_HOTSPOT)
 [0 Security 
Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_ofbiz-framework=414=false=SECURITY_HOTSPOT)
  
   [![Code 
Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png
 'Code 
Smell')](https://sonarcloud.io/project/issues?id=apache_ofbiz-framework=414=false=CODE_SMELL)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_ofbiz-framework=414=false=CODE_SMELL)
 [0 Code 
Smells](https://sonarcloud.io/project/issues?id=apache_ofbiz-framework=414=false=CODE_SMELL)
   
   [![No Coverage 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/NoCoverageInfo-16px.png
 'No Coverage 
information')](https://sonarcloud.io/component_measures?id=apache_ofbiz-framework=414)
 No Coverage information  
   
[![0.0%](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/3-16px.png
 
'0.0%')](https://sonarcloud.io/component_measures?id=apache_ofbiz-framework=414=new_duplicated_lines_density=list)
 [0.0% 
Duplication](https://sonarcloud.io/component_measures?id=apache_ofbiz-framework=414=new_duplicated_lines_density=list)
   
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: notifications-unsubscr...@ofbiz.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org




[GitHub] [ofbiz-framework] PierreSmits opened a new pull request #414: Improved: VIEW permissions BillingAccount (OFBIZ-12457)

2021-12-14 Thread GitBox


PierreSmits opened a new pull request #414:
URL: https://github.com/apache/ofbiz-framework/pull/414


   Currently, a user with only 'VIEW' permissions, as demonstrated in trunk 
demo with userId = auditor, accessing the billing account screen, sees editable 
fields and/or triggers (to requests) reserved for users with 'CREATE' or 
'UPDATE' permissions.
   See (test with): 
https://demo-trunk.ofbiz.apache.org/accounting/control/EditBillingAccount?billingAccountId=9010
   
   Modified:
   BillingAccountScreens.xml
   - screen EditBillingAccount: restructured to work with view permissions
   - screen CommonBillingAccountDecorator: added label visible to all billing 
account screens
   - additional cleanup
   BillingAccountForms.xml
   - added form BillingAccount for users with VIEW permission
   - additional cleanup


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: notifications-unsubscr...@ofbiz.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org




[jira] [Created] (OFBIZ-12457) VIEW permissions BillingAccount

2021-12-14 Thread Pierre Smits (Jira)
Pierre Smits created OFBIZ-12457:


 Summary: VIEW permissions BillingAccount
 Key: OFBIZ-12457
 URL: https://issues.apache.org/jira/browse/OFBIZ-12457
 Project: OFBiz
  Issue Type: Improvement
  Components: accounting
Affects Versions: Trunk
Reporter: Pierre Smits
Assignee: Pierre Smits


Currently, a user with only 'VIEW' permissions, as demonstrated in trunk demo 
with userId = auditor, accessing the billing account screen, sees editable 
fields and/or triggers (to requests) reserved for users with 'CREATE' or 
'UPDATE' permissions.

See (test with): 
https://demo-trunk.ofbiz.apache.org/accounting/control/EditBillingAccount?billingAccountId=9010



--
This message was sent by Atlassian Jira
(v8.20.1#820001)


[jira] [Updated] (OFBIZ-12423) Font used with Helveticus theme generates CSP violations

2021-12-14 Thread Pierre Smits (Jira)


 [ 
https://issues.apache.org/jira/browse/OFBIZ-12423?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Pierre Smits updated OFBIZ-12423:
-
Summary: Font used with Helveticus theme generates CSP violations  (was: 
Font used with Helvetica theme generates CSP violations)

> Font used with Helveticus theme generates CSP violations
> 
>
> Key: OFBIZ-12423
> URL: https://issues.apache.org/jira/browse/OFBIZ-12423
> Project: OFBiz
>  Issue Type: Bug
>  Components: themes
>Affects Versions: Trunk
>Reporter: Pierre Smits
>Priority: Major
>  Labels: CSP, trust, usability
>
> The font used by the Helvetica theme generates multiple CSP violations 
> according to the inspector in the Firefox browser. See below.
> {code:java}
> Content Security Policy: The page’s settings observed the loading of a 
> resource at inline (“default-src”). A CSP report is being sent. 3 
> EditTaxAuthority
> Content Security Policy: The page’s settings observed the loading of a 
> resource at 
> https://fonts.gstatic.com/s/quicksand/v24/6xKtdSZaM9iE8KbpRA_hK1QNYuDyPw.woff2
>  (“default-src”). A CSP report is being sent. 
> Content Security Policy: The page’s settings observed the loading of a 
> resource at 
> https://fonts.gstatic.com/s/quicksand/v24/6xKtdSZaM9iE8KbpRA_hJVQNYuDyP7bh.woff2
>  (“default-src”). A CSP report is being sent. 
> Content Security Policy: The page’s settings observed the loading of a 
> resource at 
> https://fonts.gstatic.com/s/quicksand/v24/6xKtdSZaM9iE8KbpRA_hJFQNYuDyP7bh.woff2
>  (“default-src”). A CSP report is being sent. 
> Content Security Policy: The page’s settings observed the loading of a 
> resource at 
> https://fonts.gstatic.com/s/quicksand/v24/6xKtdSZaM9iE8KbpRA_hK1QNYuDyPw.woff2
>  (“default-src”). A CSP report is being sent. 
> Content Security Policy: The page’s settings observed the loading of a 
> resource at 
> https://fonts.gstatic.com/s/quicksand/v24/6xKtdSZaM9iE8KbpRA_hJVQNYuDyP7bh.woff2
>  (“default-src”). A CSP report is being sent. 
> Content Security Policy: The page’s settings observed the loading of a 
> resource at 
> https://fonts.gstatic.com/s/quicksand/v24/6xKtdSZaM9iE8KbpRA_hJFQNYuDyP7bh.woff2
>  (“default-src”). A CSP report is being sent. 
> Content Security Policy: The page’s settings observed the loading of a 
> resource at 
> https://fonts.gstatic.com/s/quicksand/v24/6xKtdSZaM9iE8KbpRA_hK1QNYuDyPw.woff2
>  (“default-src”). A CSP report is being sent. 
> Content Security Policy: The page’s settings observed the loading of a 
> resource at 
> https://fonts.gstatic.com/s/quicksand/v24/6xKtdSZaM9iE8KbpRA_hJVQNYuDyP7bh.woff2
>  (“default-src”). A CSP report is being sent. 
> Content Security Policy: The page’s settings observed the loading of a 
> resource at 
> https://fonts.gstatic.com/s/quicksand/v24/6xKtdSZaM9iE8KbpRA_hJFQNYuDyP7bh.woff2
>  (“default-src”). A CSP report is being sent. 
> Content Security Policy: The page’s settings observed the loading of a 
> resource at 
> https://fonts.gstatic.com/s/quicksand/v24/6xKtdSZaM9iE8KbpRA_hK1QNYuDyPw.woff2
>  (“default-src”). A CSP report is being sent. 
> Content Security Policy: The page’s settings observed the loading of a 
> resource at 
> https://fonts.gstatic.com/s/quicksand/v24/6xKtdSZaM9iE8KbpRA_hJVQNYuDyP7bh.woff2
>  (“default-src”). A CSP report is being sent. 
> Content Security Policy: The page’s settings observed the loading of a 
> resource at 
> https://fonts.gstatic.com/s/quicksand/v24/6xKtdSZaM9iE8KbpRA_hJFQNYuDyP7bh.woff2
>  (“default-src”). A CSP report is being sent. 
> Content Security Policy: The page’s settings observed the loading of a 
> resource at 
> https://fonts.gstatic.com/s/quicksand/v24/6xKtdSZaM9iE8KbpRA_hK1QNYuDyPw.woff2
>  (“default-src”). A CSP report is being sent. 
> Content Security Policy: The page’s settings observed the loading of a 
> resource at 
> https://fonts.gstatic.com/s/quicksand/v24/6xKtdSZaM9iE8KbpRA_hJVQNYuDyP7bh.woff2
>  (“default-src”). A CSP report is being sent. 
> Content Security Policy: The page’s settings observed the loading of a 
> resource at 
> https://fonts.gstatic.com/s/quicksand/v24/6xKtdSZaM9iE8KbpRA_hJFQNYuDyP7bh.woff2
>  (“default-src”). A CSP report is being sent. 
> Content Security Policy: The page’s settings observed the loading of a 
> resource at 
> https://fonts.gstatic.com/s/quicksand/v24/6xKtdSZaM9iE8KbpRA_hK1QNYuDyPw.woff2
>  (“default-src”). A CSP report is being sent. 
> Content Security Policy: The page’s settings observed the loading of a 
> resource at 
> https://fonts.gstatic.com/s/quicksand/v24/6xKtdSZaM9iE8KbpRA_hJVQNYuDyP7bh.woff2
>  (“default-src”). A CSP report is being sent. 
> Content Security Policy: The page’s settings observed the loading of a 
> resource at 
> 

[GitHub] [ofbiz-framework] JacquesLeRoux edited a comment on pull request #354: Improved: Upgrade to gradle 7.3 to support jdk 17 (OFBIZ-12400)

2021-12-14 Thread GitBox


JacquesLeRoux edited a comment on pull request #354:
URL: https://github.com/apache/ofbiz-framework/pull/354#issuecomment-993307861


   Hi @ieugen ,
   
   I confirm it works on latest Ubuntu for the trunk with Gradle 7.1.1 as can 
be seen here: https://ci2.apache.org/#/builders/46/builds/14 (gradle wrapper 
step)


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: notifications-unsubscr...@ofbiz.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org




[GitHub] [ofbiz-framework] JacquesLeRoux commented on pull request #354: Improved: Upgrade to gradle 7.3 to support jdk 17 (OFBIZ-12400)

2021-12-14 Thread GitBox


JacquesLeRoux commented on pull request #354:
URL: https://github.com/apache/ofbiz-framework/pull/354#issuecomment-993307861


   Hi @ieugen ,
   
   I confirm it works for the trunk with Gradle 7.1.1 as can be seen here: 
https://ci2.apache.org/#/builders/46/builds/14 (gradle wrapper step)


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: notifications-unsubscr...@ofbiz.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org




[jira] [Comment Edited] (OFBIZ-12456) Migrate Ofbiz bb 0.8 config to 3.2

2021-12-14 Thread Jacques Le Roux (Jira)


[ 
https://issues.apache.org/jira/browse/OFBIZ-12456?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17458967#comment-17458967
 ] 

Jacques Le Roux edited comment on OFBIZ-12456 at 12/14/21, 8:01 AM:


As a test than anything, I checked if it's possible to locally run the 
testXmlRpcAdd service using HTTPS and 8443 port. I simply changed the URL and 
port used in XmlRpcTests::XmlRpcTests and was successful.

The same does not work for testXmlRpcClientAdd and testXmlRpcLocalEngine 
changing the url parameter in engine name="xml-rpc-local. 
This error appears:
bq. Failed to read server's response: java.security.cert.CertificateException: 
No name matching localhost found
That's returned by 
org.apache.xmlrpc.client.XmlRpcStreamTransport.sendRequest(XmlRpcStreamTransport.java:161).
 So out of our possible changes in OFBiz. 

The same errors appears for all XMLRPC services when trying to run the 
servicetests suite
bq. gradlew "ofbiz --test component=service --test suitename=servicetests"

I'll investigate if it's possible to find a solution for our supported 
branches. Apache XMLRPC is no longer maintained: 
https://github.com/advisories/GHSA-6vwp-35w3-xph8. Hence I wonder if we should 
not deprecate, if not remove it alltogether, it in our supported branches...


was (Author: jacques.le.roux):
This is more a test than anything.

I checked it's possible to locally run the testXmlRpcAdd service with HTTPS and 
8443 port. I simply changed the URL and port used in XmlRpcTests::XmlRpcTests.

The same does not work for testXmlRpcClientAdd and testXmlRpcLocalEngine by 
changing the url parameter in engine name="xml-rpc-local. 
This error appears:
bq. Failed to read server's response: java.security.cert.CertificateException: 
No name matching localhost found

That's returned by 
org.apache.xmlrpc.client.XmlRpcStreamTransport.sendRequest(XmlRpcStreamTransport.java:161).
 So out of our possible changes i nOFBiz. 

The same error appears when trying to run the servicetests suite
bq. gradlew "ofbiz --test component=service --test suitename=servicetests"

I'll investigate if it's possible to find a solution for our supported 
branches. Note that Apache XMLRPC is no longer maintained: 
https://github.com/advisories/GHSA-6vwp-35w3-xph8. Hence I wonder if we should 
not deprecate, if not remove it alltogether, it in our supported branches...

> Migrate Ofbiz bb 0.8 config to 3.2
> --
>
> Key: OFBIZ-12456
> URL: https://issues.apache.org/jira/browse/OFBIZ-12456
> Project: OFBiz
>  Issue Type: Task
>  Components: BuildBot
>Reporter: Jacques Le Roux
>Assignee: Jacques Le Roux
>Priority: Critical
>
> This is a clone of INFRA-22279 that says:
> bq. Migrate all Ofbiz configs from ci.apache.org to c2.apache.org upgrading 
> the config from 0.8 to 3.2 and changing uploads of docs to go to 
> nightlies.apache.org/ofbiz instead of ci.apache.org/projects/ofbiz .
> Currently we have an issue with XMLRPC tests with BuildBot. I believe it's 
> because the new BB config does not allow HTTP and/or the port 8080.



--
This message was sent by Atlassian Jira
(v8.20.1#820001)


[jira] [Updated] (OFBIZ-12456) Migrate Ofbiz bb 0.8 config to 3.2

2021-12-14 Thread Jacques Le Roux (Jira)


 [ 
https://issues.apache.org/jira/browse/OFBIZ-12456?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jacques Le Roux updated OFBIZ-12456:

Description: 
This is a clone of INFRA-22279 that says:
bq. Migrate all Ofbiz configs from ci.apache.org to c2.apache.org upgrading the 
config from 0.8 to 3.2 and changing uploads of docs to go to 
nightlies.apache.org/ofbiz instead of ci.apache.org/projects/ofbiz .

Currently we have an issue with XMLRPC tests with BuildBot. I believe it's 
because the new BB config does not allow HTTP and/or the port 8080.

  was:
This is a clone of INFRA-22279 that says:
bq. Migrate all Ofbiz configs from ci.apache.org to c2.apache.org upgrading the 
config from 0.8 to 3.2 and changing uploads of docs to go to 
nightlies.apache.org/ofbiz instead of ci.apache.org/projects/ofbiz .

Currently we have an issue with XMLRPX tests with BuildBot. I believe it's 
because the new BB config does not allow HTTP and/or the port 8080.


> Migrate Ofbiz bb 0.8 config to 3.2
> --
>
> Key: OFBIZ-12456
> URL: https://issues.apache.org/jira/browse/OFBIZ-12456
> Project: OFBiz
>  Issue Type: Task
>  Components: BuildBot
>Reporter: Jacques Le Roux
>Assignee: Jacques Le Roux
>Priority: Critical
>
> This is a clone of INFRA-22279 that says:
> bq. Migrate all Ofbiz configs from ci.apache.org to c2.apache.org upgrading 
> the config from 0.8 to 3.2 and changing uploads of docs to go to 
> nightlies.apache.org/ofbiz instead of ci.apache.org/projects/ofbiz .
> Currently we have an issue with XMLRPC tests with BuildBot. I believe it's 
> because the new BB config does not allow HTTP and/or the port 8080.



--
This message was sent by Atlassian Jira
(v8.20.1#820001)