From jvanek at redhat.com Tue Dec 5 16:11:28 2017 From: jvanek at redhat.com (Jiri Vanek) Date: Tue, 5 Dec 2017 17:11:28 +0100 Subject: [rfc] added preprocessing to rust launchers Message-ID: This patch is adding the possiblity to pas classapth and simialr to the rust luncher. If there is enybody knowing the better way, and especially how to get rid of this duplicated (triplicated x triplicated) snipept of + MAIN_CLASS=net.sourceforge.jnlp.runtime.Boot ;\ + BIN_LOCATION=$(bindir)/$(javaws).sh ;\ + PROGRAM_NAME=$(javaws) ;\ + $(edit_launcher_script) < $< > $@ And turn it into function of call(name, suffix) < $< > $@, that would be awesome. I tried many times, various ways, but if I get rid of those three lines, I always duplicated targets:( J. -- Jiri Vanek Senior QE engineer, OpenJDK QE lead, Mgr. Red Hat Czech jvanek at redhat.com M: +420775390109 -------------- next part -------------- A non-text attachment was scrubbed... Name: preprocessedRustLaunchers.patch Type: text/x-patch Size: 2026 bytes Desc: not available URL: From andrew at icedtea.classpath.org Tue Dec 5 20:14:12 2017 From: andrew at icedtea.classpath.org (andrew at icedtea.classpath.org) Date: Tue, 05 Dec 2017 20:14:12 +0000 Subject: /hg/release/icedtea7-2.6: Bump to 2.6.12. Message-ID: changeset 484938987004 in /hg/release/icedtea7-2.6 details: http://icedtea.classpath.org/hg/release/icedtea7-2.6?cmd=changeset;node=484938987004 author: Andrew John Hughes date: Tue Dec 05 19:25:17 2017 +0000 Bump to 2.6.12. Upstream changes: - Bump to icedtea-2.6.12 - PR3497: AArch64: Adapt to 8002074: Support for AES on SPARC - S6475361: Attempting to remove help menu from java.awt.MenuBar throws NullPointerException - S6637288: Add OCSP support to PKIX CertPathBuilder implementation - S6854712: Revocation checking enhancements (JEP-124) - S6904367: (coll) IdentityHashMap is resized before exceeding the expected maximum size - S7015157: String "Tabular Navigation" should be rephrased for avoiding mistranslation - S7115744: Do not call File::deleteOnExit in security tests - S7126011: ReverseBuilder.getMatchingCACerts may throws NPE - S7147336: clarification on warning of keytool -printcrl - S7162687: enhance KDC server availability detection - S7176627: CertPath/jep124/PreferCRL_SoftFail test fails (Could not determine revocation status) - S7195409: CertPath/CertPathValidatorTest/KeyParamsInheritanceTest fails with NullPointerException - S7196382: PKCS11 provider should support 2048-bit DH - S7197672: There are issues with shared data on windows - S7199939: DSA 576 and 640 bit keys fail when initializing for No precomputed parameters - S8002074: Support for AES on SPARC - S8005408: KeyStore API enhancements - S8006863: javadoc cleanup for 8005408 - S8006946: PKCS12 test failure due to incorrect alias name - S8006951: Avoid storing duplicate PKCS12 attributes - S8006994: Cleanup PKCS12 tests to ensure streams get closed - S8007483: attributes are ignored when loading keys from a PKCS12 keystore - S8007967: Infinite loop can happen in sun.security.provider.certpath.SunCertPathBuilder.depthFirstSearchForward() - S8010112: NullPointerException in sun.security.provider.certpath.CertId() - S8012900: CICO ignores AAD in GCM mode (with refactoring from 6996769) - S8015571: OCSP validation fails if ocsp.responderCertSubjectName is set - S8016252: More defensive HashSet.readObject - S8025215: jdk8 l10n resource file translation update 4 - S8026943: SQE test jce/Global/Cipher/SameBuffer failed - S8027575: b113 causing a lot of memory allocation and regression for wls_webapp_atomics - S8029659: Keytool, print key algorithm of certificate or key entry - S8029788: Certificate validation - java.lang.ClassCastException - S8031825: OCSP client can't find responder cert if it uses a different subject key id algorithm than responderID - S8033117: PPC64: Adapt to 8002074: Support for AES on SPARC - S8035623: [parfait] JNI exception pending in jdk/src/windows/native/sun/windows/awt_Font.cpp - S8035640: JNU_CHECK_EXCEPTION should support c++ JNI syntax - S8049312: AES/CICO test failed with on several modes - S8050374: More Signature tests - S8057810: New defaults for DSA keys in jarsigner and keytool - S8062552: Support keystore type detection for JKS and PKCS12 keystores - S8068427: Hashtable deserialization reconstitutes table with wrong capacity - S8068881: SIGBUS in C2 compiled method weblogic.wsee.jaxws.framework.jaxrpc.EnvironmentFactory$SimulatedWsdlDefinitions. - S8075484: SocketInputStream.socketRead0 can hang even with soTimeout set - S8077670: sun/security/krb5/auto/MaxRetries.java may fail with BindException - S8078331: Upgrade JDK to use LittleCMS 2.7 - S8079129: NullPointerException in PKCS#12 Keystore in PKCS12KeyStore.java - S8087144: sun/security/krb5/auto/MaxRetries.java fails with Retry count is -1 less - S8136534: Loading JKS keystore using non-null InputStream results in closed stream - S8149411: PKCS12KeyStore cannot extract AES Secret Keys - S8153146: sun/security/krb5/auto/MaxRetries.java failed with timeout - S8157561: Ship the unlimited policy files in JDK Updates - S8158517: Minor optimizations to ISO10126PADDING - S8164846: CertificateException missing cause of underlying exception - S8165543: Better window framing - S8165751: NPE hit with java.security.debug=provider - S8169026: Handle smartcard clean up better - S8169966: Larger AWT menus - S8170218: Improved Font Metrics - S8171252: Improve exception checking - S8171261: Stability fixes for lcms - S8171319: keytool should print out warnings when reading or generating cert/cert req using weak algorithms - S8173853: IllegalArgumentException in java.awt.image.ReplicateScaleFilter - S8174109: Better queuing priorities - S8174966: Unreferenced references - S8175940: More certificate subject checking - S8176536: Improved algorithm constraints checking - S8176751: Better URL connections - S8177569: keytool should not warn if signature algorithm used in cacerts is weak - S8178714: PKIX validator nameConstraints check failing after change 8175940 - S8178794: Correct Kerberos ticket grants - S8179084: HotSpot VM fails to start when AggressiveHeap is set - S8179101: Improve algorithm constraints implementation - S8179423: 2 security tests started failing for JDK 1.6.0 u161 b05 - S8179564: Missing @bug for tests added with JDK-8165367 - S8179998: Clear certificate chain connections - S8180024: Improve construction of objects during deserialization - S8180711: Better invokespecial checks - S8181048: Refactor existing providers to refer to the same constants for default values for key length - S8181100: Better Base Exceptions - S8181323: Better timezone processing - S8181327: Better X processing - S8181370: Better keystore handling - S8181432: Better processing of unresolved permissions - S8181597: Process Proxy presentation - S8181612: More stable connection processing - S8181692: Update storage implementations - S8182879: Add warnings to keytool when using JKS and JCEKS - S8183028: Improve CMS header processing - S8184673: Fix compatibility issue in AlgorithmChecker for 3rd party JCE providers - S8184682: Upgrade compression library - S8184937: LCMS error 13: Couldn't link the profiles - S8185039: Incorrect GPL header causes RE script to miss swap to commercial header for licensee source bundle - S8185040: Incorrect GPL header causes RE script to miss swap to commercial header for licensee source bundle - S8185778: 8u151 L10n resource file update - S8185845: Add SecurityTools.java test library - S8186503: sun/security/tools/jarsigner/DefaultSigalg.java failed after backport to JDK 6/7/8 - S8186533: 8u151 L10n resource file update md20 - S8191137: keytool fails to format resource strings for keys for some languages after JDK-8171319 - S8191840: Update localizations with positional arguments following JDK-8191137 - S8191845: [TEST_BUG] Too many new-lines in backport of WeakAlg test ChangeLog: 2017-12-05 Andrew John Hughes Bump to 2.6.12. * Makefile.am, (JDK_UPDATE_VERSION): Bump to 161. (CORBA_CHANGESET): Update to icedtea-2.6.12. (JAXP_CHANGESET): Likewise. (JAXWS_CHANGESET): Likewise. (JDK_CHANGESET): Likewise. (LANGTOOLS_CHANGESET): Likewise. (OPENJDK_CHANGESET): Likewise. (CORBA_SHA256SUM): Likewise. (JAXP_SHA256SUM): Likewise. (JAXWS_SHA256SUM): Likewise. (JDK_SHA256SUM): Likewise. (LANGTOOLS_SHA256SUM): Likewise. (OPENJDK_SHA256SUM): Likewise. (install-data-local): Install policy JAR files into new policy directories. * NEWS: Updated. * configure.ac: Bump to 2.6.12. * hotspot.map.in: Update to icedtea-2.6.12. * patches/boot/ecj-diamond.patch: Regenerated. Add new instances in com.sun.corba.se.impl.io.ObjectStreamClass, com.sun.xml.internal.ws.util.exception.JAXWSExceptionBase, java.io.ObjectStreamClass, java.security.cert.CertificateRevokedException, java.security.KeyStore, java.security.UnresolvedPermission, sun.security.pkcs.SignerInfo, sun.security.pkcs12.PKCS12KeyStore, sun.security.provider.certpath.AdjacencyList, sun.security.provider.certpath.Builder, sun.security.provider.certpath.CollectionCertStore, sun.security.provider.certpath.DistributionPointFetcher, sun.security.provider.certpath.ForwardBuilder, sun.security.provider.certpath.IndexedCollectionCertStore, sun.security.provider.certpath.OCSPResponse, sun.security.provider.certpath.PKIXCertPathValidator, sun.security.provider.certpath.PKIX, sun.security.provider.certpath.PKIXRevocationChecker, sun.security.provider.certpath.PolicyChecker, sun.security.provider.certpath.PolicyNodeImpl, sun.security.provider.certpath.ReverseBuilder, sun.security.provider.certpath.ReverseState, sun.security.provider.certpath.RevocationChecker, sun.security.provider.certpath.SunCertPathBuilder, sun.security.provider.certpath.X509CertPath, sun.security.tools.keytool.Main, sun.security.util.DisabledAlgorithmConstraints and sun.security.util.SignatureFileVerifier * patches/boot/ecj-multicatch.patch: Regenerated. Add new cases in com.sun.corba.se.impl.io.ObjectStreamClass, java.io.ObjectStreamClass, sun.security.provider.certpath.CertStoreHelper, sun.security.provider.certpath.DistributionPointFetcher, sun.security.provider.certpath.OCSP, sun.security.provider.certpath.OCSPResponse, sun.security.provider.certpath.PKIXCertPathValidator, sun.security.provider.certpath.RevocationChecker, sun.security.provider.certpath.SunCertPathBuilder, sun.security.provider.certpath.URICertStore and sun.security.provider.KeyStoreDelegator. * patches/boot/ecj-stringswitch.patch: Add new cases in sun.security.util.DisabledAlgorithmConstraints, sun.security.provider.certpath.CertStoreHelper and sun.security.provider.certpath.RevocationChecker. * patches/boot/ecj-trywithresources.patch: Add new cases in sun.security.krb5.KdcComm and sun.security.tools.keytool.Main. * patches/boot/ecj-underscored_literals.patch: Add new case in sun.net.ftp.impl.FtpClient. * remove-intree-libraries.sh.in: Remove ZLIB_VERSION and its use in the ZIP_SRC path, as the source tree path is now unversioned. diffstat: ChangeLog | 77 + Makefile.am | 35 +- NEWS | 102 +- configure.ac | 2 +- hotspot.map.in | 2 +- patches/boot/ecj-diamond.patch | 2653 +++++++++++++++++--------- patches/boot/ecj-multicatch.patch | 1230 +++++++---- patches/boot/ecj-stringswitch.patch | 185 +- patches/boot/ecj-trywithresources.patch | 52 + patches/boot/ecj-underscored_literals.patch | 13 + remove-intree-libraries.sh.in | 3 +- 11 files changed, 2881 insertions(+), 1473 deletions(-) diffs (truncated from 8218 to 500 lines): diff -r 3e43308fe36f -r 484938987004 ChangeLog --- a/ChangeLog Thu Nov 23 19:56:36 2017 +0000 +++ b/ChangeLog Tue Dec 05 19:25:17 2017 +0000 @@ -1,3 +1,80 @@ +2017-12-05 Andrew John Hughes + + Bump to 2.6.12. + * Makefile.am, + (JDK_UPDATE_VERSION): Bump to 161. + (CORBA_CHANGESET): Update to icedtea-2.6.12. + (JAXP_CHANGESET): Likewise. + (JAXWS_CHANGESET): Likewise. + (JDK_CHANGESET): Likewise. + (LANGTOOLS_CHANGESET): Likewise. + (OPENJDK_CHANGESET): Likewise. + (CORBA_SHA256SUM): Likewise. + (JAXP_SHA256SUM): Likewise. + (JAXWS_SHA256SUM): Likewise. + (JDK_SHA256SUM): Likewise. + (LANGTOOLS_SHA256SUM): Likewise. + (OPENJDK_SHA256SUM): Likewise. + (install-data-local): Install policy JAR files into new + policy directories. + * NEWS: Updated. + * configure.ac: Bump to 2.6.12. + * hotspot.map.in: Update to icedtea-2.6.12. + * patches/boot/ecj-diamond.patch: + Regenerated. Add new instances in + com.sun.corba.se.impl.io.ObjectStreamClass, + com.sun.xml.internal.ws.util.exception.JAXWSExceptionBase, + java.io.ObjectStreamClass, + java.security.cert.CertificateRevokedException, + java.security.KeyStore, java.security.UnresolvedPermission, + sun.security.pkcs.SignerInfo, sun.security.pkcs12.PKCS12KeyStore, + sun.security.provider.certpath.AdjacencyList, + sun.security.provider.certpath.Builder, + sun.security.provider.certpath.CollectionCertStore, + sun.security.provider.certpath.DistributionPointFetcher, + sun.security.provider.certpath.ForwardBuilder, + sun.security.provider.certpath.IndexedCollectionCertStore, + sun.security.provider.certpath.OCSPResponse, + sun.security.provider.certpath.PKIXCertPathValidator, + sun.security.provider.certpath.PKIX, + sun.security.provider.certpath.PKIXRevocationChecker, + sun.security.provider.certpath.PolicyChecker, + sun.security.provider.certpath.PolicyNodeImpl, + sun.security.provider.certpath.ReverseBuilder, + sun.security.provider.certpath.ReverseState, + sun.security.provider.certpath.RevocationChecker, + sun.security.provider.certpath.SunCertPathBuilder, + sun.security.provider.certpath.X509CertPath, + sun.security.tools.keytool.Main, + sun.security.util.DisabledAlgorithmConstraints and + sun.security.util.SignatureFileVerifier + * patches/boot/ecj-multicatch.patch: + Regenerated. Add new cases in + com.sun.corba.se.impl.io.ObjectStreamClass, + java.io.ObjectStreamClass, + sun.security.provider.certpath.CertStoreHelper, + sun.security.provider.certpath.DistributionPointFetcher, + sun.security.provider.certpath.OCSP, + sun.security.provider.certpath.OCSPResponse, + sun.security.provider.certpath.PKIXCertPathValidator, + sun.security.provider.certpath.RevocationChecker, + sun.security.provider.certpath.SunCertPathBuilder, + sun.security.provider.certpath.URICertStore and + sun.security.provider.KeyStoreDelegator. + * patches/boot/ecj-stringswitch.patch: + Add new cases in + sun.security.util.DisabledAlgorithmConstraints, + sun.security.provider.certpath.CertStoreHelper and + sun.security.provider.certpath.RevocationChecker. + * patches/boot/ecj-trywithresources.patch: + Add new cases in sun.security.krb5.KdcComm and + sun.security.tools.keytool.Main. + * patches/boot/ecj-underscored_literals.patch: + Add new case in sun.net.ftp.impl.FtpClient. + * remove-intree-libraries.sh.in: + Remove ZLIB_VERSION and its use in the ZIP_SRC path, + as the source tree path is now unversioned. + 2017-10-16 Andrew John Hughes PR3470: Hotspot object_alloc tapset uses HeapWordSize incorrectly diff -r 3e43308fe36f -r 484938987004 Makefile.am --- a/Makefile.am Thu Nov 23 19:56:36 2017 +0000 +++ b/Makefile.am Tue Dec 05 19:25:17 2017 +0000 @@ -1,22 +1,22 @@ # Dependencies -JDK_UPDATE_VERSION = 151 +JDK_UPDATE_VERSION = 161 BUILD_VERSION = b01 COMBINED_VERSION = $(JDK_UPDATE_VERSION)-$(BUILD_VERSION) -CORBA_CHANGESET = a7f8705b50f5 -JAXP_CHANGESET = 968b46df5f0e -JAXWS_CHANGESET = 3e70a6a17fa9 -JDK_CHANGESET = 8563ea7f9be7 -LANGTOOLS_CHANGESET = e24f25323b84 -OPENJDK_CHANGESET = f53c56dda663 - -CORBA_SHA256SUM = 5a21448c8bb7c13acacd92423fce72ea88cbb20f1828ded35a2a113b5be3280c -JAXP_SHA256SUM = 73a0e3fa08d5ea944d7a59f153648a78a1f7f5da19d0c0a5f7cf4012658e2041 -JAXWS_SHA256SUM = e5a17d7d1a991a23d64b80f5fabb4000cf8eed9bb744eeba6ae4c0f6d767c4a6 -JDK_SHA256SUM = 79a61166781e0f27477879d3ea90350b45f47a4360a8325ba814b976864ef88d -LANGTOOLS_SHA256SUM = e37c671c765de82c19b94fd43b738dbd4d4a7ba23e18903037ba670cc1f85792 -OPENJDK_SHA256SUM = 05d0ea6a60a442eec7bff798840248fd113ab1ad6b89c91bc52e1695ab2d156d +CORBA_CHANGESET = e759d9a6a7b2 +JAXP_CHANGESET = 1981a623381f +JAXWS_CHANGESET = 40c37fd3e5cb +JDK_CHANGESET = a499de02da5a +LANGTOOLS_CHANGESET = b87dbe0db6aa +OPENJDK_CHANGESET = 7d977b31457d + +CORBA_SHA256SUM = 1e433c3ff7c640c2dd1a0288af7b39531052ed09ee24ab8515bc16ea1db21bde +JAXP_SHA256SUM = 859719afde1e29fcd1349d78050873c3da159e6bd8f9041d6742395ba9d19548 +JAXWS_SHA256SUM = 2fb7fb74c19a0c870a17edcebeeca4bb82113209b36d98864ec29e398e6c4d27 +JDK_SHA256SUM = e77af4a7f719887df7664d1470041d7b7c7bc40cb808e1f5ac5c7b8efe370961 +LANGTOOLS_SHA256SUM = 0cdb357aa069b37a4a5a4ab5afb24474f1d3e441702aa26352a446c69c67315a +OPENJDK_SHA256SUM = 82e25192b2062f2974af06c434b995dcc185ae93cd78fb057cd1be169d1d0e97 DROP_URL = http://icedtea.classpath.org/download/drops @@ -3324,8 +3324,11 @@ $(DESTDIR)${prefix}/jre/lib/security $(INSTALL_DATA) $(BUILD_SDK_DIR)/jre/lib/security/blacklisted.certs \ $(DESTDIR)${prefix}/jre/lib/security - for files in $(BUILD_SDK_DIR)/jre/lib/security/*.jar; do \ - $(call install_file,$${files},$(DESTDIR)${prefix}/jre/lib/security,$(INSTALL_DATA)) ; \ + for policies in limited unlimited; do \ + ${mkinstalldirs} $(DESTDIR)${prefix}/jre/lib/security/policy/$${policies} ; \ + for files in $(BUILD_SDK_DIR)/jre/lib/security/policy/$${policies}/*.jar; do \ + $(call install_file,$${files},$(DESTDIR)${prefix}/jre/lib/security/policy/$${policies},$(INSTALL_DATA)); \ + done ; \ done for items in $(BUILD_SDK_DIR)/jre/lib/zi/*; do \ cp -RP $${items} $(DESTDIR)${prefix}/jre/lib/zi ; \ diff -r 3e43308fe36f -r 484938987004 NEWS --- a/NEWS Thu Nov 23 19:56:36 2017 +0000 +++ b/NEWS Tue Dec 05 19:25:17 2017 +0000 @@ -14,8 +14,107 @@ New in release 2.6.12 (2017-10-XX): +* Security fixes + - S8165543: Better window framing + - S8169026, CVE-2017-10274: Handle smartcard clean up better + - S8169966: Larger AWT menus + - S8170218: Improved Font Metrics + - S8171252: Improve exception checking + - S8171261: Stability fixes for lcms + - S8174109, CVE-2017-10281: Better queuing priorities + - S8174966, CVE-2017-10285: Unreferenced references + - S8175940: More certificate subject checking + - S8176751, CVE-2017-10295: Better URL connections + - S8178794, CVE-2017-10388: Correct Kerberos ticket grants + - S8179101, CVE-2017-10193: Improve algorithm constraints implementation + - S8179998, CVE-2017-10198: Clear certificate chain connections + - S8180024: Improve construction of objects during deserialization + - S8180711, CVE-2017-10346: Better invokespecial checks + - S8181100, CVE-2017-10350: Better Base Exceptions + - S8181323, CVE-2017-10347: Better timezone processing + - S8181327, CVE-2017-10349: Better X processing + - S8181370, CVE-2017-10345: Better keystore handling + - S8181432, CVE-2017-10348: Better processing of unresolved permissions + - S8181597, CVE-2017-10357: Process Proxy presentation + - S8181612, CVE-2017-10355: More stable connection processing + - S8181692, CVE-2017-10356: Update storage implementations + - S8183028, CVE-2016-10165: Improve CMS header processing + - S8184682, CVE-2016-9840, CVE-2016-9841, CVE-2016-9842, CVE-2016-9843: Upgrade compression library +* Import of OpenJDK 7 u161 build 0 + - S6475361: Attempting to remove help menu from java.awt.MenuBar throws NullPointerException + - S6637288: Add OCSP support to PKIX CertPathBuilder implementation + - S6854712: Revocation checking enhancements (JEP-124) + - S6904367: (coll) IdentityHashMap is resized before exceeding the expected maximum size + - S7015157: String "Tabular Navigation" should be rephrased for avoiding mistranslation + - S7115744: Do not call File::deleteOnExit in security tests + - S7126011: ReverseBuilder.getMatchingCACerts may throws NPE + - S7147336: clarification on warning of keytool -printcrl + - S7162687: enhance KDC server availability detection + - S7176627: CertPath/jep124/PreferCRL_SoftFail test fails (Could not determine revocation status) + - S7195409: CertPath/CertPathValidatorTest/KeyParamsInheritanceTest fails with NullPointerException + - S7196382: PKCS11 provider should support 2048-bit DH + - S7197672: There are issues with shared data on windows + - S7199939: DSA 576 and 640 bit keys fail when initializing for No precomputed parameters + - S8002074: Support for AES on SPARC + - S8005408: KeyStore API enhancements + - S8006863: javadoc cleanup for 8005408 + - S8006946: PKCS12 test failure due to incorrect alias name + - S8006951: Avoid storing duplicate PKCS12 attributes + - S8006994: Cleanup PKCS12 tests to ensure streams get closed + - S8007483: attributes are ignored when loading keys from a PKCS12 keystore + - S8007967: Infinite loop can happen in sun.security.provider.certpath.SunCertPathBuilder.depthFirstSearchForward() + - S8010112: NullPointerException in sun.security.provider.certpath.CertId() + - S8012900: CICO ignores AAD in GCM mode (with refactoring from 6996769) + - S8015571: OCSP validation fails if ocsp.responderCertSubjectName is set + - S8016252: More defensive HashSet.readObject + - S8025215: jdk8 l10n resource file translation update 4 + - S8026943: SQE test jce/Global/Cipher/SameBuffer failed + - S8027575: b113 causing a lot of memory allocation and regression for wls_webapp_atomics + - S8029659: Keytool, print key algorithm of certificate or key entry + - S8029788: Certificate validation - java.lang.ClassCastException + - S8031825: OCSP client can't find responder cert if it uses a different subject key id algorithm than responderID + - S8033117: PPC64: Adapt to 8002074: Support for AES on SPARC + - S8035623: [parfait] JNI exception pending in jdk/src/windows/native/sun/windows/awt_Font.cpp + - S8049312: AES/CICO test failed with on several modes + - S8050374: More Signature tests + - S8057810: New defaults for DSA keys in jarsigner and keytool + - S8062552: Support keystore type detection for JKS and PKCS12 keystores + - S8068427: Hashtable deserialization reconstitutes table with wrong capacity + - S8068881: SIGBUS in C2 compiled method weblogic.wsee.jaxws.framework.jaxrpc.EnvironmentFactory$SimulatedWsdlDefinitions. + - S8075484, PR3474, RH1490713: SocketInputStream.socketRead0 can hang even with soTimeout set + - S8077670: sun/security/krb5/auto/MaxRetries.java may fail with BindException + - S8079129: NullPointerException in PKCS#12 Keystore in PKCS12KeyStore.java + - S8087144: sun/security/krb5/auto/MaxRetries.java fails with Retry count is -1 less + - S8136534: Loading JKS keystore using non-null InputStream results in closed stream + - S8149411: PKCS12KeyStore cannot extract AES Secret Keys + - S8153146: sun/security/krb5/auto/MaxRetries.java failed with timeout + - S8157561: Ship the unlimited policy files in JDK Updates + - S8158517: Minor optimizations to ISO10126PADDING + - S8164846: CertificateException missing cause of underlying exception + - S8165751: NPE hit with java.security.debug=provider + - S8171319: keytool should print out warnings when reading or generating cert/cert req using weak algorithms + - S8173853: IllegalArgumentException in java.awt.image.ReplicateScaleFilter + - S8176536: Improved algorithm constraints checking + - S8177569: keytool should not warn if signature algorithm used in cacerts is weak + - S8178714: PKIX validator nameConstraints check failing after change 8175940 + - S8179423: 2 security tests started failing for JDK 1.6.0 u161 b05 + - S8179564: Missing @bug for tests added with JDK-8165367 + - S8181048: Refactor existing providers to refer to the same constants for default values for key length + - S8182879: Add warnings to keytool when using JKS and JCEKS + - S8184673: Fix compatibility issue in AlgorithmChecker for 3rd party JCE providers + - S8184937: LCMS error 13: Couldn't link the profiles + - S8185039: Incorrect GPL header causes RE script to miss swap to commercial header for licensee source bundle + - S8185040: Incorrect GPL header causes RE script to miss swap to commercial header for licensee source bundle + - S8185778: 8u151 L10n resource file update + - S8185845: Add SecurityTools.java test library + - S8186503: sun/security/tools/jarsigner/DefaultSigalg.java failed after backport to JDK 6/7/8 + - S8186533: 8u151 L10n resource file update md20 + - S8191137: keytool fails to format resource strings for keys for some languages after JDK-8171319 + - S8191840: Update localizations with positional arguments following JDK-8191137 + - S8191845: [TEST_BUG] Too many new-lines in backport of WeakAlg test +* Import of OpenJDK 7 u151 build 1 + - S8035640: JNU_CHECK_EXCEPTION should support c++ JNI syntax * Backports - - S8075484, PR3474, RH1490713: SocketInputStream.socketRead0 can hang even with soTimeout set - S8138745, PR3465, RH1484399: Implement ExitOnOutOfMemory and CrashOnOutOfMemory in HotSpot - S8185164, PR3433: GetOwnedMonitorInfo() returns incorrect owned monitor - S8188030, PR3460, RH1484079: AWT java apps fail to start when some minimal fonts are present @@ -24,6 +123,7 @@ - PR3480, RH1486025: ECC and NSS JVM crash * AArch64 port - S8145438, PR3443, RH1482244: Guarantee failures since 8144028: Use AArch64 bit-test instructions in C2 + - PR3497: AArch64: Adapt to 8002074: Support for AES on SPARC New in release 2.6.11 (2017-08-08): diff -r 3e43308fe36f -r 484938987004 configure.ac --- a/configure.ac Thu Nov 23 19:56:36 2017 +0000 +++ b/configure.ac Tue Dec 05 19:25:17 2017 +0000 @@ -1,4 +1,4 @@ -AC_INIT([icedtea], [2.6.12pre01], [distro-pkg-dev at openjdk.java.net]) +AC_INIT([icedtea], [2.6.12], [distro-pkg-dev at openjdk.java.net]) AM_INIT_AUTOMAKE([1.9 tar-pax foreign]) AM_MAINTAINER_MODE([enable]) AC_CONFIG_FILES([Makefile]) diff -r 3e43308fe36f -r 484938987004 hotspot.map.in --- a/hotspot.map.in Thu Nov 23 19:56:36 2017 +0000 +++ b/hotspot.map.in Tue Dec 05 19:25:17 2017 +0000 @@ -1,2 +1,2 @@ # version type(drop/hg) url changeset sha256sum -default drop http://icedtea.classpath.org/download/drops/icedtea7/@ICEDTEA_RELEASE@ 9777e52ab513 f5d5fbba6a8109aaa7d76a000293e3537c2228a2a9a4a5a1e8d0ebe145e39a84 +default drop http://icedtea.classpath.org/download/drops/icedtea7/@ICEDTEA_RELEASE@ 7fe1098f101e dd3d1441d0b20ae2c45211cb9d296537e24a47a9048c34e6568e8fba201684cb diff -r 3e43308fe36f -r 484938987004 patches/boot/ecj-diamond.patch --- a/patches/boot/ecj-diamond.patch Thu Nov 23 19:56:36 2017 +0000 +++ b/patches/boot/ecj-diamond.patch Tue Dec 05 19:25:17 2017 +0000 @@ -1,6 +1,6 @@ diff -Nru openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/encoding/CachedCodeBase.java openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/encoding/CachedCodeBase.java ---- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/encoding/CachedCodeBase.java 2017-08-03 17:03:27.000000000 +0100 -+++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/encoding/CachedCodeBase.java 2017-08-03 23:28:06.555896022 +0100 +--- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/encoding/CachedCodeBase.java 2017-11-30 03:00:25.000000000 +0000 ++++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/encoding/CachedCodeBase.java 2017-12-02 04:30:06.060323180 +0000 @@ -58,7 +58,7 @@ private CorbaConnection conn; @@ -10,9 +10,30 @@ public static synchronized void cleanCache( ORB orb ) { synchronized (iorMapLock) { +diff -Nru openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/io/ObjectStreamClass.java openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/io/ObjectStreamClass.java +--- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/io/ObjectStreamClass.java 2017-12-02 04:48:58.225985027 +0000 ++++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/io/ObjectStreamClass.java 2017-12-02 04:49:49.017161985 +0000 +@@ -481,7 +481,7 @@ + while (cls != fnscl) { + ProtectionDomain pd = cls.getProtectionDomain(); + if (pd != null) { +- if (pds == null) pds = new HashSet<>(); ++ if (pds == null) pds = new HashSet(); + pds.add(pd); + } + cls = cls.getSuperclass(); +@@ -489,7 +489,7 @@ + // that's not supposed to happen + // make a ProtectionDomain with no permission. + // should we throw instead? +- if (pds == null) pds = new HashSet<>(); ++ if (pds == null) pds = new HashSet(); + else pds.clear(); + pds.add(noPermissionsDomain()); + break; diff -Nru openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/io/OutputStreamHook.java openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/io/OutputStreamHook.java ---- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/io/OutputStreamHook.java 2017-08-03 17:03:27.000000000 +0100 -+++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/io/OutputStreamHook.java 2017-08-03 23:28:06.555896022 +0100 +--- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/io/OutputStreamHook.java 2017-11-30 03:00:25.000000000 +0000 ++++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/io/OutputStreamHook.java 2017-12-02 04:30:06.064323116 +0000 @@ -50,7 +50,7 @@ */ private class HookPutFields extends ObjectOutputStream.PutField @@ -23,8 +44,8 @@ /** * Put the value of the named boolean field into the persistent field. diff -Nru openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/orb/ORBImpl.java openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/orb/ORBImpl.java ---- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/orb/ORBImpl.java 2017-08-03 17:03:27.000000000 +0100 -+++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/orb/ORBImpl.java 2017-08-03 23:28:06.555896022 +0100 +--- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/orb/ORBImpl.java 2017-11-30 03:00:25.000000000 +0000 ++++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/orb/ORBImpl.java 2017-12-02 04:30:06.064323116 +0000 @@ -1315,7 +1315,7 @@ protected void shutdownServants(boolean wait_for_completion) { Set oaset; @@ -35,8 +56,8 @@ for (ObjectAdapterFactory oaf : oaset) diff -Nru openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/orbutil/threadpool/ThreadPoolImpl.java openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/orbutil/threadpool/ThreadPoolImpl.java ---- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/orbutil/threadpool/ThreadPoolImpl.java 2017-08-03 17:03:27.000000000 +0100 -+++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/orbutil/threadpool/ThreadPoolImpl.java 2017-08-03 23:28:06.555896022 +0100 +--- openjdk-boot.orig/corba/src/share/classes/com/sun/corba/se/impl/orbutil/threadpool/ThreadPoolImpl.java 2017-11-30 03:00:25.000000000 +0000 ++++ openjdk-boot/corba/src/share/classes/com/sun/corba/se/impl/orbutil/threadpool/ThreadPoolImpl.java 2017-12-02 04:30:06.064323116 +0000 @@ -108,7 +108,7 @@ private ThreadGroup threadGroup; @@ -56,8 +77,8 @@ for (WorkerThread wt : copy) { diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/lib/ExsltSets.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/lib/ExsltSets.java ---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/lib/ExsltSets.java 2017-08-03 17:03:27.000000000 +0100 -+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/lib/ExsltSets.java 2017-08-03 23:28:06.555896022 +0100 +--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/lib/ExsltSets.java 2017-11-30 03:00:25.000000000 +0000 ++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/lib/ExsltSets.java 2017-12-02 04:30:06.064323116 +0000 @@ -192,7 +192,7 @@ NodeSet dist = new NodeSet(); dist.setShouldCacheNodes(true); @@ -68,8 +89,8 @@ for (int i = 0; i < nl.getLength(); i++) { diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xslt/EnvironmentCheck.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xslt/EnvironmentCheck.java ---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xslt/EnvironmentCheck.java 2017-08-03 17:03:27.000000000 +0100 -+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xslt/EnvironmentCheck.java 2017-08-03 23:28:06.555896022 +0100 +--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xslt/EnvironmentCheck.java 2017-11-30 03:00:25.000000000 +0000 ++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xslt/EnvironmentCheck.java 2017-12-02 04:30:06.064323116 +0000 @@ -220,7 +220,7 @@ public Map getEnvironmentHash() { @@ -188,8 +209,8 @@ jarVersions.put(new Long(440237), "xalan.jar from xalan-j_1_2"); jarVersions.put(new Long(436094), "xalan.jar from xalan-j_1_2_1"); diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/CastExpr.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/CastExpr.java ---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/CastExpr.java 2017-08-03 17:03:27.000000000 +0100 -+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/CastExpr.java 2017-08-03 23:28:06.555896022 +0100 +--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/CastExpr.java 2017-11-30 03:00:25.000000000 +0000 ++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/CastExpr.java 2017-12-02 04:30:06.064323116 +0000 @@ -51,7 +51,7 @@ /** * Legal conversions between internal types. @@ -200,8 +221,8 @@ static { // Possible type conversions between internal types diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/FunctionCall.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/FunctionCall.java ---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/FunctionCall.java 2017-08-03 17:03:27.000000000 +0100 -+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/FunctionCall.java 2017-08-03 23:28:06.555896022 +0100 +--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/FunctionCall.java 2017-11-30 03:00:25.000000000 +0000 ++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/FunctionCall.java 2017-12-02 04:30:06.064323116 +0000 @@ -139,7 +139,7 @@ private boolean _isStatic = false; @@ -225,8 +246,8 @@ // Possible conversions between Java and internal types java2Internal.put(Boolean.TYPE, Type.Boolean); diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/LiteralElement.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/LiteralElement.java ---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/LiteralElement.java 2017-08-03 17:03:27.000000000 +0100 -+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/LiteralElement.java 2017-08-03 23:28:06.555896022 +0100 +--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/LiteralElement.java 2017-11-30 03:00:25.000000000 +0000 ++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/LiteralElement.java 2017-12-02 04:30:06.064323116 +0000 @@ -107,7 +107,7 @@ // Check if we have any declared namespaces @@ -273,8 +294,8 @@ SyntaxTreeNode n = _attributeElements.get(k); if (n instanceof LiteralAttribute) { diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Mode.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Mode.java ---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Mode.java 2017-08-03 17:03:27.000000000 +0100 -+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Mode.java 2017-08-03 23:28:06.559895959 +0100 +--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Mode.java 2017-11-30 03:00:25.000000000 +0000 ++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Mode.java 2017-12-02 04:30:06.064323116 +0000 @@ -129,22 +129,22 @@ /** * A mapping between templates and test sequences. @@ -327,8 +348,8 @@ _rootPattern = null; diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Parser.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Parser.java ---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Parser.java 2017-08-03 17:03:27.000000000 +0100 -+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Parser.java 2017-08-03 23:28:06.559895959 +0100 +--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Parser.java 2017-11-30 03:00:25.000000000 +0000 ++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Parser.java 2017-12-02 04:30:06.064323116 +0000 @@ -107,11 +107,11 @@ } @@ -365,8 +386,8 @@ _prefixMapping.put(prefix, uri); } diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Stylesheet.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Stylesheet.java ---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Stylesheet.java 2017-08-03 17:03:27.000000000 +0100 -+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Stylesheet.java 2017-08-03 23:28:06.559895959 +0100 +--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Stylesheet.java 2017-11-30 03:00:25.000000000 +0000 ++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/Stylesheet.java 2017-12-02 04:30:06.064323116 +0000 @@ -122,7 +122,7 @@ /** * Mapping between mode names and Mode instances. @@ -395,8 +416,8 @@ /** * A reference to the SourceLoader set by the user (a URIResolver diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SymbolTable.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SymbolTable.java ---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SymbolTable.java 2017-08-03 17:03:27.000000000 +0100 -+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SymbolTable.java 2017-08-03 23:28:06.559895959 +0100 +--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SymbolTable.java 2017-11-30 03:00:25.000000000 +0000 ++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SymbolTable.java 2017-12-02 04:30:06.064323116 +0000 @@ -38,8 +38,8 @@ final class SymbolTable { @@ -479,8 +500,8 @@ // Register the namespace URI Integer refcnt = _excludedURI.get(uri); diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SyntaxTreeNode.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SyntaxTreeNode.java ---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SyntaxTreeNode.java 2017-08-03 17:03:27.000000000 +0100 -+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SyntaxTreeNode.java 2017-08-03 23:28:06.559895959 +0100 +--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SyntaxTreeNode.java 2017-11-30 03:00:25.000000000 +0000 ++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/SyntaxTreeNode.java 2017-12-02 04:30:06.064323116 +0000 @@ -70,7 +70,7 @@ protected SyntaxTreeNode _parent; // Parent node private Stylesheet _stylesheet; // Stylesheet ancestor node @@ -509,8 +530,8 @@ locals.add(varOrParamName); } diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MethodGenerator.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MethodGenerator.java ---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MethodGenerator.java 2017-08-03 17:03:27.000000000 +0100 -+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MethodGenerator.java 2017-08-03 23:28:06.559895959 +0100 +--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MethodGenerator.java 2017-11-30 03:00:25.000000000 +0000 ++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MethodGenerator.java 2017-12-02 04:30:06.064323116 +0000 @@ -127,7 +127,7 @@ * times. Note that patterns whose kernels are "*", "node()" * and "@*" can between shared by test sequences. @@ -521,8 +542,8 @@ public MethodGenerator(int access_flags, Type return_type, diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MultiHashtable.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MultiHashtable.java ---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MultiHashtable.java 2017-08-03 17:03:27.000000000 +0100 -+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MultiHashtable.java 2017-08-03 23:28:06.559895959 +0100 +--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MultiHashtable.java 2017-11-30 03:00:25.000000000 +0000 ++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/util/MultiHashtable.java 2017-12-02 04:30:06.064323116 +0000 @@ -37,7 +37,7 @@ public final class MultiHashtable { static final long serialVersionUID = -6151608290510033572L; @@ -542,8 +563,8 @@ } set.add(value); diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/XSLTC.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/XSLTC.java ---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/XSLTC.java 2017-08-03 17:03:27.000000000 +0100 -+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/XSLTC.java 2017-08-03 23:28:06.559895959 +0100 +--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/XSLTC.java 2017-11-30 03:00:25.000000000 +0000 ++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/compiler/XSLTC.java 2017-12-02 04:30:06.064323116 +0000 @@ -170,7 +170,7 @@ _parser = new Parser(this, useServicesMechanism); _featureManager = featureManager; @@ -572,8 +593,8 @@ _parser.init(); //_variableSerial = 1; diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/dom/DocumentCache.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/dom/DocumentCache.java ---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/dom/DocumentCache.java 2017-08-03 17:03:27.000000000 +0100 -+++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/dom/DocumentCache.java 2017-08-03 23:28:06.559895959 +0100 +--- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/dom/DocumentCache.java 2017-11-30 03:00:25.000000000 +0000 ++++ openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/dom/DocumentCache.java 2017-12-02 04:30:06.064323116 +0000 @@ -169,7 +169,7 @@ _count = 0; _current = 0; @@ -584,8 +605,8 @@ try { diff -Nru openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/dom/DOMWSFilter.java openjdk-boot/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/dom/DOMWSFilter.java ---- openjdk-boot.orig/jaxp/src/com/sun/org/apache/xalan/internal/xsltc/dom/DOMWSFilter.java 2017-08-03 17:03:27.000000000 +0100 From bugzilla-daemon at icedtea.classpath.org Tue Dec 5 20:14:20 2017 From: bugzilla-daemon at icedtea.classpath.org (bugzilla-daemon at icedtea.classpath.org) Date: Tue, 05 Dec 2017 20:14:20 +0000 Subject: [Bug 3497] [IcedTea7] AArch64: Adapt to 8002074: Support for AES on SPARC In-Reply-To: References: Message-ID: https://icedtea.classpath.org/bugzilla/show_bug.cgi?id=3497 --- Comment #2 from hg commits --- details: http://icedtea.classpath.org//hg/release/icedtea7-2.6?cmd=changeset;node=484938987004 author: Andrew John Hughes date: Tue Dec 05 19:25:17 2017 +0000 Bump to 2.6.12. Upstream changes: - Bump to icedtea-2.6.12 - PR3497: AArch64: Adapt to 8002074: Support for AES on SPARC - S6475361: Attempting to remove help menu from java.awt.MenuBar throws NullPointerException - S6637288: Add OCSP support to PKIX CertPathBuilder implementation - S6854712: Revocation checking enhancements (JEP-124) - S6904367: (coll) IdentityHashMap is resized before exceeding the expected maximum size - S7015157: String "Tabular Navigation" should be rephrased for avoiding mistranslation - S7115744: Do not call File::deleteOnExit in security tests - S7126011: ReverseBuilder.getMatchingCACerts may throws NPE - S7147336: clarification on warning of keytool -printcrl - S7162687: enhance KDC server availability detection - S7176627: CertPath/jep124/PreferCRL_SoftFail test fails (Could not determine revocation status) - S7195409: CertPath/CertPathValidatorTest/KeyParamsInheritanceTest fails with NullPointerException - S7196382: PKCS11 provider should support 2048-bit DH - S7197672: There are issues with shared data on windows - S7199939: DSA 576 and 640 bit keys fail when initializing for No precomputed parameters - S8002074: Support for AES on SPARC - S8005408: KeyStore API enhancements - S8006863: javadoc cleanup for 8005408 - S8006946: PKCS12 test failure due to incorrect alias name - S8006951: Avoid storing duplicate PKCS12 attributes - S8006994: Cleanup PKCS12 tests to ensure streams get closed - S8007483: attributes are ignored when loading keys from a PKCS12 keystore - S8007967: Infinite loop can happen in sun.security.provider.certpath.SunCertPathBuilder.depthFirstSearchForward() - S8010112: NullPointerException in sun.security.provider.certpath.CertId() - S8012900: CICO ignores AAD in GCM mode (with refactoring from 6996769) - S8015571: OCSP validation fails if ocsp.responderCertSubjectName is set - S8016252: More defensive HashSet.readObject - S8025215: jdk8 l10n resource file translation update 4 - S8026943: SQE test jce/Global/Cipher/SameBuffer failed - S8027575: b113 causing a lot of memory allocation and regression for wls_webapp_atomics - S8029659: Keytool, print key algorithm of certificate or key entry - S8029788: Certificate validation - java.lang.ClassCastException - S8031825: OCSP client can't find responder cert if it uses a different subject key id algorithm than responderID - S8033117: PPC64: Adapt to 8002074: Support for AES on SPARC - S8035623: [parfait] JNI exception pending in jdk/src/windows/native/sun/windows/awt_Font.cpp - S8035640: JNU_CHECK_EXCEPTION should support c++ JNI syntax - S8049312: AES/CICO test failed with on several modes - S8050374: More Signature tests - S8057810: New defaults for DSA keys in jarsigner and keytool - S8062552: Support keystore type detection for JKS and PKCS12 keystores - S8068427: Hashtable deserialization reconstitutes table with wrong capacity - S8068881: SIGBUS in C2 compiled method weblogic.wsee.jaxws.framework.jaxrpc.EnvironmentFactory$SimulatedWsdlDefinitions. - S8075484: SocketInputStream.socketRead0 can hang even with soTimeout set - S8077670: sun/security/krb5/auto/MaxRetries.java may fail with BindException - S8078331: Upgrade JDK to use LittleCMS 2.7 - S8079129: NullPointerException in PKCS#12 Keystore in PKCS12KeyStore.java - S8087144: sun/security/krb5/auto/MaxRetries.java fails with Retry count is -1 less - S8136534: Loading JKS keystore using non-null InputStream results in closed stream - S8149411: PKCS12KeyStore cannot extract AES Secret Keys - S8153146: sun/security/krb5/auto/MaxRetries.java failed with timeout - S8157561: Ship the unlimited policy files in JDK Updates - S8158517: Minor optimizations to ISO10126PADDING - S8164846: CertificateException missing cause of underlying exception - S8165543: Better window framing - S8165751: NPE hit with java.security.debug=provider - S8169026: Handle smartcard clean up better - S8169966: Larger AWT menus - S8170218: Improved Font Metrics - S8171252: Improve exception checking - S8171261: Stability fixes for lcms - S8171319: keytool should print out warnings when reading or generating cert/cert req using weak algorithms - S8173853: IllegalArgumentException in java.awt.image.ReplicateScaleFilter - S8174109: Better queuing priorities - S8174966: Unreferenced references - S8175940: More certificate subject checking - S8176536: Improved algorithm constraints checking - S8176751: Better URL connections - S8177569: keytool should not warn if signature algorithm used in cacerts is weak - S8178714: PKIX validator nameConstraints check failing after change 8175940 - S8178794: Correct Kerberos ticket grants - S8179084: HotSpot VM fails to start when AggressiveHeap is set - S8179101: Improve algorithm constraints implementation - S8179423: 2 security tests started failing for JDK 1.6.0 u161 b05 - S8179564: Missing @bug for tests added with JDK-8165367 - S8179998: Clear certificate chain connections - S8180024: Improve construction of objects during deserialization - S8180711: Better invokespecial checks - S8181048: Refactor existing providers to refer to the same constants for default values for key length - S8181100: Better Base Exceptions - S8181323: Better timezone processing - S8181327: Better X processing - S8181370: Better keystore handling - S8181432: Better processing of unresolved permissions - S8181597: Process Proxy presentation - S8181612: More stable connection processing - S8181692: Update storage implementations - S8182879: Add warnings to keytool when using JKS and JCEKS - S8183028: Improve CMS header processing - S8184673: Fix compatibility issue in AlgorithmChecker for 3rd party JCE providers - S8184682: Upgrade compression library - S8184937: LCMS error 13: Couldn't link the profiles - S8185039: Incorrect GPL header causes RE script to miss swap to commercial header for licensee source bundle - S8185040: Incorrect GPL header causes RE script to miss swap to commercial header for licensee source bundle - S8185778: 8u151 L10n resource file update - S8185845: Add SecurityTools.java test library - S8186503: sun/security/tools/jarsigner/DefaultSigalg.java failed after backport to JDK 6/7/8 - S8186533: 8u151 L10n resource file update md20 - S8191137: keytool fails to format resource strings for keys for some languages after JDK-8171319 - S8191840: Update localizations with positional arguments following JDK-8191137 - S8191845: [TEST_BUG] Too many new-lines in backport of WeakAlg test ChangeLog: 2017-12-05 Andrew John Hughes Bump to 2.6.12. * Makefile.am, (JDK_UPDATE_VERSION): Bump to 161. (CORBA_CHANGESET): Update to icedtea-2.6.12. (JAXP_CHANGESET): Likewise. (JAXWS_CHANGESET): Likewise. (JDK_CHANGESET): Likewise. (LANGTOOLS_CHANGESET): Likewise. (OPENJDK_CHANGESET): Likewise. (CORBA_SHA256SUM): Likewise. (JAXP_SHA256SUM): Likewise. (JAXWS_SHA256SUM): Likewise. (JDK_SHA256SUM): Likewise. (LANGTOOLS_SHA256SUM): Likewise. (OPENJDK_SHA256SUM): Likewise. (install-data-local): Install policy JAR files into new policy directories. * NEWS: Updated. * configure.ac: Bump to 2.6.12. * hotspot.map.in: Update to icedtea-2.6.12. * patches/boot/ecj-diamond.patch: Regenerated. Add new instances in com.sun.corba.se.impl.io.ObjectStreamClass, com.sun.xml.internal.ws.util.exception.JAXWSExceptionBase, java.io.ObjectStreamClass, java.security.cert.CertificateRevokedException, java.security.KeyStore, java.security.UnresolvedPermission, sun.security.pkcs.SignerInfo, sun.security.pkcs12.PKCS12KeyStore, sun.security.provider.certpath.AdjacencyList, sun.security.provider.certpath.Builder, sun.security.provider.certpath.CollectionCertStore, sun.security.provider.certpath.DistributionPointFetcher, sun.security.provider.certpath.ForwardBuilder, sun.security.provider.certpath.IndexedCollectionCertStore, sun.security.provider.certpath.OCSPResponse, sun.security.provider.certpath.PKIXCertPathValidator, sun.security.provider.certpath.PKIX, sun.security.provider.certpath.PKIXRevocationChecker, sun.security.provider.certpath.PolicyChecker, sun.security.provider.certpath.PolicyNodeImpl, sun.security.provider.certpath.ReverseBuilder, sun.security.provider.certpath.ReverseState, sun.security.provider.certpath.RevocationChecker, sun.security.provider.certpath.SunCertPathBuilder, sun.security.provider.certpath.X509CertPath, sun.security.tools.keytool.Main, sun.security.util.DisabledAlgorithmConstraints and sun.security.util.SignatureFileVerifier * patches/boot/ecj-multicatch.patch: Regenerated. Add new cases in com.sun.corba.se.impl.io.ObjectStreamClass, java.io.ObjectStreamClass, sun.security.provider.certpath.CertStoreHelper, sun.security.provider.certpath.DistributionPointFetcher, sun.security.provider.certpath.OCSP, sun.security.provider.certpath.OCSPResponse, sun.security.provider.certpath.PKIXCertPathValidator, sun.security.provider.certpath.RevocationChecker, sun.security.provider.certpath.SunCertPathBuilder, sun.security.provider.certpath.URICertStore and sun.security.provider.KeyStoreDelegator. * patches/boot/ecj-stringswitch.patch: Add new cases in sun.security.util.DisabledAlgorithmConstraints, sun.security.provider.certpath.CertStoreHelper and sun.security.provider.certpath.RevocationChecker. * patches/boot/ecj-trywithresources.patch: Add new cases in sun.security.krb5.KdcComm and sun.security.tools.keytool.Main. * patches/boot/ecj-underscored_literals.patch: Add new case in sun.net.ftp.impl.FtpClient. * remove-intree-libraries.sh.in: Remove ZLIB_VERSION and its use in the ZIP_SRC path, as the source tree path is now unversioned. -- You are receiving this mail because: You are on the CC list for the bug. -------------- next part -------------- An HTML attachment was scrubbed... URL: From gnu_andrew at member.fsf.org Wed Dec 6 04:38:56 2017 From: gnu_andrew at member.fsf.org (Andrew Hughes) Date: Wed, 6 Dec 2017 04:38:56 +0000 Subject: [SECURITY] IcedTea 2.6.12 for OpenJDK 7 Released! Message-ID: <20171206043856.GA13793@carrie.the212.com> The IcedTea project provides a harness to build the source code from OpenJDK using Free Software build tools, along with additional features such as the ability to build against system libraries and support for alternative virtual machines and architectures beyond those supported by OpenJDK. This release updates our OpenJDK 7 support in the 2.6.x series with the October 2017 security fixes from OpenJDK 7 u161. If you find an issue with the release, please report it to our bug database (http://icedtea.classpath.org/bugzilla) under the appropriate component. Development discussion takes place on the distro-pkg-dev at openjdk.java.net OpenJDK mailing list and patches are always welcome. Full details of the release can be found below. What?s New? =========== New in release 2.6.12 (2017-12-05): * Security fixes - S8165543: Better window framing - S8169026, CVE-2017-10274: Handle smartcard clean up better - S8169966: Larger AWT menus - S8170218: Improved Font Metrics - S8171252: Improve exception checking - S8171261: Stability fixes for lcms - S8174109, CVE-2017-10281: Better queuing priorities - S8174966, CVE-2017-10285: Unreferenced references - S8175940: More certificate subject checking - S8176751, CVE-2017-10295: Better URL connections - S8178794, CVE-2017-10388: Correct Kerberos ticket grants - S8179101, CVE-2017-10193: Improve algorithm constraints implementation - S8179998, CVE-2017-10198: Clear certificate chain connections - S8180024: Improve construction of objects during deserialization - S8180711, CVE-2017-10346: Better invokespecial checks - S8181100, CVE-2017-10350: Better Base Exceptions - S8181323, CVE-2017-10347: Better timezone processing - S8181327, CVE-2017-10349: Better X processing - S8181370, CVE-2017-10345: Better keystore handling - S8181432, CVE-2017-10348: Better processing of unresolved permissions - S8181597, CVE-2017-10357: Process Proxy presentation - S8181612, CVE-2017-10355: More stable connection processing - S8181692, CVE-2017-10356: Update storage implementations - S8183028, CVE-2016-10165: Improve CMS header processing - S8184682, CVE-2016-9840, CVE-2016-9841, CVE-2016-9842, CVE-2016-9843: Upgrade compression library * Import of OpenJDK 7 u161 build 0 - S6475361: Attempting to remove help menu from java.awt.MenuBar throws NullPointerException - S6637288: Add OCSP support to PKIX CertPathBuilder implementation - S6854712: Revocation checking enhancements (JEP-124) - S6904367: (coll) IdentityHashMap is resized before exceeding the expected maximum size - S7015157: String "Tabular Navigation" should be rephrased for avoiding mistranslation - S7115744: Do not call File::deleteOnExit in security tests - S7126011: ReverseBuilder.getMatchingCACerts may throws NPE - S7147336: clarification on warning of keytool -printcrl - S7162687: enhance KDC server availability detection - S7176627: CertPath/jep124/PreferCRL_SoftFail test fails (Could not determine revocation status) - S7195409: CertPath/CertPathValidatorTest/KeyParamsInheritanceTest fails with NullPointerException - S7196382: PKCS11 provider should support 2048-bit DH - S7197672: There are issues with shared data on windows - S7199939: DSA 576 and 640 bit keys fail when initializing for No precomputed parameters - S8002074: Support for AES on SPARC - S8005408: KeyStore API enhancements - S8006863: javadoc cleanup for 8005408 - S8006946: PKCS12 test failure due to incorrect alias name - S8006951: Avoid storing duplicate PKCS12 attributes - S8006994: Cleanup PKCS12 tests to ensure streams get closed - S8007483: attributes are ignored when loading keys from a PKCS12 keystore - S8007967: Infinite loop can happen in sun.security.provider.certpath.SunCertPathBuilder.depthFirstSearchForward() - S8010112: NullPointerException in sun.security.provider.certpath.CertId() - S8012900: CICO ignores AAD in GCM mode (with refactoring from 6996769) - S8015571: OCSP validation fails if ocsp.responderCertSubjectName is set - S8016252: More defensive HashSet.readObject - S8025215: jdk8 l10n resource file translation update 4 - S8026943: SQE test jce/Global/Cipher/SameBuffer failed - S8027575: b113 causing a lot of memory allocation and regression for wls_webapp_atomics - S8029659: Keytool, print key algorithm of certificate or key entry - S8029788: Certificate validation - java.lang.ClassCastException - S8031825: OCSP client can't find responder cert if it uses a different subject key id algorithm than responderID - S8033117: PPC64: Adapt to 8002074: Support for AES on SPARC - S8035623: [parfait] JNI exception pending in jdk/src/windows/native/sun/windows/awt_Font.cpp - S8049312: AES/CICO test failed with on several modes - S8050374: More Signature tests - S8057810: New defaults for DSA keys in jarsigner and keytool - S8062552: Support keystore type detection for JKS and PKCS12 keystores - S8068427: Hashtable deserialization reconstitutes table with wrong capacity - S8068881: SIGBUS in C2 compiled method weblogic.wsee.jaxws.framework.jaxrpc.EnvironmentFactory$SimulatedWsdlDefinitions. - S8075484, PR3474, RH1490713: SocketInputStream.socketRead0 can hang even with soTimeout set - S8077670: sun/security/krb5/auto/MaxRetries.java may fail with BindException - S8079129: NullPointerException in PKCS#12 Keystore in PKCS12KeyStore.java - S8087144: sun/security/krb5/auto/MaxRetries.java fails with Retry count is -1 less - S8136534: Loading JKS keystore using non-null InputStream results in closed stream - S8149411: PKCS12KeyStore cannot extract AES Secret Keys - S8153146: sun/security/krb5/auto/MaxRetries.java failed with timeout - S8157561: Ship the unlimited policy files in JDK Updates - S8158517: Minor optimizations to ISO10126PADDING - S8164846: CertificateException missing cause of underlying exception - S8165751: NPE hit with java.security.debug=provider - S8171319: keytool should print out warnings when reading or generating cert/cert req using weak algorithms - S8173853: IllegalArgumentException in java.awt.image.ReplicateScaleFilter - S8176536: Improved algorithm constraints checking - S8177569: keytool should not warn if signature algorithm used in cacerts is weak - S8178714: PKIX validator nameConstraints check failing after change 8175940 - S8179423: 2 security tests started failing for JDK 1.6.0 u161 b05 - S8179564: Missing @bug for tests added with JDK-8165367 - S8181048: Refactor existing providers to refer to the same constants for default values for key length - S8182879: Add warnings to keytool when using JKS and JCEKS - S8184673, PR3476: Fix compatibility issue in AlgorithmChecker for 3rd party JCE providers - S8184937: LCMS error 13: Couldn't link the profiles - S8185039: Incorrect GPL header causes RE script to miss swap to commercial header for licensee source bundle - S8185040: Incorrect GPL header causes RE script to miss swap to commercial header for licensee source bundle - S8185778: 8u151 L10n resource file update - S8185845: Add SecurityTools.java test library - S8186503: sun/security/tools/jarsigner/DefaultSigalg.java failed after backport to JDK 6/7/8 - S8186533: 8u151 L10n resource file update md20 - S8191137: keytool fails to format resource strings for keys for some languages after JDK-8171319 - S8191840: Update localizations with positional arguments following JDK-8191137 - S8191845: [TEST_BUG] Too many new-lines in backport of WeakAlg test * Import of OpenJDK 7 u151 build 1 - S8035640: JNU_CHECK_EXCEPTION should support c++ JNI syntax * Backports - S8138745, PR3465, RH1484399: Implement ExitOnOutOfMemory and CrashOnOutOfMemory in HotSpot - S8185164, PR3433: GetOwnedMonitorInfo() returns incorrect owned monitor - S8188030, PR3460, RH1484079: AWT java apps fail to start when some minimal fonts are present * Bug fixes - PR3470, RH1492139: Hotspot object_alloc tapset uses HeapWordSize incorrectly - PR3480, RH1486025: ECC and NSS JVM crash * AArch64 port - S8145438, PR3443, RH1482244: Guarantee failures since 8144028: Use AArch64 bit-test instructions in C2 - PR3497: AArch64: Adapt to 8002074: Support for AES on SPARC The tarballs can be downloaded from: * http://icedtea.classpath.org/download/source/icedtea-2.6.12.tar.gz * http://icedtea.classpath.org/download/source/icedtea-2.6.12.tar.xz We provide both gzip and xz tarballs, so that those who are able to make use of the smaller tarball produced by xz may do so. The tarballs are accompanied by digital signatures available at: * http://icedtea.classpath.org/download/source/icedtea-2.6.12.tar.gz.sig * http://icedtea.classpath.org/download/source/icedtea-2.6.12.tar.xz.sig These are produced using my public key. See details below. PGP Key: ed25519/0xCFDA0F9B35964222 (hkp://keys.gnupg.net) Fingerprint = 5132 579D D154 0ED2 3E04 C5A0 CFDA 0F9B 3596 4222 GnuPG >= 2.1 is required to be able to handle this key. SHA256 checksums: 90183fc86a001d8832ef5b9ba8617d11bde1c5f595d3da6493de7f4d7c35b68a icedtea-2.6.12.tar.gz 9f0c534914188c61b88662c4072bcf87c6dafac6aedef98f3752e30c1794c25d icedtea-2.6.12.tar.gz.sig f3de9f5ea1a447fe8a290cde5012d33b1534f0d3d484b2664a4be9202b801f68 icedtea-2.6.12.tar.xz d242e506c297925beb47c805da7ebdee2e66057d1403c666aa8d4bffa6ab7fc8 icedtea-2.6.12.tar.xz.sig The checksums can be downloaded from: * http://icedtea.classpath.org/download/source/icedtea-2.6.12.sha256 The following people helped with this release: * Martin Balao (PR3480/RH1486025 ECC+NSS crash fix) * Severin Gehwolf (PR3470/RH1492139 SystemTap fix) * Andrew Hughes (all other backports & bug fixes, release management) * Mario Torre (PR3460/S8188030/RH1484079 font fix) We would also like to thank the bug reporters and testers! To get started: $ tar xzf icedtea-2.6.12.tar.gz or: $ tar x -I xz -f icedtea-2.6.12.tar.xz then: $ mkdir icedtea-build $ cd icedtea-build $ ../icedtea-2.6.12/configure $ make Full build requirements and instructions are available in the INSTALL file. Happy hacking! -- Andrew :) Senior Free Java Software Engineer Red Hat, Inc. (http://www.redhat.com) PGP Key: ed25519/0xCFDA0F9B35964222 (hkp://keys.gnupg.net) Fingerprint = 5132 579D D154 0ED2 3E04 C5A0 CFDA 0F9B 3596 4222 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 228 bytes Desc: Digital signature URL: From akashche at redhat.com Wed Dec 6 12:12:27 2017 From: akashche at redhat.com (Alex Kashchenko) Date: Wed, 6 Dec 2017 12:12:27 +0000 Subject: [rfc] added preprocessing to rust launchers In-Reply-To: References: Message-ID: Hi, On 12/05/2017 04:11 PM, Jiri Vanek wrote: > This patch is adding the possiblity to pas classapth and simialr to the > rust luncher. > If there is enybody knowing the better way, and especially how to get > rid of this duplicated (triplicated x triplicated) snipept of > +??? MAIN_CLASS=net.sourceforge.jnlp.runtime.Boot ;\ > +??? BIN_LOCATION=$(bindir)/$(javaws).sh ;\ > +??? PROGRAM_NAME=$(javaws) ;\ > +??? $(edit_launcher_script) < $< > $@ > > And turn it into function of call(name, suffix)? < $< > $@, that would > be awesome. I tried many times, various ways, but if I get rid of those > three lines, I always duplicated? targets:( I can suggest not to pre-process .rs file, but to preprocess config file instead and read it on startup. -- -Alex From jvanek at redhat.com Wed Dec 6 14:50:02 2017 From: jvanek at redhat.com (Jiri Vanek) Date: Wed, 6 Dec 2017 15:50:02 +0100 Subject: [rfc] added preprocessing to rust launchers In-Reply-To: References: Message-ID: <986a73db-ce77-f719-0c15-6c8cd54bad99@redhat.com> Hello! Thanx for feedback. I had week long personal battle whether to have it preprocessed with some solid defaults, or to use config file. It ehnded 51:49 for preprocess. No it is 99:1 for config file:) What location do you suggest? On 12/06/2017 01:12 PM, Alex Kashchenko wrote: > Hi, > > On 12/05/2017 04:11 PM, Jiri Vanek wrote: >> This patch is adding the possiblity to pas classapth and simialr to the rust luncher. >> If there is enybody knowing the better way, and especially how to get rid of this duplicated >> (triplicated x triplicated) snipept of >> + MAIN_CLASS=net.sourceforge.jnlp.runtime.Boot ;\ >> + BIN_LOCATION=$(bindir)/$(javaws).sh ;\ >> + PROGRAM_NAME=$(javaws) ;\ >> + $(edit_launcher_script) < $< > $@ >> >> And turn it into function of call(name, suffix) < $< > $@, that would be awesome. I tried many >> times, various ways, but if I get rid of those three lines, I always duplicated targets:( > > I can suggest not to pre-process .rs file, but to preprocess config file instead and read it on > startup. > > -- Jiri Vanek Senior QE engineer, OpenJDK QE lead, Mgr. Red Hat Czech jvanek at redhat.com M: +420775390109 From akashche at redhat.com Wed Dec 6 18:46:15 2017 From: akashche at redhat.com (Alex Kashchenko) Date: Wed, 6 Dec 2017 18:46:15 +0000 Subject: [rfc] added preprocessing to rust launchers In-Reply-To: <986a73db-ce77-f719-0c15-6c8cd54bad99@redhat.com> References: <986a73db-ce77-f719-0c15-6c8cd54bad99@redhat.com> Message-ID: On 12/06/2017 02:50 PM, Jiri Vanek wrote: > Hello! > > Thanx for feedback. I had week long personal battle whether to have it > preprocessed with some solid defaults, or to use config file. It ehnded > 51:49 for preprocess. No it is 99:1 for config file:) > > What location do you suggest? The same directory, where launcher binary is, will be the most convenient. So it can be read with: executable_directory() + "/conf_file_name". > > > On 12/06/2017 01:12 PM, Alex Kashchenko wrote: >> Hi, >> >> On 12/05/2017 04:11 PM, Jiri Vanek wrote: >>> This patch is adding the possiblity to pas classapth and simialr to >>> the rust luncher. >>> If there is enybody knowing the better way, and especially how to get >>> rid of this duplicated (triplicated x triplicated) snipept of >>> +??? MAIN_CLASS=net.sourceforge.jnlp.runtime.Boot ;\ >>> +??? BIN_LOCATION=$(bindir)/$(javaws).sh ;\ >>> +??? PROGRAM_NAME=$(javaws) ;\ >>> +??? $(edit_launcher_script) < $< > $@ >>> >>> And turn it into function of call(name, suffix)? < $< > $@, that >>> would be awesome. I tried many times, various ways, but if I get rid >>> of those three lines, I always duplicated? targets:( >> >> I can suggest not to pre-process .rs file, but to preprocess config >> file instead and read it on startup. >> >> > > -- -Alex From bugzilla-daemon at icedtea.classpath.org Wed Dec 6 21:12:11 2017 From: bugzilla-daemon at icedtea.classpath.org (bugzilla-daemon at icedtea.classpath.org) Date: Wed, 06 Dec 2017 21:12:11 +0000 Subject: [Bug 3499] New: [IcedTea8] Backport "8190258: Support tzdata2017c" Message-ID: https://icedtea.classpath.org/bugzilla/show_bug.cgi?id=3499 Bug ID: 3499 Summary: [IcedTea8] Backport "8190258: Support tzdata2017c" Product: IcedTea Version: 8-hg Hardware: all OS: All Status: NEW Severity: normal Priority: P5 Component: IcedTea Assignee: gnu.andrew at redhat.com Reporter: gnu.andrew at redhat.com CC: unassigned at icedtea.classpath.org System tzdata updates are already moving to 2017c, which is incompatible with the OpenJDK code still based on 2017b. We should backport the latest tzdata update. https://bugs.openjdk.java.net/browse/JDK-8190258 -- You are receiving this mail because: You are on the CC list for the bug. -------------- next part -------------- An HTML attachment was scrubbed... URL: From bugzilla-daemon at icedtea.classpath.org Wed Dec 6 21:12:52 2017 From: bugzilla-daemon at icedtea.classpath.org (bugzilla-daemon at icedtea.classpath.org) Date: Wed, 06 Dec 2017 21:12:52 +0000 Subject: [Bug 3481] [TRACKER] IcedTea 3.7.0 Release In-Reply-To: References: Message-ID: https://icedtea.classpath.org/bugzilla/show_bug.cgi?id=3481 Andrew John Hughes changed: What |Removed |Added ---------------------------------------------------------------------------- Depends on| |3499 -- You are receiving this mail because: You are on the CC list for the bug. -------------- next part -------------- An HTML attachment was scrubbed... URL: From bugzilla-daemon at icedtea.classpath.org Wed Dec 6 21:12:52 2017 From: bugzilla-daemon at icedtea.classpath.org (bugzilla-daemon at icedtea.classpath.org) Date: Wed, 06 Dec 2017 21:12:52 +0000 Subject: [Bug 3499] [IcedTea8] Backport "8190258: Support tzdata2017c" In-Reply-To: References: Message-ID: https://icedtea.classpath.org/bugzilla/show_bug.cgi?id=3499 Andrew John Hughes changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |ASSIGNED URL| |https://bugs.openjdk.java.n | |et/browse/JDK-8190258 Blocks| |3481 Target Milestone|--- |3.7.0 -- You are receiving this mail because: You are on the CC list for the bug. -------------- next part -------------- An HTML attachment was scrubbed... URL: From andrew at icedtea.classpath.org Wed Dec 6 23:19:54 2017 From: andrew at icedtea.classpath.org (andrew at icedtea.classpath.org) Date: Wed, 06 Dec 2017 23:19:54 +0000 Subject: /hg/release/icedtea7-2.6: 3 new changesets Message-ID: changeset 3072b7a2e47d in /hg/release/icedtea7-2.6 details: http://icedtea.classpath.org/hg/release/icedtea7-2.6?cmd=changeset;node=3072b7a2e47d author: Andrew John Hughes date: Tue Dec 05 20:31:26 2017 +0000 Set release date to today. 2017-12-05 Andrew John Hughes * NEWS: Set release date to today. changeset ef989f922b35 in /hg/release/icedtea7-2.6 details: http://icedtea.classpath.org/hg/release/icedtea7-2.6?cmd=changeset;node=ef989f922b35 author: Andrew John Hughes date: Wed Dec 06 04:27:58 2017 +0000 Added tag icedtea-2.6.12 for changeset 3072b7a2e47d changeset de2f1c795665 in /hg/release/icedtea7-2.6 details: http://icedtea.classpath.org/hg/release/icedtea7-2.6?cmd=changeset;node=de2f1c795665 author: Andrew John Hughes date: Wed Dec 06 04:29:28 2017 +0000 Add missing reference to PR3476 for 8184673 entry. 2017-12-05 Andrew John Hughes * NEWS: Add missing reference to PR3476 for 8184673 entry. diffstat: .hgtags | 1 + ChangeLog | 9 +++++++++ NEWS | 4 ++-- 3 files changed, 12 insertions(+), 2 deletions(-) diffs (45 lines): diff -r 484938987004 -r de2f1c795665 .hgtags --- a/.hgtags Tue Dec 05 19:25:17 2017 +0000 +++ b/.hgtags Wed Dec 06 04:29:28 2017 +0000 @@ -78,3 +78,4 @@ 2019ab2d8dc7f3472d45d2a87172d2258b18e9bc icedtea-2.6.11pre01 ca912837484636232172dcce97145dcb8205f3df icedtea-2.6.11 89e60608946de73f8ea2574d69e9ce7a0acdd84c icedtea-2.6.12pre01 +3072b7a2e47db3fd8855be8f864d10f4a0dbca6c icedtea-2.6.12 diff -r 484938987004 -r de2f1c795665 ChangeLog --- a/ChangeLog Tue Dec 05 19:25:17 2017 +0000 +++ b/ChangeLog Wed Dec 06 04:29:28 2017 +0000 @@ -1,3 +1,12 @@ +2017-12-05 Andrew John Hughes + + * NEWS: Add missing reference to PR3476 + for 8184673 entry. + +2017-12-05 Andrew John Hughes + + * NEWS: Set release date to today. + 2017-12-05 Andrew John Hughes Bump to 2.6.12. diff -r 484938987004 -r de2f1c795665 NEWS --- a/NEWS Tue Dec 05 19:25:17 2017 +0000 +++ b/NEWS Wed Dec 06 04:29:28 2017 +0000 @@ -12,7 +12,7 @@ CVE-XXXX-YYYY: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=XXXX-YYYY -New in release 2.6.12 (2017-10-XX): +New in release 2.6.12 (2017-12-05): * Security fixes - S8165543: Better window framing @@ -101,7 +101,7 @@ - S8179564: Missing @bug for tests added with JDK-8165367 - S8181048: Refactor existing providers to refer to the same constants for default values for key length - S8182879: Add warnings to keytool when using JKS and JCEKS - - S8184673: Fix compatibility issue in AlgorithmChecker for 3rd party JCE providers + - S8184673, PR3476: Fix compatibility issue in AlgorithmChecker for 3rd party JCE providers - S8184937: LCMS error 13: Couldn't link the profiles - S8185039: Incorrect GPL header causes RE script to miss swap to commercial header for licensee source bundle - S8185040: Incorrect GPL header causes RE script to miss swap to commercial header for licensee source bundle From bugzilla-daemon at icedtea.classpath.org Wed Dec 6 23:20:07 2017 From: bugzilla-daemon at icedtea.classpath.org (bugzilla-daemon at icedtea.classpath.org) Date: Wed, 06 Dec 2017 23:20:07 +0000 Subject: [Bug 3476] [IcedTea7] Backport '8184673: Fix compatibility issue in AlgorithmChecker for 3rd party JCE providers' In-Reply-To: References: Message-ID: https://icedtea.classpath.org/bugzilla/show_bug.cgi?id=3476 --- Comment #2 from hg commits --- details: http://icedtea.classpath.org//hg/release/icedtea7-2.6?cmd=changeset;node=de2f1c795665 author: Andrew John Hughes date: Wed Dec 06 04:29:28 2017 +0000 Add missing reference to PR3476 for 8184673 entry. 2017-12-05 Andrew John Hughes * NEWS: Add missing reference to PR3476 for 8184673 entry. -- You are receiving this mail because: You are on the CC list for the bug. -------------- next part -------------- An HTML attachment was scrubbed... URL: From bugzilla-daemon at icedtea.classpath.org Thu Dec 7 20:04:36 2017 From: bugzilla-daemon at icedtea.classpath.org (bugzilla-daemon at icedtea.classpath.org) Date: Thu, 07 Dec 2017 20:04:36 +0000 Subject: [Bug 3489] [IcedTea8] Incomplete reading of directory containing tzdb.dat In-Reply-To: References: Message-ID: https://icedtea.classpath.org/bugzilla/show_bug.cgi?id=3489 Andrew John Hughes changed: What |Removed |Added ---------------------------------------------------------------------------- Summary|Incomplete reading of |[IcedTea8] Incomplete |directory containing |reading of directory |tzdb.dat |containing tzdb.dat -- You are receiving this mail because: You are on the CC list for the bug. -------------- next part -------------- An HTML attachment was scrubbed... URL: From bugzilla-daemon at icedtea.classpath.org Thu Dec 7 21:22:00 2017 From: bugzilla-daemon at icedtea.classpath.org (bugzilla-daemon at icedtea.classpath.org) Date: Thu, 07 Dec 2017 21:22:00 +0000 Subject: [Bug 3469] [IcedTea8] Alternative path to tzdb.dat In-Reply-To: References: Message-ID: https://icedtea.classpath.org/bugzilla/show_bug.cgi?id=3469 Andrew John Hughes changed: What |Removed |Added ---------------------------------------------------------------------------- Blocks| |3489 -- You are receiving this mail because: You are on the CC list for the bug. -------------- next part -------------- An HTML attachment was scrubbed... URL: From bugzilla-daemon at icedtea.classpath.org Thu Dec 7 21:22:00 2017 From: bugzilla-daemon at icedtea.classpath.org (bugzilla-daemon at icedtea.classpath.org) Date: Thu, 07 Dec 2017 21:22:00 +0000 Subject: [Bug 3489] [IcedTea8] Incomplete reading of directory containing tzdb.dat In-Reply-To: References: Message-ID: https://icedtea.classpath.org/bugzilla/show_bug.cgi?id=3489 Andrew John Hughes changed: What |Removed |Added ---------------------------------------------------------------------------- Depends on| |3469 -- You are receiving this mail because: You are on the CC list for the bug. -------------- next part -------------- An HTML attachment was scrubbed... URL: From jvanek at redhat.com Fri Dec 8 10:21:53 2017 From: jvanek at redhat.com (Jiri Vanek) Date: Fri, 8 Dec 2017 11:21:53 +0100 Subject: [rfc] added preprocessing to rust launchers In-Reply-To: References: <986a73db-ce77-f719-0c15-6c8cd54bad99@redhat.com> Message-ID: On 12/06/2017 07:46 PM, Alex Kashchenko wrote: > On 12/06/2017 02:50 PM, Jiri Vanek wrote: >> Hello! >> >> Thanx for feedback. I had week long personal battle whether to have it preprocessed with some >> solid defaults, or to use config file. It ehnded 51:49 for preprocess. No it is 99:1 for config >> file:) >> >> What location do you suggest? > > The same directory, where launcher binary is, will be the most convenient. So it can be read with: > executable_directory() + "/conf_file_name". But that is no way with linux fs conventions for distribution packages. So the fall back will need to stay in place 1)xdg_confidir/icedtea-web/conf_file_name 2)executable_directory() + :/conf_file_name". Anything more? where conf_file_name I would vote for .itw_default_paths And the file should be read only :) Thanx for thoughts! J. > >> >> >> On 12/06/2017 01:12 PM, Alex Kashchenko wrote: >>> Hi, >>> >>> On 12/05/2017 04:11 PM, Jiri Vanek wrote: >>>> This patch is adding the possiblity to pas classapth and simialr to the rust luncher. >>>> If there is enybody knowing the better way, and especially how to get rid of this duplicated >>>> (triplicated x triplicated) snipept of >>>> + MAIN_CLASS=net.sourceforge.jnlp.runtime.Boot ;\ >>>> + BIN_LOCATION=$(bindir)/$(javaws).sh ;\ >>>> + PROGRAM_NAME=$(javaws) ;\ >>>> + $(edit_launcher_script) < $< > $@ >>>> >>>> And turn it into function of call(name, suffix) < $< > $@, that would be awesome. I tried many >>>> times, various ways, but if I get rid of those three lines, I always duplicated targets:( >>> >>> I can suggest not to pre-process .rs file, but to preprocess config file instead and read it on >>> startup. >>> >>> >> >> > > -- Jiri Vanek Senior QE engineer, OpenJDK QE lead, Mgr. Red Hat Czech jvanek at redhat.com M: +420775390109 From jvanek at redhat.com Fri Dec 8 13:17:52 2017 From: jvanek at redhat.com (Jiri Vanek) Date: Fri, 8 Dec 2017 14:17:52 +0100 Subject: [rfc] added preprocessing to rust launchers In-Reply-To: References: <986a73db-ce77-f719-0c15-6c8cd54bad99@redhat.com> Message-ID: <0beae8f9-1f7d-c4c7-3948-98ee1b46526e@redhat.com> On 12/08/2017 11:21 AM, Jiri Vanek wrote: > On 12/06/2017 07:46 PM, Alex Kashchenko wrote: >> On 12/06/2017 02:50 PM, Jiri Vanek wrote: >>> Hello! >>> >>> Thanx for feedback. I had week long personal battle whether to have it preprocessed with some >>> solid defaults, or to use config file. It ehnded 51:49 for preprocess. No it is 99:1 for config >>> file:) >>> >>> What location do you suggest? >> >> The same directory, where launcher binary is, will be the most convenient. So it can be read with: >> executable_directory() + "/conf_file_name". > > But that is no way with linux fs conventions for distribution packages. > > So the fall back will need to stay in place > > 1)xdg_confidir/icedtea-web/conf_file_name > 2)executable_directory() + :/conf_file_name". hmm. that is user specific:( So /etc/java/icedtea-web will need to be there to... > Anything more? > > where conf_file_name I would vote for .itw_default_paths > > And the file should be read only :) > > Thanx for thoughts! > J. >> >>> >>> >>> On 12/06/2017 01:12 PM, Alex Kashchenko wrote: >>>> Hi, >>>> >>>> On 12/05/2017 04:11 PM, Jiri Vanek wrote: >>>>> This patch is adding the possiblity to pas classapth and simialr to the rust luncher. >>>>> If there is enybody knowing the better way, and especially how to get rid of this duplicated >>>>> (triplicated x triplicated) snipept of >>>>> + MAIN_CLASS=net.sourceforge.jnlp.runtime.Boot ;\ >>>>> + BIN_LOCATION=$(bindir)/$(javaws).sh ;\ >>>>> + PROGRAM_NAME=$(javaws) ;\ >>>>> + $(edit_launcher_script) < $< > $@ >>>>> >>>>> And turn it into function of call(name, suffix) < $< > $@, that would be awesome. I tried many >>>>> times, various ways, but if I get rid of those three lines, I always duplicated targets:( >>>> >>>> I can suggest not to pre-process .rs file, but to preprocess config file instead and read it on >>>> startup. >>>> >>>> >>> >>> >> >> > > -- Jiri Vanek Senior QE engineer, OpenJDK QE lead, Mgr. Red Hat Czech jvanek at redhat.com M: +420775390109 From akashche at redhat.com Fri Dec 8 13:30:17 2017 From: akashche at redhat.com (Alex Kashchenko) Date: Fri, 8 Dec 2017 13:30:17 +0000 Subject: [rfc] added preprocessing to rust launchers In-Reply-To: <0beae8f9-1f7d-c4c7-3948-98ee1b46526e@redhat.com> References: <986a73db-ce77-f719-0c15-6c8cd54bad99@redhat.com> <0beae8f9-1f7d-c4c7-3948-98ee1b46526e@redhat.com> Message-ID: Hi, On 12/08/2017 01:17 PM, Jiri Vanek wrote: > On 12/08/2017 11:21 AM, Jiri Vanek wrote: >> On 12/06/2017 07:46 PM, Alex Kashchenko wrote: >>> On 12/06/2017 02:50 PM, Jiri Vanek wrote: >>>> Hello! >>>> >>>> Thanx for feedback. I had week long personal battle whether to have >>>> it preprocessed with some solid defaults, or to use config file. It >>>> ehnded 51:49 for preprocess. No it is 99:1 for config file:) >>>> >>>> What location do you suggest? >>> >>> The same directory, where launcher binary is, will be the most >>> convenient. So it can be read with: executable_directory() + >>> "/conf_file_name". >> >> But that is no way with linux fs conventions for distribution packages. >> >> So the fall back will need to stay in place >> >> 1)xdg_confidir/icedtea-web/conf_file_name >> 2)executable_directory() + :/conf_file_name". > > hmm. that is user specific:( > > So /etc/java/icedtea-web will need to be there to... >> Anything more? >> >> where conf_file_name I would vote for .itw_default_paths >> >> And the file should be read only :) I suggest using fixed FHS-friendly path on linux and relative-fixed (to executable) path on windows. Alternatively it may be easier to preprocess "config.rs" (containing only constants) and compile it into executable. >> >> Thanx for thoughts! >> ?? J. >> >> [...] >> -- -Alex From jvanek at redhat.com Fri Dec 8 14:31:28 2017 From: jvanek at redhat.com (Jiri Vanek) Date: Fri, 8 Dec 2017 15:31:28 +0100 Subject: [rfc][icedtea-web] no-https preffered deployment configuration switch Message-ID: There re complains about https over http in 1.6. However I dont like it, here is property disabling this feature. 2017-12-08 Jiri Vanek Added possibility to turn off https preference via deployment properties * netx/net/sourceforge/jnlp/cache/ResourceUrlCreator.java: if deployment.https.noenforce is true, then https variants are not smuggled into urlslist * netx/net/sourceforge/jnlp/config/Defaults.java: deployment.https.noenforce declared as false by default * netx/net/sourceforge/jnlp/config/DeploymentConfiguration.java: added field of KEY_HTTPS_DONT_ENFORCE = "deployment.https.noenforce" -- Jiri Vanek Senior QE engineer, OpenJDK QE lead, Mgr. Red Hat Czech jvanek at redhat.com M: +420775390109 -------------- next part -------------- A non-text attachment was scrubbed... Name: httpBackwardSwitch.patch Type: text/x-patch Size: 3333 bytes Desc: not available URL: From bugzilla-daemon at icedtea.classpath.org Fri Dec 8 17:22:31 2017 From: bugzilla-daemon at icedtea.classpath.org (bugzilla-daemon at icedtea.classpath.org) Date: Fri, 08 Dec 2017 17:22:31 +0000 Subject: [Bug 3499] [IcedTea8] Backport "8190258: Support tzdata2017c" In-Reply-To: References: Message-ID: https://icedtea.classpath.org/bugzilla/show_bug.cgi?id=3499 Andrew John Hughes changed: What |Removed |Added ---------------------------------------------------------------------------- Severity|normal |enhancement -- You are receiving this mail because: You are on the CC list for the bug. -------------- next part -------------- An HTML attachment was scrubbed... URL: From bugzilla-daemon at icedtea.classpath.org Fri Dec 8 17:22:48 2017 From: bugzilla-daemon at icedtea.classpath.org (bugzilla-daemon at icedtea.classpath.org) Date: Fri, 08 Dec 2017 17:22:48 +0000 Subject: [Bug 3500] New: [IcedTea7] Backport "8190258: Support tzdata2017c" Message-ID: https://icedtea.classpath.org/bugzilla/show_bug.cgi?id=3500 Bug ID: 3500 Summary: [IcedTea7] Backport "8190258: Support tzdata2017c" Product: IcedTea Version: 7-hg Hardware: all OS: All Status: NEW Severity: enhancement Priority: P5 Component: IcedTea Assignee: gnu.andrew at redhat.com Reporter: gnu.andrew at redhat.com CC: unassigned at icedtea.classpath.org Clone of bug 3499 for IcedTea 2.x. -- You are receiving this mail because: You are on the CC list for the bug. -------------- next part -------------- An HTML attachment was scrubbed... URL: From bugzilla-daemon at icedtea.classpath.org Fri Dec 8 17:23:09 2017 From: bugzilla-daemon at icedtea.classpath.org (bugzilla-daemon at icedtea.classpath.org) Date: Fri, 08 Dec 2017 17:23:09 +0000 Subject: [Bug 3500] [IcedTea7] Backport "8190258: Support tzdata2017c" In-Reply-To: References: Message-ID: https://icedtea.classpath.org/bugzilla/show_bug.cgi?id=3500 Andrew John Hughes changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |ASSIGNED Target Milestone|--- |2.6.13 -- You are receiving this mail because: You are on the CC list for the bug. -------------- next part -------------- An HTML attachment was scrubbed... URL: From andrew at icedtea.classpath.org Fri Dec 8 17:36:58 2017 From: andrew at icedtea.classpath.org (andrew at icedtea.classpath.org) Date: Fri, 08 Dec 2017 17:36:58 +0000 Subject: /hg/release/icedtea7-2.6: Start 2.6.13 release cycle. Message-ID: changeset fe868709e599 in /hg/release/icedtea7-2.6 details: http://icedtea.classpath.org/hg/release/icedtea7-2.6?cmd=changeset;node=fe868709e599 author: Andrew John Hughes date: Fri Dec 08 17:36:44 2017 +0000 Start 2.6.13 release cycle. 2017-12-08 Andrew John Hughes * NEWS: Add section for 2.6.13. * configure.ac: Bump to 2.6.13pre00. diffstat: ChangeLog | 5 +++++ NEWS | 2 ++ configure.ac | 2 +- 3 files changed, 8 insertions(+), 1 deletions(-) diffs (33 lines): diff -r de2f1c795665 -r fe868709e599 ChangeLog --- a/ChangeLog Wed Dec 06 04:29:28 2017 +0000 +++ b/ChangeLog Fri Dec 08 17:36:44 2017 +0000 @@ -1,3 +1,8 @@ +2017-12-08 Andrew John Hughes + + * NEWS: Add section for 2.6.13. + * configure.ac: Bump to 2.6.13pre00. + 2017-12-05 Andrew John Hughes * NEWS: Add missing reference to PR3476 diff -r de2f1c795665 -r fe868709e599 NEWS --- a/NEWS Wed Dec 06 04:29:28 2017 +0000 +++ b/NEWS Fri Dec 08 17:36:44 2017 +0000 @@ -12,6 +12,8 @@ CVE-XXXX-YYYY: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=XXXX-YYYY +New in release 2.6.13 (2018-01-XX): + New in release 2.6.12 (2017-12-05): * Security fixes diff -r de2f1c795665 -r fe868709e599 configure.ac --- a/configure.ac Wed Dec 06 04:29:28 2017 +0000 +++ b/configure.ac Fri Dec 08 17:36:44 2017 +0000 @@ -1,4 +1,4 @@ -AC_INIT([icedtea], [2.6.12], [distro-pkg-dev at openjdk.java.net]) +AC_INIT([icedtea], [2.6.13pre00], [distro-pkg-dev at openjdk.java.net]) AM_INIT_AUTOMAKE([1.9 tar-pax foreign]) AM_MAINTAINER_MODE([enable]) AC_CONFIG_FILES([Makefile]) From andrew at icedtea.classpath.org Fri Dec 8 17:41:31 2017 From: andrew at icedtea.classpath.org (andrew at icedtea.classpath.org) Date: Fri, 08 Dec 2017 17:41:31 +0000 Subject: /hg/icedtea7: Add 2.6.12 release notes. Message-ID: changeset d8d7d39b8253 in /hg/icedtea7 details: http://icedtea.classpath.org/hg/icedtea7?cmd=changeset;node=d8d7d39b8253 author: Andrew John Hughes date: Fri Dec 08 17:41:13 2017 +0000 Add 2.6.12 release notes. 2017-12-08 Andrew John Hughes * NEWS: Add 2.6.12 release notes. diffstat: ChangeLog | 4 ++ NEWS | 113 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++-- 2 files changed, 113 insertions(+), 4 deletions(-) diffs (143 lines): diff -r 815ac08b2ac7 -r d8d7d39b8253 ChangeLog --- a/ChangeLog Wed Nov 15 17:00:40 2017 +0000 +++ b/ChangeLog Fri Dec 08 17:41:13 2017 +0000 @@ -1,3 +1,7 @@ +2017-12-08 Andrew John Hughes + + * NEWS: Add 2.6.12 release notes. + 2017-11-14 Andrew John Hughes PR3494: Skip AES test on AArch64 due to VM crash diff -r 815ac08b2ac7 -r d8d7d39b8253 NEWS --- a/NEWS Wed Nov 15 17:00:40 2017 +0000 +++ b/NEWS Fri Dec 08 17:41:13 2017 +0000 @@ -19,19 +19,124 @@ - PR3493: Run AES test to test intrinsics * Backports - S8076221, PR2809, RH1302385: Disable RC4 cipher suites + - S8078823, PR2809: javax/net/ssl/ciphersuites/DisabledAlgorithms.java fails intermittently + - S8148516, PR2809: Improve the default strength of EC in JDK [test/javax/net/ssl/ciphersuites/DisabledAlgorithms.java update] +* Bug fixes + - PR3162: Remove reference to AbstractPlainDatagramSocketImpl.c, removed in 8072466 + - PR3494: Skip AES test on AArch64 due to VM crash + +New in release 2.6.12 (2017-12-05): + +* Security fixes + - S8165543: Better window framing + - S8169026, CVE-2017-10274: Handle smartcard clean up better + - S8169966: Larger AWT menus + - S8170218: Improved Font Metrics + - S8171252: Improve exception checking + - S8171261: Stability fixes for lcms + - S8174109, CVE-2017-10281: Better queuing priorities + - S8174966, CVE-2017-10285: Unreferenced references + - S8175940: More certificate subject checking + - S8176751, CVE-2017-10295: Better URL connections + - S8178794, CVE-2017-10388: Correct Kerberos ticket grants + - S8179101, CVE-2017-10193: Improve algorithm constraints implementation + - S8179998, CVE-2017-10198: Clear certificate chain connections + - S8180024: Improve construction of objects during deserialization + - S8180711, CVE-2017-10346: Better invokespecial checks + - S8181100, CVE-2017-10350: Better Base Exceptions + - S8181323, CVE-2017-10347: Better timezone processing + - S8181327, CVE-2017-10349: Better X processing + - S8181370, CVE-2017-10345: Better keystore handling + - S8181432, CVE-2017-10348: Better processing of unresolved permissions + - S8181597, CVE-2017-10357: Process Proxy presentation + - S8181612, CVE-2017-10355: More stable connection processing + - S8181692, CVE-2017-10356: Update storage implementations + - S8183028, CVE-2016-10165: Improve CMS header processing + - S8184682, CVE-2016-9840, CVE-2016-9841, CVE-2016-9842, CVE-2016-9843: Upgrade compression library +* Import of OpenJDK 7 u161 build 0 + - S6475361: Attempting to remove help menu from java.awt.MenuBar throws NullPointerException + - S6637288: Add OCSP support to PKIX CertPathBuilder implementation + - S6854712: Revocation checking enhancements (JEP-124) + - S6904367: (coll) IdentityHashMap is resized before exceeding the expected maximum size + - S7015157: String "Tabular Navigation" should be rephrased for avoiding mistranslation + - S7115744: Do not call File::deleteOnExit in security tests + - S7126011: ReverseBuilder.getMatchingCACerts may throws NPE + - S7147336: clarification on warning of keytool -printcrl + - S7162687: enhance KDC server availability detection + - S7176627: CertPath/jep124/PreferCRL_SoftFail test fails (Could not determine revocation status) + - S7195409: CertPath/CertPathValidatorTest/KeyParamsInheritanceTest fails with NullPointerException + - S7196382: PKCS11 provider should support 2048-bit DH + - S7197672: There are issues with shared data on windows + - S7199939: DSA 576 and 640 bit keys fail when initializing for No precomputed parameters + - S8002074: Support for AES on SPARC + - S8005408: KeyStore API enhancements + - S8006863: javadoc cleanup for 8005408 + - S8006946: PKCS12 test failure due to incorrect alias name + - S8006951: Avoid storing duplicate PKCS12 attributes + - S8006994: Cleanup PKCS12 tests to ensure streams get closed + - S8007483: attributes are ignored when loading keys from a PKCS12 keystore + - S8007967: Infinite loop can happen in sun.security.provider.certpath.SunCertPathBuilder.depthFirstSearchForward() + - S8010112: NullPointerException in sun.security.provider.certpath.CertId() + - S8012900: CICO ignores AAD in GCM mode (with refactoring from 6996769) + - S8015571: OCSP validation fails if ocsp.responderCertSubjectName is set + - S8016252: More defensive HashSet.readObject + - S8025215: jdk8 l10n resource file translation update 4 + - S8026943: SQE test jce/Global/Cipher/SameBuffer failed + - S8027575: b113 causing a lot of memory allocation and regression for wls_webapp_atomics + - S8029659: Keytool, print key algorithm of certificate or key entry + - S8029788: Certificate validation - java.lang.ClassCastException + - S8031825: OCSP client can't find responder cert if it uses a different subject key id algorithm than responderID + - S8033117: PPC64: Adapt to 8002074: Support for AES on SPARC + - S8035623: [parfait] JNI exception pending in jdk/src/windows/native/sun/windows/awt_Font.cpp + - S8049312: AES/CICO test failed with on several modes + - S8050374: More Signature tests + - S8057810: New defaults for DSA keys in jarsigner and keytool + - S8062552: Support keystore type detection for JKS and PKCS12 keystores + - S8068427: Hashtable deserialization reconstitutes table with wrong capacity + - S8068881: SIGBUS in C2 compiled method weblogic.wsee.jaxws.framework.jaxrpc.EnvironmentFactory$SimulatedWsdlDefinitions. - S8075484, PR3474, RH1490713: SocketInputStream.socketRead0 can hang even with soTimeout set - - S8078823, PR2809: javax/net/ssl/ciphersuites/DisabledAlgorithms.java fails intermittently + - S8077670: sun/security/krb5/auto/MaxRetries.java may fail with BindException + - S8079129: NullPointerException in PKCS#12 Keystore in PKCS12KeyStore.java + - S8087144: sun/security/krb5/auto/MaxRetries.java fails with Retry count is -1 less + - S8136534: Loading JKS keystore using non-null InputStream results in closed stream + - S8149411: PKCS12KeyStore cannot extract AES Secret Keys + - S8153146: sun/security/krb5/auto/MaxRetries.java failed with timeout + - S8157561: Ship the unlimited policy files in JDK Updates + - S8158517: Minor optimizations to ISO10126PADDING + - S8164846: CertificateException missing cause of underlying exception + - S8165751: NPE hit with java.security.debug=provider + - S8171319: keytool should print out warnings when reading or generating cert/cert req using weak algorithms + - S8173853: IllegalArgumentException in java.awt.image.ReplicateScaleFilter + - S8176536: Improved algorithm constraints checking + - S8177569: keytool should not warn if signature algorithm used in cacerts is weak + - S8178714: PKIX validator nameConstraints check failing after change 8175940 + - S8179423: 2 security tests started failing for JDK 1.6.0 u161 b05 + - S8179564: Missing @bug for tests added with JDK-8165367 + - S8181048: Refactor existing providers to refer to the same constants for default values for key length + - S8182879: Add warnings to keytool when using JKS and JCEKS + - S8184673, PR3476: Fix compatibility issue in AlgorithmChecker for 3rd party JCE providers + - S8184937: LCMS error 13: Couldn't link the profiles + - S8185039: Incorrect GPL header causes RE script to miss swap to commercial header for licensee source bundle + - S8185040: Incorrect GPL header causes RE script to miss swap to commercial header for licensee source bundle + - S8185778: 8u151 L10n resource file update + - S8185845: Add SecurityTools.java test library + - S8186503: sun/security/tools/jarsigner/DefaultSigalg.java failed after backport to JDK 6/7/8 + - S8186533: 8u151 L10n resource file update md20 + - S8191137: keytool fails to format resource strings for keys for some languages after JDK-8171319 + - S8191840: Update localizations with positional arguments following JDK-8191137 + - S8191845: [TEST_BUG] Too many new-lines in backport of WeakAlg test +* Import of OpenJDK 7 u151 build 1 + - S8035640: JNU_CHECK_EXCEPTION should support c++ JNI syntax +* Backports - S8138745, PR3465, RH1484399: Implement ExitOnOutOfMemory and CrashOnOutOfMemory in HotSpot - - S8148516, PR2809: Improve the default strength of EC in JDK [test/javax/net/ssl/ciphersuites/DisabledAlgorithms.java update] - S8185164, PR3433: GetOwnedMonitorInfo() returns incorrect owned monitor - S8188030, PR3460, RH1484079: AWT java apps fail to start when some minimal fonts are present * Bug fixes - - PR3162: Remove reference to AbstractPlainDatagramSocketImpl.c, removed in 8072466 - PR3470, RH1492139: Hotspot object_alloc tapset uses HeapWordSize incorrectly - PR3480, RH1486025: ECC and NSS JVM crash - - PR3494: Skip AES test on AArch64 due to VM crash * AArch64 port - S8145438, PR3443, RH1482244: Guarantee failures since 8144028: Use AArch64 bit-test instructions in C2 + - PR3497: AArch64: Adapt to 8002074: Support for AES on SPARC New in release 2.6.11 (2017-08-08): From jvanek at redhat.com Mon Dec 11 16:33:29 2017 From: jvanek at redhat.com (Jiri Vanek) Date: Mon, 11 Dec 2017 17:33:29 +0100 Subject: [rfc] added preprocessing to rust launchers In-Reply-To: <0beae8f9-1f7d-c4c7-3948-98ee1b46526e@redhat.com> References: <986a73db-ce77-f719-0c15-6c8cd54bad99@redhat.com> <0beae8f9-1f7d-c4c7-3948-98ee1b46526e@redhat.com> Message-ID: <6de035ee-1c16-c026-9b31-c68908b63c9a@redhat.com> Hi Alex! Please see addapted version. 2017-12-11 Jiri Vanek * Makefile.am: preprocessing hardoced_paths.rs.in for each binary and creating libs * rust-launcher/launchers.rs: now uses new, future lib * rust-launcher/hardoced_paths.rs.in: source for all hardcoded libs we currently use J. On 12/08/2017 02:17 PM, Jiri Vanek wrote: > On 12/08/2017 11:21 AM, Jiri Vanek wrote: >> On 12/06/2017 07:46 PM, Alex Kashchenko wrote: >>> On 12/06/2017 02:50 PM, Jiri Vanek wrote: >>>> Hello! >>>> >>>> Thanx for feedback. I had week long personal battle whether to have it preprocessed with some >>>> solid defaults, or to use config file. It ehnded 51:49 for preprocess. No it is 99:1 for config >>>> file:) >>>> >>>> What location do you suggest? >>> >>> The same directory, where launcher binary is, will be the most convenient. So it can be read >>> with: executable_directory() + "/conf_file_name". >> >> But that is no way with linux fs conventions for distribution packages. >> >> So the fall back will need to stay in place >> >> 1)xdg_confidir/icedtea-web/conf_file_name >> 2)executable_directory() + :/conf_file_name". > > hmm. that is user specific:( > > So /etc/java/icedtea-web will need to be there to... >> Anything more? >> >> where conf_file_name I would vote for .itw_default_paths >> >> And the file should be read only :) >> >> Thanx for thoughts! >> J. >>> >>>> >>>> >>>> On 12/06/2017 01:12 PM, Alex Kashchenko wrote: >>>>> Hi, >>>>> >>>>> On 12/05/2017 04:11 PM, Jiri Vanek wrote: >>>>>> This patch is adding the possiblity to pas classapth and simialr to the rust luncher. >>>>>> If there is enybody knowing the better way, and especially how to get rid of this duplicated >>>>>> (triplicated x triplicated) snipept of >>>>>> + MAIN_CLASS=net.sourceforge.jnlp.runtime.Boot ;\ >>>>>> + BIN_LOCATION=$(bindir)/$(javaws).sh ;\ >>>>>> + PROGRAM_NAME=$(javaws) ;\ >>>>>> + $(edit_launcher_script) < $< > $@ >>>>>> >>>>>> And turn it into function of call(name, suffix) < $< > $@, that would be awesome. I tried >>>>>> many times, various ways, but if I get rid of those three lines, I always duplicated targets:( >>>>> >>>>> I can suggest not to pre-process .rs file, but to preprocess config file instead and read it on >>>>> startup. >>>>> >>>>> >>>> >>>> >>> >>> >> >> > > -- Jiri Vanek Senior QE engineer, OpenJDK QE lead, Mgr. Red Hat Czech jvanek at redhat.com M: +420775390109 -------------- next part -------------- A non-text attachment was scrubbed... Name: preprocessedRustLaunchers2.patch Type: text/x-patch Size: 3372 bytes Desc: not available URL: From bugzilla-daemon at icedtea.classpath.org Tue Dec 12 03:57:46 2017 From: bugzilla-daemon at icedtea.classpath.org (bugzilla-daemon at icedtea.classpath.org) Date: Tue, 12 Dec 2017 03:57:46 +0000 Subject: [Bug 3501] New: [IcedTea8] Revert 8165320 so as not to revert the work of 8034174 (PR2290) Message-ID: https://icedtea.classpath.org/bugzilla/show_bug.cgi?id=3501 Bug ID: 3501 Summary: [IcedTea8] Revert 8165320 so as not to revert the work of 8034174 (PR2290) Product: IcedTea Version: 8-hg Hardware: all OS: All Status: NEW Severity: normal Priority: P5 Component: IcedTea Assignee: gnu.andrew at redhat.com Reporter: gnu.andrew at redhat.com CC: unassigned at icedtea.classpath.org "8165320: Small flaw when integrating 8160174 to JDK8" is an additional fix in backporting 8160174 to OpenJDK 8 to change direct calls to socket in OpenJDK 9 to calls to JVM_Socket. In IcedTea 3, we don't need this change as we've backported 8034174, which replaces the JVM_* calls. To include 8165320 would be to revert some of the work of 8034174. -- You are receiving this mail because: You are on the CC list for the bug. -------------- next part -------------- An HTML attachment was scrubbed... URL: From bugzilla-daemon at icedtea.classpath.org Tue Dec 12 03:58:14 2017 From: bugzilla-daemon at icedtea.classpath.org (bugzilla-daemon at icedtea.classpath.org) Date: Tue, 12 Dec 2017 03:58:14 +0000 Subject: [Bug 3481] [TRACKER] IcedTea 3.7.0 Release In-Reply-To: References: Message-ID: https://icedtea.classpath.org/bugzilla/show_bug.cgi?id=3481 Andrew John Hughes changed: What |Removed |Added ---------------------------------------------------------------------------- Depends on| |3501 -- You are receiving this mail because: You are on the CC list for the bug. -------------- next part -------------- An HTML attachment was scrubbed... URL: From bugzilla-daemon at icedtea.classpath.org Tue Dec 12 03:58:14 2017 From: bugzilla-daemon at icedtea.classpath.org (bugzilla-daemon at icedtea.classpath.org) Date: Tue, 12 Dec 2017 03:58:14 +0000 Subject: [Bug 3501] [IcedTea8] Revert 8165320 so as not to revert the work of 8034174 (PR2290) In-Reply-To: References: Message-ID: https://icedtea.classpath.org/bugzilla/show_bug.cgi?id=3501 Andrew John Hughes changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |ASSIGNED Blocks| |3481 Target Milestone|--- |3.7.0 -- You are receiving this mail because: You are on the CC list for the bug. -------------- next part -------------- An HTML attachment was scrubbed... URL: From akashche at redhat.com Tue Dec 12 13:23:46 2017 From: akashche at redhat.com (Alex Kashchenko) Date: Tue, 12 Dec 2017 13:23:46 +0000 Subject: [rfc] added preprocessing to rust launchers In-Reply-To: <6de035ee-1c16-c026-9b31-c68908b63c9a@redhat.com> References: <986a73db-ce77-f719-0c15-6c8cd54bad99@redhat.com> <0beae8f9-1f7d-c4c7-3948-98ee1b46526e@redhat.com> <6de035ee-1c16-c026-9b31-c68908b63c9a@redhat.com> Message-ID: Hi, On 12/11/2017 04:33 PM, Jiri Vanek wrote: > Hi Alex! > > Please see addapted version. > > > 2017-12-11? Jiri Vanek > ????* Makefile.am: > ????preprocessing hardoced_paths.rs.in for each binary and creating libs > ????* rust-launcher/launchers.rs: now uses new, future lib > ????* rust-launcher/hardoced_paths.rs.in: source for all hardcoded libs > we currently use I think this should work for passing build-time params. It also may be better to rename libhardoced_paths_* to config_* or something. > > [...] > -- -Alex From jvanek at icedtea.classpath.org Tue Dec 12 14:10:49 2017 From: jvanek at icedtea.classpath.org (jvanek at icedtea.classpath.org) Date: Tue, 12 Dec 2017 14:10:49 +0000 Subject: /hg/icedtea-web: 2 new changesets Message-ID: changeset 64ed9b72cfa0 in /hg/icedtea-web details: http://icedtea.classpath.org/hg/icedtea-web?cmd=changeset;node=64ed9b72cfa0 author: Jiri Vanek date: Tue Dec 12 14:58:51 2017 +0100 Added possibility to turn off https preference via deployment properties * netx/net/sourceforge/jnlp/cache/ResourceUrlCreator.java: if deployment.https.noenforce is true, then https variants are not smuggled into urlslist * netx/net/sourceforge/jnlp/config/Defaults.java: deployment.https.noenforce declared as false by default * netx/net/sourceforge/jnlp/config/DeploymentConfiguration.java: added field of KEY_HTTPS_DONT_ENFORCE = "deployment.https.noenforce" changeset 48c20674b2e4 in /hg/icedtea-web details: http://icedtea.classpath.org/hg/icedtea-web?cmd=changeset;node=48c20674b2e4 author: Jiri Vanek date: Tue Dec 12 15:09:45 2017 +0100 built-time variables propaagted to rust lunchers * Makefile.am: preprocessing hardoced_paths.rs.in for each binary and creating libs * rust-launcher/launchers.rs: now uses new, future lib * rust-launcher/hardoced_paths.rs.in: source for all hardcoded libs we currently use diffstat: ChangeLog | 16 +++++ Makefile.am | 35 ++++++++-- netx/net/sourceforge/jnlp/cache/ResourceUrlCreator.java | 21 ++++-- netx/net/sourceforge/jnlp/config/Defaults.java | 7 +- netx/net/sourceforge/jnlp/config/DeploymentConfiguration.java | 3 + rust-launcher/hardoced_paths.rs.in | 13 ++++ rust-launcher/launchers.rs | 8 ++- 7 files changed, 84 insertions(+), 19 deletions(-) diffs (176 lines): diff -r 8fc0a95eb645 -r 48c20674b2e4 ChangeLog --- a/ChangeLog Thu Nov 23 18:53:25 2017 +0100 +++ b/ChangeLog Tue Dec 12 15:09:45 2017 +0100 @@ -1,3 +1,19 @@ +2017-12-11 Jiri Vanek + + * Makefile.am: preprocessing hardoced_paths.rs.in for each binary and creating libs + * rust-launcher/launchers.rs: now uses new, future lib + * rust-launcher/hardoced_paths.rs.in: source for all hardcoded libs we currently use + +2017-12-08 Jiri Vanek + + Added possibility to turn off https preference via deployment properties + * netx/net/sourceforge/jnlp/cache/ResourceUrlCreator.java: + if deployment.https.noenforce is true, then https variants are not smuggled into urlslist + * netx/net/sourceforge/jnlp/config/Defaults.java: + deployment.https.noenforce declared as false by default + * netx/net/sourceforge/jnlp/config/DeploymentConfiguration.java: + added field of KEY_HTTPS_DONT_ENFORCE = "deployment.https.noenforce" + 2017-11-02 Jiri Vanek Added linux binary dist target diff -r 8fc0a95eb645 -r 48c20674b2e4 Makefile.am --- a/Makefile.am Thu Nov 23 18:53:25 2017 +0100 +++ b/Makefile.am Tue Dec 12 15:09:45 2017 +0100 @@ -874,17 +874,33 @@ if ENABLE_NATIVE_LAUNCHERS -launcher.build/$(javaws): rust-launcher/launchers.rs - mkdir -p launcher.build - $(RUSTC) -o $@ $< +launcher.in/libhardoced_paths_$(javaws).rs: rust-launcher/hardoced_paths.rs.in + mkdir -p launcher.in + MAIN_CLASS=net.sourceforge.jnlp.runtime.Boot ;\ + BIN_LOCATION=$(bindir)/$(javaws).sh ;\ + PROGRAM_NAME=$(javaws) ;\ + $(edit_launcher_script) < $< > $@ -launcher.build/$(itweb_settings): rust-launcher/launchers.rs +launcher.in/libhardoced_paths_$(itweb_settings).rs: rust-launcher/hardoced_paths.rs.in + mkdir -p launcher.in + MAIN_CLASS=net.sourceforge.jnlp.controlpanel.CommandLine ;\ + BIN_LOCATION=$(bindir)/$(itweb_settings).sh ;\ + PROGRAM_NAME=$(itweb_settings) ;\ + $(edit_launcher_script) < $< > $@ + +launcher.in/libhardoced_paths_$(policyeditor).rs: rust-launcher/hardoced_paths.rs.in + mkdir -p launcher.in + MAIN_CLASS=net.sourceforge.jnlp.security.policyeditor.PolicyEditor ;\ + BIN_LOCATION=$(bindir)/$(policyeditor).sh ;\ + PROGRAM_NAME=$(policyeditor) ;\ + $(edit_launcher_script) < $< > $@ + +launcher.in/libhardoced_paths_$(javaws).rlib launcher.in/libhardoced_paths_$(itweb_settings).rlib launcher.in/libhardoced_paths_$(policyeditor).rlib: %.rlib: %.rs + $(RUSTC) --crate-type=lib -o $@ $< + +launcher.build/$(javaws) launcher.build/$(itweb_settings) launcher.build/$(policyeditor): launcher.build/%: launcher.in/libhardoced_paths_%.rlib rust-launcher/launchers.rs mkdir -p launcher.build - $(RUSTC) -o $@ $< - -launcher.build/$(policyeditor): rust-launcher/launchers.rs - mkdir -p launcher.build - $(RUSTC) -o $@ $< + $(RUSTC) --extern hardcoded_paths=$< -o $@ rust-launcher/launchers.rs endif if ENABLE_SHELL_LAUNCHERS @@ -942,6 +958,7 @@ rm -f launcher.build/$(javaws) rm -f launcher.build/$(itweb_settings) rm -f launcher.build/$(policyeditor) + rm -f launcher.in endif if ENABLE_SHELL_LAUNCHERS rm -f launcher.build/$(javaws).sh diff -r 8fc0a95eb645 -r 48c20674b2e4 netx/net/sourceforge/jnlp/cache/ResourceUrlCreator.java --- a/netx/net/sourceforge/jnlp/cache/ResourceUrlCreator.java Thu Nov 23 18:53:25 2017 +0100 +++ b/netx/net/sourceforge/jnlp/cache/ResourceUrlCreator.java Tue Dec 12 15:09:45 2017 +0100 @@ -42,6 +42,8 @@ import java.util.List; import net.sourceforge.jnlp.DownloadOptions; +import net.sourceforge.jnlp.config.DeploymentConfiguration; +import net.sourceforge.jnlp.runtime.JNLPRuntime; import net.sourceforge.jnlp.util.logging.OutputController; public class ResourceUrlCreator { @@ -95,14 +97,17 @@ urls.add(resource.getLocation()); - //preffering https and owerriding case, when applciation was moved to https, but the jnlp stayed intacted - List urlsCopy = new LinkedList<>(urls); - for (URL u : urlsCopy) { - if (u.getProtocol().equals("http")) { - try { - urls.add(0, copyUrltoHttps(u)); - } catch (Exception ex) { - OutputController.getLogger().log(ex); + boolean noHttpsPreffered = Boolean.valueOf(JNLPRuntime.getConfiguration().getProperty(DeploymentConfiguration.KEY_HTTPS_DONT_ENFORCE)); + if (!noHttpsPreffered) { + //preffering https and owerriding case, when applciation was moved to https, but the jnlp stayed intacted + List urlsCopy = new LinkedList<>(urls); + for (URL u : urlsCopy) { + if (u.getProtocol().equals("http")) { + try { + urls.add(0, copyUrltoHttps(u)); + } catch (Exception ex) { + OutputController.getLogger().log(ex); + } } } } diff -r 8fc0a95eb645 -r 48c20674b2e4 netx/net/sourceforge/jnlp/config/Defaults.java --- a/netx/net/sourceforge/jnlp/config/Defaults.java Thu Nov 23 18:53:25 2017 +0100 +++ b/netx/net/sourceforge/jnlp/config/Defaults.java Tue Dec 12 15:09:45 2017 +0100 @@ -220,7 +220,12 @@ BasicValueValidators.getBooleanValidator(), String.valueOf(true) }, - { + { + DeploymentConfiguration.KEY_HTTPS_DONT_ENFORCE, + BasicValueValidators.getBooleanValidator(), + String.valueOf(false) + }, + { DeploymentConfiguration.KEY_SECURITY_PROMPT_USER_FOR_JNLP, BasicValueValidators.getBooleanValidator(), String.valueOf(true) diff -r 8fc0a95eb645 -r 48c20674b2e4 netx/net/sourceforge/jnlp/config/DeploymentConfiguration.java --- a/netx/net/sourceforge/jnlp/config/DeploymentConfiguration.java Thu Nov 23 18:53:25 2017 +0100 +++ b/netx/net/sourceforge/jnlp/config/DeploymentConfiguration.java Tue Dec 12 15:09:45 2017 +0100 @@ -151,6 +151,9 @@ public static final String KEY_SECURITY_INSTALL_AUTHENTICATOR = "deployment.security.authenticator"; public static final String KEY_STRICT_JNLP_CLASSLOADER = "deployment.jnlpclassloader.strict"; + + /** Boolean. Do not prefere https over http */ + public static final String KEY_HTTPS_DONT_ENFORCE = "deployment.https.noenforce"; /* * Networking */ diff -r 8fc0a95eb645 -r 48c20674b2e4 rust-launcher/hardoced_paths.rs.in --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/rust-launcher/hardoced_paths.rs.in Tue Dec 12 15:09:45 2017 +0100 @@ -0,0 +1,13 @@ +/*legacy variables*/ +pub static PROGRAM_NAME: &'static str = "@PROGRAM_NAME@"; +pub static LAUNCHER_BOOTCLASSPATH: &'static str = "@LAUNCHER_BOOTCLASSPATH@"; +pub static JAVAWS_SPLASH_LOCATION: &'static str = "@JAVAWS_SPLASH_LOCATION@"; +pub static JAVA: &'static str = "@JAVA@"; +pub static JRE: &'static str = "@JRE@"; +pub static MAIN_CLASS: &'static str = "@MAIN_CLASS@"; +pub static BIN_LOCATION: &'static str = "@BIN_LOCATION@"; +pub static NETX_JAR: &'static str = "@NETX_JAR@"; +pub static PLUGIN_JAR: &'static str = "@PLUGIN_JAR@"; +pub static JSOBJECT_JAR: &'static str = "@JSOBJECT_JAR@"; + +/*new variables*/ diff -r 8fc0a95eb645 -r 48c20674b2e4 rust-launcher/launchers.rs --- a/rust-launcher/launchers.rs Thu Nov 23 18:53:25 2017 +0100 +++ b/rust-launcher/launchers.rs Tue Dec 12 15:09:45 2017 +0100 @@ -1,3 +1,9 @@ +/*extern crate hardcoded_paths;*/ +extern crate hardcoded_paths; + fn main() { - println!("Hello, world!"); + println!("{}",hardcoded_paths::PROGRAM_NAME); + println!("{}",hardcoded_paths::MAIN_CLASS); + println!("{}",hardcoded_paths::JAVA); + println!("{}",hardcoded_paths::JRE); } From jvanek at icedtea.classpath.org Tue Dec 12 14:13:40 2017 From: jvanek at icedtea.classpath.org (jvanek at icedtea.classpath.org) Date: Tue, 12 Dec 2017 14:13:40 +0000 Subject: /hg/release/icedtea-web-1.7: Added possibility to turn off https... Message-ID: changeset a33238cd2d00 in /hg/release/icedtea-web-1.7 details: http://icedtea.classpath.org/hg/release/icedtea-web-1.7?cmd=changeset;node=a33238cd2d00 author: Jiri Vanek date: Tue Dec 12 15:13:04 2017 +0100 Added possibility to turn off https preference via deployment properties * netx/net/sourceforge/jnlp/cache/ResourceUrlCreator.java: if deployment.https.noenforce is true, then https variants are not smuggled into urlslist * netx/net/sourceforge/jnlp/config/Defaults.java: deployment.https.noenforce declared as false by default * netx/net/sourceforge/jnlp/config/DeploymentConfiguration.java: added field of KEY_HTTPS_DONT_ENFORCE = "deployment.https.noenforce" diffstat: ChangeLog | 10 +++++ netx/net/sourceforge/jnlp/cache/ResourceUrlCreator.java | 21 ++++++---- netx/net/sourceforge/jnlp/config/Defaults.java | 7 +++- netx/net/sourceforge/jnlp/config/DeploymentConfiguration.java | 3 + 4 files changed, 32 insertions(+), 9 deletions(-) diffs (85 lines): diff -r 629814c226ea -r a33238cd2d00 ChangeLog --- a/ChangeLog Thu Jul 20 18:12:31 2017 +0200 +++ b/ChangeLog Tue Dec 12 15:13:04 2017 +0100 @@ -1,3 +1,13 @@ +2017-12-08 Jiri Vanek + + Added possibility to turn off https preference via deployment properties + * netx/net/sourceforge/jnlp/cache/ResourceUrlCreator.java: + if deployment.https.noenforce is true, then https variants are not smuggled into urlslist + * netx/net/sourceforge/jnlp/config/Defaults.java: + deployment.https.noenforce declared as false by default + * netx/net/sourceforge/jnlp/config/DeploymentConfiguration.java: + added field of KEY_HTTPS_DONT_ENFORCE = "deployment.https.noenforce" + 2017-07-20 Jiri Vanek Post-release changes diff -r 629814c226ea -r a33238cd2d00 netx/net/sourceforge/jnlp/cache/ResourceUrlCreator.java --- a/netx/net/sourceforge/jnlp/cache/ResourceUrlCreator.java Thu Jul 20 18:12:31 2017 +0200 +++ b/netx/net/sourceforge/jnlp/cache/ResourceUrlCreator.java Tue Dec 12 15:13:04 2017 +0100 @@ -42,6 +42,8 @@ import java.util.List; import net.sourceforge.jnlp.DownloadOptions; +import net.sourceforge.jnlp.config.DeploymentConfiguration; +import net.sourceforge.jnlp.runtime.JNLPRuntime; import net.sourceforge.jnlp.util.logging.OutputController; public class ResourceUrlCreator { @@ -95,14 +97,17 @@ urls.add(resource.getLocation()); - //preffering https and owerriding case, when applciation was moved to https, but the jnlp stayed intacted - List urlsCopy = new LinkedList<>(urls); - for (URL u : urlsCopy) { - if (u.getProtocol().equals("http")) { - try { - urls.add(0, copyUrltoHttps(u)); - } catch (Exception ex) { - OutputController.getLogger().log(ex); + boolean noHttpsPreffered = Boolean.valueOf(JNLPRuntime.getConfiguration().getProperty(DeploymentConfiguration.KEY_HTTPS_DONT_ENFORCE)); + if (!noHttpsPreffered) { + //preffering https and owerriding case, when applciation was moved to https, but the jnlp stayed intacted + List urlsCopy = new LinkedList<>(urls); + for (URL u : urlsCopy) { + if (u.getProtocol().equals("http")) { + try { + urls.add(0, copyUrltoHttps(u)); + } catch (Exception ex) { + OutputController.getLogger().log(ex); + } } } } diff -r 629814c226ea -r a33238cd2d00 netx/net/sourceforge/jnlp/config/Defaults.java --- a/netx/net/sourceforge/jnlp/config/Defaults.java Thu Jul 20 18:12:31 2017 +0200 +++ b/netx/net/sourceforge/jnlp/config/Defaults.java Tue Dec 12 15:13:04 2017 +0100 @@ -220,7 +220,12 @@ BasicValueValidators.getBooleanValidator(), String.valueOf(true) }, - { + { + DeploymentConfiguration.KEY_HTTPS_DONT_ENFORCE, + BasicValueValidators.getBooleanValidator(), + String.valueOf(false) + }, + { DeploymentConfiguration.KEY_SECURITY_PROMPT_USER_FOR_JNLP, BasicValueValidators.getBooleanValidator(), String.valueOf(true) diff -r 629814c226ea -r a33238cd2d00 netx/net/sourceforge/jnlp/config/DeploymentConfiguration.java --- a/netx/net/sourceforge/jnlp/config/DeploymentConfiguration.java Thu Jul 20 18:12:31 2017 +0200 +++ b/netx/net/sourceforge/jnlp/config/DeploymentConfiguration.java Tue Dec 12 15:13:04 2017 +0100 @@ -151,6 +151,9 @@ public static final String KEY_SECURITY_INSTALL_AUTHENTICATOR = "deployment.security.authenticator"; public static final String KEY_STRICT_JNLP_CLASSLOADER = "deployment.jnlpclassloader.strict"; + + /** Boolean. Do not prefere https over http */ + public static final String KEY_HTTPS_DONT_ENFORCE = "deployment.https.noenforce"; /* * Networking */ From lbrtchx at gmail.com Thu Dec 14 14:51:20 2017 From: lbrtchx at gmail.com (Albretch Mueller) Date: Thu, 14 Dec 2017 09:51:20 -0500 Subject: checking for a JDK home directory... configure: error: "A JDK home directory could not be found. " Message-ID: after downloading the checking the hash signatures of icedtea web I got a "JDK home not found" kind of error message: ./configure checking for a BSD-compatible install... /usr/bin/install -c checking whether build environment is sane... yes checking for a thread-safe mkdir -p... /bin/mkdir -p checking for gawk... no checking for mawk... mawk checking whether make sets $(MAKE)... yes checking whether make supports nested variables... yes checking how to create a pax tar archive... gnutar checking whether to enable maintainer-specific portions of Makefiles... yes checking build system type... i686-pc-linux-gnu checking host system type... i686-pc-linux-gnu checking for gcc... gcc checking whether the C compiler works... yes . . . checking for bash... /bin/bash checking whether to compile ecj natively... no checking for zip... /usr/bin/zip checking for a JDK home directory... configure: error: "A JDK home directory could not be found. " ~ I found on the askubuntu site and explanation about why does it happen: https://askubuntu.com/questions/56104/how-can-i-install-sun-oracles-proprietary-java-jdk-6-7-8-or-jre/173951 but when I try their suggestions I find not reason for that error to bomb the configuration since there is only one java installation: # uname -a Linux IBMThnkPdT60 3.16.0-4-686-pae #1 SMP Debian 3.16.36-1+deb8u1 (2016-09-03) i686 GNU/Linux $ which java /usr/bin/java $ java -version java version "1.7.0_111" OpenJDK Runtime Environment (IcedTea 2.6.7) (7u111-2.6.7-1~deb8u1) OpenJDK Client VM (build 24.111-b01, mixed mode) # update-alternatives --config java There is only one alternative in link group java (providing /usr/bin/java): /usr/lib/jvm/java-7-openjdk-i386/jre/bin/java Nothing to configure. How can I troubleshoot that problem? lbrtchx From jvanek at redhat.com Thu Dec 14 15:03:49 2017 From: jvanek at redhat.com (Jiri Vanek) Date: Thu, 14 Dec 2017 16:03:49 +0100 Subject: checking for a JDK home directory... configure: error: "A JDK home directory could not be found. " In-Reply-To: References: Message-ID: On 12/14/2017 03:51 PM, Albretch Mueller wrote: > after downloading the checking the hash signatures of icedtea web I > got a "JDK home not found" kind of error message: > > ./configure ... > checking for a JDK home directory... configure: error: "A JDK home > directory could not be found. " > ~ > I found on the askubuntu site and explanation about why does it happen: > > https://askubuntu.com/questions/56104/how-can-i-install-sun-oracles-proprietary-java-jdk-6-7-8-or-jre/173951 > > but when I try their suggestions I find not reason for that error to > bomb the configuration since there is only one java installation: > > # uname -a > Linux IBMThnkPdT60 3.16.0-4-686-pae #1 SMP Debian 3.16.36-1+deb8u1 > (2016-09-03) i686 GNU/Linux > > $ which java > /usr/bin/java > > $ java -version > java version "1.7.0_111" > OpenJDK Runtime Environment (IcedTea 2.6.7) (7u111-2.6.7-1~deb8u1) > OpenJDK Client VM (build 24.111-b01, mixed mode) > > # update-alternatives --config java > There is only one alternative in link group java (providing > /usr/bin/java): /usr/lib/jvm/java-7-openjdk-i386/jre/bin/java > Nothing to configure. > > How can I troubleshoot that problem? You did nto wrote version of ITW. Since 1.6 jdk 7 is no longer suported and you shoudl run jdk8 Still, the configure message is about founding jdk. The paths where jdk is searched for are hardcoded. If you belive you can live with jdk7 you have shown, you can pass --with-jdk-home to configure script (eg `sh configure --with-jdk-home=/usr/lib/jvm/java-7-openjdk-i386/` HTH, feel free to keep asking! J. -- Jiri Vanek Senior QE engineer, OpenJDK QE lead, Mgr. Red Hat Czech jvanek at redhat.com M: +420775390109 From jvanek at icedtea.classpath.org Fri Dec 15 13:53:44 2017 From: jvanek at icedtea.classpath.org (jvanek at icedtea.classpath.org) Date: Fri, 15 Dec 2017 13:53:44 +0000 Subject: /hg/release/icedtea-web-1.7: 2 new changesets Message-ID: changeset 61be09286bf6 in /hg/release/icedtea-web-1.7 details: http://icedtea.classpath.org/hg/release/icedtea-web-1.7?cmd=changeset;node=61be09286bf6 author: Jiri Vanek date: Fri Dec 15 14:30:07 2017 +0100 backported: Set source language version for javadoc generation for jdk9, Get rid of X509Factory class usage, Plugin made work again with jdk9 * Makefile.am: (JAVADOC_OPTS) if HAVE_JAVA9 then -source is appended with correct IT_LANGUAGE_SOURCE_VERSION number * netx/net/sourceforge/jnlp/security/CertificateUtils.java: removed import and usage of X509Factory (replaced by hardcoded string). Still better then reflection. * configure.ac: removed check for sun.security.provider.X509Factory * launcher/launchers.in: added exports for sun.applet * plugin/icedteanp/IcedTeaNPPlugin.cc: same changeset fc7e8272a30e in /hg/release/icedtea-web-1.7 details: http://icedtea.classpath.org/hg/release/icedtea-web-1.7?cmd=changeset;node=fc7e8272a30e author: Jiri Vanek date: Fri Dec 15 14:53:03 2017 +0100 Backported work with author file: Authors made as links in html docs, PR3426 - ITW Docs do not have correct 'AUTHOR' field * netx/net/sourceforge/jnlp/util/docprovider/TextsProvider.java: isntanceof replaced by correct interface method * netx/net/sourceforge/jnlp/util/docprovider/formatters/formatters/Formatter.java: added getAdressLink and replaceLtGtCharacters methods * netx/net/sourceforge/jnlp/util/docprovider/formatters/formatters/HtmlFormatter.java: implemented newmethods. Added dummy antispam protection * netx/net/sourceforge/jnlp/util/docprovider/formatters/formatters/ReplacingTextFormatter.java: dummy impl of new methods * tests/netx/unit/net/sourceforge/jnlp/util/docprovider/ReadAutorsTest.java: adapted * AUTHORS: removed invalid space after one lt mark * Makefile: (generate-docs.stamp) added and used (where appropriate) path to src AUTHORS file. * netx/net/sourceforge/jnlp/resources/Messages.properties: added message for case, when no authors file specified on input. * netx/net/sourceforge/jnlp/util/docprovider/TextsProvider.java: implemented possibility to include authors file to documentation. * tests/netx/unit/net/sourceforge/jnlp/util/docprovider/ReadAutorsTest.java: tests for generator diffstat: AUTHORS | 3 +- ChangeLog | 30 + Makefile.am | 10 +- configure.ac | 1 - launcher/launchers.in | 4 + netx/net/sourceforge/jnlp/resources/Messages.properties | 1 + netx/net/sourceforge/jnlp/security/CertificateUtils.java | 5 +- netx/net/sourceforge/jnlp/util/docprovider/TextsProvider.java | 134 ++++++- netx/net/sourceforge/jnlp/util/docprovider/formatters/formatters/Formatter.java | 4 + netx/net/sourceforge/jnlp/util/docprovider/formatters/formatters/HtmlFormatter.java | 37 +- netx/net/sourceforge/jnlp/util/docprovider/formatters/formatters/ReplacingTextFormatter.java | 10 +- plugin/icedteanp/IcedTeaNPPlugin.cc | 3 +- tests/netx/unit/net/sourceforge/jnlp/util/docprovider/ReadAutorsTest.java | 168 ++++++++++ 13 files changed, 360 insertions(+), 50 deletions(-) diffs (truncated from 713 to 500 lines): diff -r a33238cd2d00 -r fc7e8272a30e AUTHORS --- a/AUTHORS Tue Dec 12 15:13:04 2017 +0100 +++ b/AUTHORS Fri Dec 15 14:53:03 2017 +0100 @@ -11,7 +11,7 @@ Adam Domurad Lukasz Dracz Thomas Fitzsimmons -Micha?? G??rny < mgorny at gentoo.org > +Micha?? G??rny Mark Greenwood Tereza Hlavackova Peter Hatina @@ -43,6 +43,5 @@ Man Lung Wong This project also includes code from the following projects: - OpenJDK Netx diff -r a33238cd2d00 -r fc7e8272a30e ChangeLog --- a/ChangeLog Tue Dec 12 15:13:04 2017 +0100 +++ b/ChangeLog Fri Dec 15 14:53:03 2017 +0100 @@ -1,3 +1,33 @@ +2017-15-12 Jiri Vanek + Tom???? Votava + + Authors made as links in html docs, PR3426 - ITW Docs do not have correct 'AUTHOR' field + * netx/net/sourceforge/jnlp/util/docprovider/TextsProvider.java: isntanceof replaced by correct interface method + * netx/net/sourceforge/jnlp/util/docprovider/formatters/formatters/Formatter.java: added getAdressLink and replaceLtGtCharacters methods + * netx/net/sourceforge/jnlp/util/docprovider/formatters/formatters/HtmlFormatter.java: implemented newmethods. Added dummy antispam protection + * netx/net/sourceforge/jnlp/util/docprovider/formatters/formatters/ReplacingTextFormatter.java: dummy impl of new methods + * tests/netx/unit/net/sourceforge/jnlp/util/docprovider/ReadAutorsTest.java: adapted + * AUTHORS: removed invalid space after one lt mark + * Makefile: (generate-docs.stamp) added and used (where appropriate) + path to src AUTHORS file. + * netx/net/sourceforge/jnlp/resources/Messages.properties: added message for + case, when no authors file specified on input. + * netx/net/sourceforge/jnlp/util/docprovider/TextsProvider.java: implemented + possibility to include authors file to documentation. + * tests/netx/unit/net/sourceforge/jnlp/util/docprovider/ReadAutorsTest.java: + tests for generator + +2017-15-12 Fridrich Strba + + Set source language version for javadoc generation for jdk9, Get rid of X509Factory class usage, Plugin made work again with jdk9 + * Makefile.am: (JAVADOC_OPTS) if HAVE_JAVA9 then -source is appended with + correct IT_LANGUAGE_SOURCE_VERSION number + * netx/net/sourceforge/jnlp/security/CertificateUtils.java: removed import and usage of + X509Factory (replaced by hardcoded string). Still better then reflection. + * configure.ac: removed check for sun.security.provider.X509Factory + * launcher/launchers.in: added exports for sun.applet + * plugin/icedteanp/IcedTeaNPPlugin.cc: same + 2017-12-08 Jiri Vanek Added possibility to turn off https preference via deployment properties diff -r a33238cd2d00 -r fc7e8272a30e Makefile.am --- a/Makefile.am Tue Dec 12 15:13:04 2017 +0100 +++ b/Makefile.am Fri Dec 15 14:53:03 2017 +0100 @@ -218,6 +218,9 @@ if ENABLE_DOCS JAVADOC_OPTS=-use -keywords -encoding UTF-8 -splitIndex \ -bottom ' Submit a bug or feature' +if HAVE_JAVA9 +JAVADOC_OPTS+=-source $(IT_LANGUAGE_SOURCE_VERSION) +endif if JAVADOC_SUPPORTS_J_OPTIONS JAVADOC_MEM_OPTS=-J-Xmx1024m -J-Xms128m endif @@ -727,6 +730,7 @@ HTML_DOCS_TARGET_DIR="$(DOCS_DIR)/html" ; \ PLAIN_DOCS_TARGET_DIR="$(DOCS_DIR)/plain" ; \ MAN_DOCS_TARGET_DIR="$(DOCS_DIR)/man" ; \ + AUTHORS_FILE_TARGET="$(TOP_SRC_DIR)/AUTHORS" ; \ mkdir "$$HTML_DOCS_TARGET_DIR" ; \ mkdir "$$PLAIN_DOCS_TARGET_DIR" ; \ mkdir "$$MAN_DOCS_TARGET_DIR" ; \ @@ -742,16 +746,16 @@ export LANG=$$LANG_ID; \ mkdir "$$HTML_DOCS_TARGET_DIR/$$ID" ; \ echo "
  • $$LANG_ID
  • " >> "$$HTML_DOCS_INDEX" ; \ - $$TP_COMMAND html "$$HTML_DOCS_TARGET_DIR/$$ID" $$TP_TAIL ; \ + $$TP_COMMAND html "$$HTML_DOCS_TARGET_DIR/$$ID" $$TP_TAIL "-authorFile=$$AUTHORS_FILE_TARGET" ; \ mkdir "$$PLAIN_DOCS_TARGET_DIR/$$ID" ; \ - $$TP_COMMAND plain "$$PLAIN_DOCS_TARGET_DIR/$$ID" 160 $$TP_TAIL; \ + $$TP_COMMAND plain "$$PLAIN_DOCS_TARGET_DIR/$$ID" 160 $$TP_TAIL "-authorFile=$$AUTHORS_FILE_TARGET" ; \ if [ $$ID = "en" ] ; then \ MAN_DESC="$$MAN_DOCS_TARGET_DIR/man1" ; \ else \ MAN_DESC="$$MAN_DOCS_TARGET_DIR/$$ID/man1" ; \ fi ; \ mkdir -p "$$MAN_DESC" ; \ - $$TP_COMMAND man $$ENCOD "$$MAN_DESC" $$TP_TAIL ; \ + $$TP_COMMAND man $$ENCOD "$$MAN_DESC" $$TP_TAIL "-authorFile=$$AUTHORS_FILE_TARGET" ; \ $$TP_COMMAND htmlIntro "$(NETX_DIR)/net/sourceforge/jnlp/resources/about_$$ID.html" $$TP_TAIL; \ done ; \ export LANG=$$LANG_BACKUP ; \ diff -r a33238cd2d00 -r fc7e8272a30e configure.ac --- a/configure.ac Tue Dec 12 15:13:04 2017 +0100 +++ b/configure.ac Fri Dec 15 14:53:03 2017 +0100 @@ -95,7 +95,6 @@ IT_CHECK_FOR_CLASS(JAVA_NET_HTTPCOOKIE, [java.net.HttpCookie], [some.pkg], []) IT_CHECK_FOR_CLASS(JAVA_NET_COOKIEHANDLER, [java.net.CookieHandler], [some.pkg], []) # in jdk9, those classes are using internal apis, must be enabled via module cheats -IT_CHECK_FOR_CLASS(SUN_SECURITY_PROVIDER_X509FACTORY, [sun.security.provider.X509Factory], [some.pkg], [$JAVA_BASE]) IT_CHECK_FOR_CLASS(SUN_SECURITY_UTIL_SECURITYCONSTANTS, [sun.security.util.SecurityConstants], [some.pkg], [$JAVA_BASE]) IT_CHECK_FOR_CLASS(SUN_SECURITY_UTIL_HOSTNAMECHECKER, [sun.security.util.HostnameChecker], [some.pkg], [$JAVA_BASE]) IT_CHECK_FOR_CLASS(SUN_SECURITY_X509_X500NAME, [sun.security.x509.X500Name], [some.pkg], [$JAVA_BASE]) diff -r a33238cd2d00 -r fc7e8272a30e launcher/launchers.in --- a/launcher/launchers.in Tue Dec 12 15:13:04 2017 +0100 +++ b/launcher/launchers.in Fri Dec 15 14:53:03 2017 +0100 @@ -167,6 +167,10 @@ k=$((k+1)) COMMAND[k]="java.base/sun.net.www.protocol.http=ALL-UNNAMED,java.desktop" k=$((k+1)) +COMMAND[k]="--add-exports" +k=$((k+1)) +COMMAND[k]="java.desktop/sun.applet=ALL-UNNAMED,jdk.jsobject" +k=$((k+1)) fi diff -r a33238cd2d00 -r fc7e8272a30e netx/net/sourceforge/jnlp/resources/Messages.properties --- a/netx/net/sourceforge/jnlp/resources/Messages.properties Tue Dec 12 15:13:04 2017 +0100 +++ b/netx/net/sourceforge/jnlp/resources/Messages.properties Fri Dec 15 14:53:03 2017 +0100 @@ -30,6 +30,7 @@ BUTback=Back BUTforward=Forward BUTreload=Reload +ITWdocsMissingAuthors=See authors file HEADLESS_MISSCONFIGURED=Headless check failed. You are forced to run without any graphics. IcedTea-Web can run like this, but your app probably not. This is likely bug in your system. diff -r a33238cd2d00 -r fc7e8272a30e netx/net/sourceforge/jnlp/security/CertificateUtils.java --- a/netx/net/sourceforge/jnlp/security/CertificateUtils.java Tue Dec 12 15:13:04 2017 +0100 +++ b/netx/net/sourceforge/jnlp/security/CertificateUtils.java Fri Dec 15 14:53:03 2017 +0100 @@ -58,7 +58,6 @@ import net.sourceforge.jnlp.runtime.Translator; import net.sourceforge.jnlp.util.logging.OutputController; import net.sourceforge.jnlp.util.replacements.BASE64Encoder; -import sun.security.provider.X509Factory; /** * Common utilities to manipulate certificates. Provides methods to add @@ -193,9 +192,9 @@ CertificateException { BASE64Encoder encoder = new BASE64Encoder(); - out.println(X509Factory.BEGIN_CERT); + out.println("-----BEGIN CERTIFICATE-----"); encoder.encodeBuffer(cert.getEncoded(), out); - out.println(X509Factory.END_CERT); + out.println("-----END CERTIFICATE-----"); } public static void dumpPKCS12(String alias, File file, KeyStore ks, char[] password) diff -r a33238cd2d00 -r fc7e8272a30e netx/net/sourceforge/jnlp/util/docprovider/TextsProvider.java --- a/netx/net/sourceforge/jnlp/util/docprovider/TextsProvider.java Tue Dec 12 15:13:04 2017 +0100 +++ b/netx/net/sourceforge/jnlp/util/docprovider/TextsProvider.java Fri Dec 15 14:53:03 2017 +0100 @@ -33,18 +33,23 @@ this exception to your version of the library, but you are not obligated to do so. If you do not wish to do so, delete this exception statement from your version. -*/ - + */ package net.sourceforge.jnlp.util.docprovider; +import java.io.BufferedReader; import java.io.BufferedWriter; import java.io.File; +import java.io.FileInputStream; import java.io.FileOutputStream; import java.io.IOException; import java.io.InputStream; +import java.io.InputStreamReader; import java.io.OutputStream; import java.io.OutputStreamWriter; +import java.io.Reader; import java.io.Writer; +import java.util.ArrayList; +import java.util.Arrays; import java.util.Collections; import java.util.Comparator; import java.util.List; @@ -63,13 +68,16 @@ import net.sourceforge.jnlp.util.docprovider.formatters.formatters.ReplacingTextFormatter; public abstract class TextsProvider { + + private static File authorFileFromUserInput = null; private final String encoding; private final Formatter formatter; private final boolean forceTitles; protected final boolean expandVariables; private boolean prepared = false; - + private File authorFilePath = null; + private boolean introduction = true; private boolean synopsis = true; private boolean description = true; @@ -184,7 +192,6 @@ for (Map.Entry> entry : defs) { if (matchSttingsValueWithInfrastrucutreFile(entry.getValue(), f)) { controlledBy = " " + Translator.R("BUTControlledBy", getFormatter().getBold(entry.getKey())); - break; } } @@ -271,13 +278,9 @@ public String getAuthors() { if (forceTitles) { return getFormatter().getTitle(ManFormatter.KnownSections.AUTHOR) - + getFormatter().wrapParagraph( - getFormatter().process(Translator.R("ITWTBdebug")) - + getFormatter().getNewLine()); + + generateAuthorsSection(authorFilePath); } else { - return getFormatter().wrapParagraph( - getFormatter().process(Translator.R("ITWTBdebug")) - + getFormatter().getNewLine()); + return generateAuthorsSection(authorFilePath); } } @@ -399,7 +402,7 @@ public static void main(String[] args) throws IOException { // Shutdown hook from OutputController was causing hanging build on Windows. It's not used on headless. JNLPRuntime.setHeadless(true); - + if (args.length == 0) { System.out.println(" * IcedTea-Web self documentation tool list of arguments *"); System.out.println(" * argument version - last parameter of each command, is used when there is no internal versionknown *"); @@ -412,24 +415,38 @@ System.out.println("man encoding targetDir expand version - will generate man documentation to target dir in desired encoding"); System.out.println("plain targetDir maxLineWidth expand version - will generate plain text documentation to target dir in desired encoding"); System.out.println(" - maxLineWidth is in <5," + Integer.MAX_VALUE + ">"); + System.out.println("to generate informations about authors from a file, use argument '-authorFile' with path to AUTHORS file located in icedtea-web." + + "\n eg. -authorFile=/home/user/icedtea-web/AUTHORS"); } else { - ReplacingTextFormatter.backupVersion = args[args.length - 1]; - boolean expand = Boolean.valueOf(args[args.length - 2]); - switch (args[0]) { + List argsList = new ArrayList<>(); + argsList.addAll(Arrays.asList(args)); + for (String s : argsList) { + if (s.startsWith("-authorFile=")) { + authorFileFromUserInput = new File(s.split("=")[1]); + if (!authorFileFromUserInput.exists()) { + throw new RuntimeException(authorFileFromUserInput.getAbsolutePath() + " does not exists"); + } + argsList.remove(s); + break; + } + } + ReplacingTextFormatter.backupVersion = argsList.get(argsList.size() - 1); + boolean expand = Boolean.valueOf(argsList.get(argsList.size() - 2)); + switch (argsList.get(0)) { case "all": generateAll(new File(System.getProperty("user.dir")), expand); break; case "html": - generateOnlineHtmlHelp(new File(args[1]), expand); + generateOnlineHtmlHelp(new File(argsList.get(1)), expand); break; case "htmlIntro": - generateItwIntro(new File(args[1]), expand); + generateItwIntro(new File(argsList.get(1)), expand); break; case "man": - generateManText(args[1], new File(args[2]), expand); + generateManText(argsList.get(1), new File(argsList.get(2)), expand); break; case "plain": - generatePlainTextDocs(new File(args[1]), Integer.valueOf(args[2]), expand); + generatePlainTextDocs(new File(argsList.get(1)), Integer.valueOf(argsList.get(2)), expand); break; default: System.out.println("unknown param"); @@ -441,6 +458,7 @@ public static void generateItwIntro(File f, boolean expand) throws IOException { IcedTeaWebTextsProvider itw = new IcedTeaWebTextsProvider("utf-8", new HtmlFormatter(false, true, false), false, expand); + //!!AUTHORS FILE IS NOT NEEDED IN THIS METHOD, AUTHORS ARE GENERATED SEPARATELY INTO ANOTHER TAB itw.setSeeAlso(false); itw.writeToFile(f); } @@ -481,15 +499,15 @@ } } JavaWsTextsProvider javaws = new JavaWsTextsProvider(encoding, new HtmlFormatter(allowContext, allowLogo, includeXmlHeader), titles, expand); - javaws.writeToDir(dir); ItwebSettingsTextsProvider itws = new ItwebSettingsTextsProvider(encoding, new HtmlFormatter(allowContext, allowLogo, includeXmlHeader), titles, expand); - itws.writeToDir(dir); PolicyEditorTextsProvider pe = new PolicyEditorTextsProvider(encoding, new HtmlFormatter(allowContext, allowLogo, includeXmlHeader), titles, expand); - pe.writeToDir(dir); IcedTeaWebTextsProvider itw = new IcedTeaWebTextsProvider(encoding, new HtmlFormatter(allowContext, allowLogo, includeXmlHeader), titles, expand); - itw.writeToDir(dir); ItwebPluginTextProvider pl = new ItwebPluginTextProvider(encoding, new HtmlFormatter(allowContext, allowLogo, includeXmlHeader), titles, expand); - pl.writeToDir(dir); + TextsProvider[] providers = new TextsProvider[]{javaws, itws, pe, itw, pl}; + for (TextsProvider provider : providers) { + provider.setAuthorFilePath(authorFileFromUserInput); + provider.writeToDir(dir); + } } @@ -499,15 +517,15 @@ public static void generateManText(String encoding, File dir, boolean titles, boolean expand) throws IOException { JavaWsTextsProvider javaws = new JavaWsTextsProvider(encoding, new ManFormatter(), titles, expand); - javaws.writeToDir(dir); ItwebSettingsTextsProvider itws = new ItwebSettingsTextsProvider(encoding, new ManFormatter(), titles, expand); - itws.writeToDir(dir); PolicyEditorTextsProvider pe = new PolicyEditorTextsProvider(encoding, new ManFormatter(), titles, expand); - pe.writeToDir(dir); IcedTeaWebTextsProvider itw = new IcedTeaWebTextsProvider(encoding, new ManFormatter(), titles, expand); - itw.writeToDir(dir); ItwebPluginTextProvider pl = new ItwebPluginTextProvider(encoding, new ManFormatter(), titles, expand); - pl.writeToDir(dir); + TextsProvider[] providers = new TextsProvider[]{javaws, itws, pe, itw, pl}; + for (TextsProvider provider : providers) { + provider.setAuthorFilePath(authorFileFromUserInput); + provider.writeToDir(dir); + } } @@ -517,15 +535,15 @@ public static void generatePlainTextDocs(String encoding, File dir, String indent, int lineWidth, boolean titles, boolean expand) throws IOException { JavaWsTextsProvider javaws = new JavaWsTextsProvider(encoding, new PlainTextFormatter(indent, lineWidth), titles, expand); - javaws.writeToDir(dir); ItwebSettingsTextsProvider itws = new ItwebSettingsTextsProvider(encoding, new PlainTextFormatter(indent, lineWidth), titles, expand); - itws.writeToDir(dir); PolicyEditorTextsProvider pe = new PolicyEditorTextsProvider(encoding, new PlainTextFormatter(indent, lineWidth), titles, expand); - pe.writeToDir(dir); IcedTeaWebTextsProvider itw = new IcedTeaWebTextsProvider(encoding, new PlainTextFormatter(indent, lineWidth), titles, expand); - itw.writeToDir(dir); ItwebPluginTextProvider pl = new ItwebPluginTextProvider(encoding, new PlainTextFormatter(indent, lineWidth), titles, expand); - pl.writeToDir(dir); + TextsProvider[] providers = new TextsProvider[]{javaws, itws, pe, itw, pl}; + for(TextsProvider provider : providers){ + provider.setAuthorFilePath(authorFileFromUserInput); + provider.writeToDir(dir); + } } @@ -671,6 +689,11 @@ this.authors = authors; } + public void setAuthorFilePath(File authorFilePath) { + this.authorFilePath = authorFilePath; + } + + /** * @return the seeAlso */ @@ -695,4 +718,49 @@ return s; } + private String readAuthors(File authors) { + try { + return readAuthorsImpl(authors); + } catch (IOException e) { + throw new RuntimeException(e); + } + } + + private String readAuthorsImpl(File authors) throws IOException { + return readAuthorsImpl(new InputStreamReader(new FileInputStream(authors), "UTF-8")); + + } + + String readAuthorsImpl(Reader authors) throws IOException { + StringBuilder sb = new StringBuilder(); + boolean areAuthors = false; + BufferedReader reader = new BufferedReader(authors); + while (true) { + String line = reader.readLine(); + if (line == null) { + break; + } + if (line.trim().isEmpty()) { + areAuthors = !areAuthors; + } + sb.append(getFormatter().process(getFormatter().getAdressLink(line))); + if (getFormatter() instanceof HtmlFormatter || areAuthors == false) { + sb.append(getFormatter().getNewLine()); + } + } + return sb.toString(); + } + + private String generateAuthorsSection(File filePath) { + if (filePath == null) { + return getFormatter().wrapParagraph( + getFormatter().process(Translator.R("ITWdocsMissingAuthors")) + + getFormatter().getNewLine()); + } else { + return getFormatter().wrapParagraph( + getFormatter().process(readAuthors(filePath)) + + getFormatter().getNewLine()); + } + } } + diff -r a33238cd2d00 -r fc7e8272a30e netx/net/sourceforge/jnlp/util/docprovider/formatters/formatters/Formatter.java --- a/netx/net/sourceforge/jnlp/util/docprovider/formatters/formatters/Formatter.java Tue Dec 12 15:13:04 2017 +0100 +++ b/netx/net/sourceforge/jnlp/util/docprovider/formatters/formatters/Formatter.java Fri Dec 15 14:53:03 2017 +0100 @@ -74,5 +74,9 @@ public String getTail(); public String getFileSuffix(); + + public String getAdressLink(String s); + + public String replaceLtGtCharacters(String s); } diff -r a33238cd2d00 -r fc7e8272a30e netx/net/sourceforge/jnlp/util/docprovider/formatters/formatters/HtmlFormatter.java --- a/netx/net/sourceforge/jnlp/util/docprovider/formatters/formatters/HtmlFormatter.java Tue Dec 12 15:13:04 2017 +0100 +++ b/netx/net/sourceforge/jnlp/util/docprovider/formatters/formatters/HtmlFormatter.java Fri Dec 15 14:53:03 2017 +0100 @@ -33,8 +33,7 @@ this exception to your version of the library, but you are not obligated to do so. If you do not wish to do so, delete this exception statement from your version. -*/ - + */ package net.sourceforge.jnlp.util.docprovider.formatters.formatters; import java.util.Date; @@ -43,14 +42,15 @@ import java.util.TreeMap; import net.sourceforge.jnlp.runtime.JNLPRuntime; - public class HtmlFormatter extends ReplacingTextFormatter { private final Map content = new TreeMap<>(); private final boolean allowContext; private final boolean allowLogo; private final boolean includeXmlHeader; - public static final String SUFFIX = "html"; + private final String lT = "<"; + private final String gT = ">"; + public static final String SUFFIX = "html"; @Override public String process(String s) { @@ -58,7 +58,6 @@ return s; } - public HtmlFormatter(boolean allowContext, boolean allowLogo, boolean includeXmlHeader) { this.allowContext = allowContext; this.allowLogo = allowLogo; @@ -146,7 +145,7 @@ @Override public String getFileSuffix() { - return "."+SUFFIX; + return "." + SUFFIX; } @Override @@ -182,4 +181,30 @@ return "
  • " + key + " - " + process(value) + "
  • "; } + @Override + public String getAdressLink(String s) { + String emailDelBracket = s.replaceAll(".*<", ""); + String adress = emailDelBracket.replaceAll(">.*", ""); + if (s.contains("@")) { + String name = s.replaceAll("<.*", "").trim(); + return "" + name + ""; + } else { + return s.replaceAll("<.*>", "" + adress + ""); + } + } + + @Override + public String replaceLtGtCharacters(String s) { + String replaceLt = s.replaceAll("<", lT); + String replaceLtGt = replaceLt.replaceAll(">", gT); + return replaceLtGt; + } + + private static String antiSpam(String adress) { From jvanek at icedtea.classpath.org Fri Dec 15 14:13:52 2017 From: jvanek at icedtea.classpath.org (jvanek at icedtea.classpath.org) Date: Fri, 15 Dec 2017 14:13:52 +0000 Subject: /hg/release/icedtea-web-1.7: 3 new changesets Message-ID: changeset ad5cd0fa9fbc in /hg/release/icedtea-web-1.7 details: http://icedtea.classpath.org/hg/release/icedtea-web-1.7?cmd=changeset;node=ad5cd0fa9fbc author: Jiri Vanek date: Fri Dec 15 15:08:34 2017 +0100 Pre-release tuning * Makefile.am: (netx-html-gen.stamp) set number of changests to 7 (since 1.7) * NEWS: set date and added content for 1.7.1 * configure.ac: (AC_INIT) set to use 1.7.1 changeset c776cb66b9cb in /hg/release/icedtea-web-1.7 details: http://icedtea.classpath.org/hg/release/icedtea-web-1.7?cmd=changeset;node=c776cb66b9cb author: Jiri Vanek date: Fri Dec 15 15:11:44 2017 +0100 Added tag icedtea-web-1.7.1 for changeset ad5cd0fa9fbc changeset 2fc07b45a1f7 in /hg/release/icedtea-web-1.7 details: http://icedtea.classpath.org/hg/release/icedtea-web-1.7?cmd=changeset;node=2fc07b45a1f7 author: Jiri Vanek date: Fri Dec 15 15:13:33 2017 +0100 Post-release changes * NEWS: added 1.7.2 section * configure.ac: (AC_INIT) bumped to 1.7.2pre diffstat: .hgtags | 1 + ChangeLog | 13 +++++++++++++ Makefile.am | 2 +- NEWS | 7 ++++++- configure.ac | 2 +- 5 files changed, 22 insertions(+), 3 deletions(-) diffs (66 lines): diff -r fc7e8272a30e -r 2fc07b45a1f7 .hgtags --- a/.hgtags Fri Dec 15 14:53:03 2017 +0100 +++ b/.hgtags Fri Dec 15 15:13:33 2017 +0100 @@ -6,3 +6,4 @@ 11249cdb910bf786d98689fcc8741d9541c2a4ab icedtea-web-1.6-branchpoint b8bf710fed3a62aacffe561dc60acdbfa7e93212 icedtea-web-1.7-branchpoint 9ec82199b1a69e57606ac4fc8be5aaaef4859a09 icedtea-web-1.7 +ad5cd0fa9fbcc95676357a24e7c231502502080c icedtea-web-1.7.1 diff -r fc7e8272a30e -r 2fc07b45a1f7 ChangeLog --- a/ChangeLog Fri Dec 15 14:53:03 2017 +0100 +++ b/ChangeLog Fri Dec 15 15:13:33 2017 +0100 @@ -1,3 +1,16 @@ +2017-12-15 Jiri Vanek + + Post-release changes + * NEWS: added 1.7.2 section + * configure.ac: (AC_INIT) bumped to 1.7.2pre + +2017-12-15 Jiri Vanek + + Pre-release tuning + * Makefile.am: (netx-html-gen.stamp) set number of changests to 7 (since 1.7) + * NEWS: set date and added content for 1.7.1 + * configure.ac: (AC_INIT) set to use 1.7.1 + 2017-15-12 Jiri Vanek Tom???? Votava diff -r fc7e8272a30e -r 2fc07b45a1f7 Makefile.am --- a/Makefile.am Fri Dec 15 14:53:03 2017 +0100 +++ b/Makefile.am Fri Dec 15 15:13:33 2017 +0100 @@ -767,7 +767,7 @@ mkdir -p html-gen; \ cp AUTHORS NEWS COPYING ChangeLog html-gen/; \ export HTML_GEN_DEBUG=true; \ - ${SHELL} html-gen.sh 236; \ + ${SHELL} html-gen.sh 7; \ unset HTML_GEN_DEBUG) ${INSTALL_DATA} $(NETX_SRCDIR)/../html-gen/*.html $(NETX_RESOURCE_DIR) rm -r $(NETX_SRCDIR)/../html-gen/ diff -r fc7e8272a30e -r 2fc07b45a1f7 NEWS --- a/NEWS Fri Dec 15 14:53:03 2017 +0100 +++ b/NEWS Fri Dec 15 15:13:33 2017 +0100 @@ -8,7 +8,12 @@ CVE-XXXX-YYYY: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=XXXX-YYYY -New in release 1.7.1 (YYYY-MM-DD): +New in release 1.7.2 (YYYY-MM-DD): + +New in release 1.7.1 (2017-12-15): +* better work with authors file +* better work with jdk9 +* Added possibility to turn off https preference via deployment properties New in release 1.7 (2017-07-19): * PR3366 - bash completion file was split to three, and is setup-able by bashcompdir environment variable diff -r fc7e8272a30e -r 2fc07b45a1f7 configure.ac --- a/configure.ac Fri Dec 15 14:53:03 2017 +0100 +++ b/configure.ac Fri Dec 15 15:13:33 2017 +0100 @@ -1,4 +1,4 @@ -AC_INIT([icedtea-web],[1.7.1pre],[distro-pkg-dev at openjdk.java.net], [icedtea-web], [http://icedtea.classpath.org/wiki/IcedTea-Web]) +AC_INIT([icedtea-web],[1.7.2pre],[distro-pkg-dev at openjdk.java.net], [icedtea-web], [http://icedtea.classpath.org/wiki/IcedTea-Web]) AM_INIT_AUTOMAKE([1.9 tar-pax foreign]) AC_CONFIG_FILES([Makefile netx.manifest]) AM_MAINTAINER_MODE([enable]) From lbrtchx at gmail.com Sun Dec 17 23:48:22 2017 From: lbrtchx at gmail.com (Albretch Mueller) Date: Sun, 17 Dec 2017 18:48:22 -0500 Subject: checking for a JDK home directory... configure: error: "A JDK home directory could not be found. " In-Reply-To: References: Message-ID: OK, I followed your instructions if not exactly pretty well. I started, as you suggested, by installing the latest jdk: $ java -version openjdk version "1.8.0_131" OpenJDK Runtime Environment (build 1.8.0_131-8u131-b11-1~bpo8+1-b11) OpenJDK Server VM (build 25.131-b11, mixed mode) but I icedtea is not taking the JDK in. While trying to configure it: _LOG="icedtea-web-1.6.2_install_$(date +%Y%m%d%H%M%S).log" time (./configure --with-jdk-home="/usr/lib/jvm/java-8-openjdk-i386/jre/bin/java" --prefix="/home/debian/inst/sw/jnlp/icedtea") >> "${_LOG}" 2>&1 I get the error: checking for a JDK home directory... configure: error: "A JDK home directory could not be found. /usr/lib/jvm/java-8-openjdk-i386/jre/bin/java" // __ $ pwd /usr/lib/jvm/java-8-openjdk-i386/jre/bin $ ls -l total 184 -rwxr-xr-x 1 root root 5648 May 15 2017 java -rwxr-xr-x 1 root root 5664 May 15 2017 jjs -rwxr-xr-x 1 root root 5664 May 15 2017 keytool -rwxr-xr-x 1 root root 5676 May 15 2017 orbd -rwxr-xr-x 1 root root 5664 May 15 2017 pack200 -rwxr-xr-x 1 root root 5664 May 15 2017 policytool -rwxr-xr-x 1 root root 5664 May 15 2017 rmid -rwxr-xr-x 1 root root 5664 May 15 2017 rmiregistry -rwxr-xr-x 1 root root 5664 May 15 2017 servertool -rwxr-xr-x 1 root root 5676 May 15 2017 tnameserv -rwxr-xr-x 1 root root 102940 May 15 2017 unpack200 $ which java /usr/bin/java $ ls -l /usr/bin/java lrwxrwxrwx 1 root root 22 Sep 26 18:21 /usr/bin/java -> /etc/alternatives/java $ ls -l /etc/alternatives/java lrwxrwxrwx 1 root root 45 Dec 17 18:16 /etc/alternatives/java -> /usr/lib/jvm/java-8-openjdk-i386/jre/bin/java ~ So what is it I am not doing right now lbrtchx On 12/14/17, Jiri Vanek wrote: > On 12/14/2017 03:51 PM, Albretch Mueller wrote: >> after downloading the checking the hash signatures of icedtea web I >> got a "JDK home not found" kind of error message: >> >> ./configure > ... >> checking for a JDK home directory... configure: error: "A JDK home >> directory could not be found. " >> ~ >> I found on the askubuntu site and explanation about why does it happen: >> >> >> https://askubuntu.com/questions/56104/how-can-i-install-sun-oracles-proprietary-java-jdk-6-7-8-or-jre/173951 >> >> but when I try their suggestions I find not reason for that error to >> bomb the configuration since there is only one java installation: >> >> # uname -a >> Linux IBMThnkPdT60 3.16.0-4-686-pae #1 SMP Debian 3.16.36-1+deb8u1 >> (2016-09-03) i686 GNU/Linux >> >> $ which java >> /usr/bin/java >> >> $ java -version >> java version "1.7.0_111" >> OpenJDK Runtime Environment (IcedTea 2.6.7) (7u111-2.6.7-1~deb8u1) >> OpenJDK Client VM (build 24.111-b01, mixed mode) >> >> # update-alternatives --config java >> There is only one alternative in link group java (providing >> /usr/bin/java): /usr/lib/jvm/java-7-openjdk-i386/jre/bin/java >> Nothing to configure. >> >> How can I troubleshoot that problem? > > > You did nto wrote version of ITW. Since 1.6 jdk 7 is no longer suported and > you shoudl run jdk8 > > Still, the configure message is about founding jdk. The paths where jdk is > searched for are > hardcoded. If you belive you can live with jdk7 you have shown, you can pass > --with-jdk-home to > configure script (eg `sh configure > --with-jdk-home=/usr/lib/jvm/java-7-openjdk-i386/` > > HTH, feel free to keep asking! > J. > > > > -- > Jiri Vanek > Senior QE engineer, OpenJDK QE lead, Mgr. > Red Hat Czech > jvanek at redhat.com M: +420775390109 > From jvanek at redhat.com Mon Dec 18 09:37:33 2017 From: jvanek at redhat.com (Jiri Vanek) Date: Mon, 18 Dec 2017 10:37:33 +0100 Subject: checking for a JDK home directory... configure: error: "A JDK home directory could not be found. " In-Reply-To: References: Message-ID: <591fb3bd-a181-655f-4523-780a9dbfd7fe@redhat.com> On 12/18/2017 12:48 AM, Albretch Mueller wrote: > OK, I followed your instructions if not exactly pretty well. I > started, as you suggested, by installing the latest jdk: Jdk, right? Not only jre? Just ensuring.... > > $ java -version > openjdk version "1.8.0_131" > OpenJDK Runtime Environment (build 1.8.0_131-8u131-b11-1~bpo8+1-b11) > OpenJDK Server VM (build 25.131-b11, mixed mode) > > but I icedtea is not taking the JDK in. While trying to configure it: > > _LOG="icedtea-web-1.6.2_install_$(date +%Y%m%d%H%M%S).log" > > time (./configure > --with-jdk-home="/usr/lib/jvm/java-8-openjdk-i386/jre/bin/java" > --prefix="/home/debian/inst/sw/jnlp/icedtea") >> "${_LOG}" 2>&1 > > The issue is here. That is with-jdk-home, not with java binary :) You should be happy with: --with-jdk-home="/usr/lib/jvm/java-8-openjdk-i386" Btw, why do you need self compiled ITW? hth, J. From jvanek at icedtea.classpath.org Mon Dec 18 10:37:27 2017 From: jvanek at icedtea.classpath.org (jvanek at icedtea.classpath.org) Date: Mon, 18 Dec 2017 10:37:27 +0000 Subject: /hg/icedtea-web: launcher.in now deleted as direcotry Message-ID: changeset fa0d3ea23a8f in /hg/icedtea-web details: http://icedtea.classpath.org/hg/icedtea-web?cmd=changeset;node=fa0d3ea23a8f author: Jiri Vanek date: Mon Dec 18 11:37:00 2017 +0100 launcher.in now deleted as direcotry diffstat: Makefile.am | 2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diffs (12 lines): diff -r 48c20674b2e4 -r fa0d3ea23a8f Makefile.am --- a/Makefile.am Tue Dec 12 15:09:45 2017 +0100 +++ b/Makefile.am Mon Dec 18 11:37:00 2017 +0100 @@ -958,7 +958,7 @@ rm -f launcher.build/$(javaws) rm -f launcher.build/$(itweb_settings) rm -f launcher.build/$(policyeditor) - rm -f launcher.in + rm -rf launcher.in endif if ENABLE_SHELL_LAUNCHERS rm -f launcher.build/$(javaws).sh From lbrtchx at gmail.com Mon Dec 18 12:16:11 2017 From: lbrtchx at gmail.com (Albretch Mueller) Date: Mon, 18 Dec 2017 07:16:11 -0500 Subject: checking for a JDK home directory... configure: error: "A JDK home directory could not be found. " In-Reply-To: <591fb3bd-a181-655f-4523-780a9dbfd7fe@redhat.com> References: <591fb3bd-a181-655f-4523-780a9dbfd7fe@redhat.com> Message-ID: On 12/18/17, Jiri Vanek wrote: > The issue is here. That is with-jdk-home, not with java binary :) > You should be happy with: > --with-jdk-home="/usr/lib/jvm/java-8-openjdk-i386" this is why, especially while installing software the "hard way", you should not be doing/thinking about more than one thing ;-) > Btw, why do you need self compiled ITW? For more than one good reason I like to know what the installation assumptions are and how my baseline relates to them. Also, I have 0 zero trust towards anything Internet or being transferred over it. Now I have another "GLIB_CFLAGS and GLIB_LIBS" related problem: ~ . . . checking what version string to use... 1.6.2 checking whether to build the browser plugin... yes checking for pkg-config... no checking for GLIB... no configure: error: in `/home/debian/inst/sw/icedtea/icedtea-web-1.6.2': configure: error: The pkg-config script could not be found or is too old. Make sure it is in your PATH or set the PKG_CONFIG environment variable to the full path to pkg-config. Alternatively, you may set the environment variables GLIB_CFLAGS and GLIB_LIBS to avoid the need to call pkg-config. See the pkg-config man page for more details. To get pkg-config, see . See `config.log' for more details ~ I will publically post my installation logs so you are bothered a little less lbrtchx From jvanek at redhat.com Mon Dec 18 12:19:43 2017 From: jvanek at redhat.com (Jiri Vanek) Date: Mon, 18 Dec 2017 13:19:43 +0100 Subject: checking for a JDK home directory... configure: error: "A JDK home directory could not be found. " In-Reply-To: References: <591fb3bd-a181-655f-4523-780a9dbfd7fe@redhat.com> Message-ID: <87140bc9-f9bd-62fc-beb9-92dd443042a1@redhat.com> On 12/18/2017 01:16 PM, Albretch Mueller wrote: > On 12/18/17, Jiri Vanek wrote: >> The issue is here. That is with-jdk-home, not with java binary :) >> You should be happy with: >> --with-jdk-home="/usr/lib/jvm/java-8-openjdk-i386" > > this is why, especially while installing software the "hard way", you > should not be doing/thinking about more than one thing ;-) > >> Btw, why do you need self compiled ITW? > > For more than one good reason I like to know what the installation > assumptions are and how my baseline relates to them. Also, I have 0 > zero trust towards anything Internet or being transferred over it. If you dont trust your debian maintainers, you are doomed! ..and shoudl move to Gentoo :) > > Now I have another "GLIB_CFLAGS and GLIB_LIBS" related problem: Hmm. I'm not sure what can be wrong. Doyou have devel version of glibc? I can not give you more info then configure is giving you. Pkg config do a lot of work :( Btw, there is ITW 1.7 out. 1.7.1 have release today. You shoudl be on 1.7 row.... > ~ > . . . > checking what version string to use... 1.6.2 > checking whether to build the browser plugin... yes > checking for pkg-config... no > checking for GLIB... no > configure: error: in `/home/debian/inst/sw/icedtea/icedtea-web-1.6.2': > configure: error: The pkg-config script could not be found or is too > old. Make sure it > is in your PATH or set the PKG_CONFIG environment variable to the full > path to pkg-config. > > Alternatively, you may set the environment variables GLIB_CFLAGS > and GLIB_LIBS to avoid the need to call pkg-config. > See the pkg-config man page for more details. > > To get pkg-config, see . > See `config.log' for more details > ~ > I will publically post my installation logs so you are bothered a little less > > lbrtchx > -- Jiri Vanek Senior QE engineer, OpenJDK QE lead, Mgr. Red Hat Czech jvanek at redhat.com M: +420775390109 From jvanek at icedtea.classpath.org Mon Dec 18 12:23:14 2017 From: jvanek at icedtea.classpath.org (jvanek at icedtea.classpath.org) Date: Mon, 18 Dec 2017 12:23:14 +0000 Subject: /hg/icedtea-web: win-installer added to dsit tarball Message-ID: changeset e9b895388a5a in /hg/icedtea-web details: http://icedtea.classpath.org/hg/icedtea-web?cmd=changeset;node=e9b895388a5a author: Jiri Vanek date: Mon Dec 18 13:22:40 2017 +0100 win-installer added to dsit tarball diffstat: Makefile.am | 2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diffs (12 lines): diff -r fa0d3ea23a8f -r e9b895388a5a Makefile.am --- a/Makefile.am Mon Dec 18 11:37:00 2017 +0100 +++ b/Makefile.am Mon Dec 18 13:22:40 2017 +0100 @@ -281,7 +281,7 @@ export PLUGIN_VERSION = IcedTea-Web $(FULL_VERSION) export EXTRA_DIST = $(top_srcdir)/netx $(top_srcdir)/plugin javaws.png $(DESKTOP_IN_FILES) $(top_srcdir)/completion \ - shell-launcher rust-launcher $(top_srcdir)/tests html-gen.sh NEW_LINE_IFS $(top_srcdir)/metadata.in + shell-launcher rust-launcher $(top_srcdir)/tests html-gen.sh NEW_LINE_IFS $(top_srcdir)/metadata.in $(top_srcdir)/win-installer # reproducers `D`shortcuts export DTEST_SERVER=-Dtest.server.dir=$(REPRODUCERS_TESTS_SERVER_DEPLOYDIR) From jvanek at icedtea.classpath.org Mon Dec 18 12:23:14 2017 From: jvanek at icedtea.classpath.org (jvanek at icedtea.classpath.org) Date: Mon, 18 Dec 2017 12:23:14 +0000 Subject: /hg/release/icedtea-web-1.7: win-installer added to distribution... Message-ID: changeset dbb8dc397d15 in /hg/release/icedtea-web-1.7 details: http://icedtea.classpath.org/hg/release/icedtea-web-1.7?cmd=changeset;node=dbb8dc397d15 author: Jiri Vanek date: Mon Dec 18 13:22:51 2017 +0100 win-installer added to distribution tarball diffstat: Makefile.am | 2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diffs (12 lines): diff -r 2fc07b45a1f7 -r dbb8dc397d15 Makefile.am --- a/Makefile.am Fri Dec 15 15:13:33 2017 +0100 +++ b/Makefile.am Mon Dec 18 13:22:51 2017 +0100 @@ -254,7 +254,7 @@ export PLUGIN_VERSION = IcedTea-Web $(FULL_VERSION) export EXTRA_DIST = $(top_srcdir)/netx $(top_srcdir)/plugin javaws.png javaws.desktop.in policyeditor.desktop.in $(top_srcdir)/completion \ - itweb-settings.desktop.in launcher $(top_srcdir)/tests html-gen.sh NEW_LINE_IFS $(top_srcdir)/metadata.in + itweb-settings.desktop.in launcher $(top_srcdir)/tests html-gen.sh NEW_LINE_IFS $(top_srcdir)/metadata.in $(top_srcdir)/win-installer # reproducers `D`shortcuts export DTEST_SERVER=-Dtest.server.dir=$(REPRODUCERS_TESTS_SERVER_DEPLOYDIR) From jvanek at redhat.com Mon Dec 18 12:32:47 2017 From: jvanek at redhat.com (Jiri Vanek) Date: Mon, 18 Dec 2017 13:32:47 +0100 Subject: IcedTea-Web 1.7.1 released! Message-ID: Hello! This is very small update, caused by really lack of time for rust launchers and so for 1.8. It contains backward compatible switch for enforced https, and few more tweeks like bad authors propagation and better support for jdk9. Downloads as usually: * windows installer and redistribute-able zip archive (with binaries) * http://icedtea.wildebeest.org/download/icedtea-web-binaries/1.7.1/windows/ * ITW documentation * http://icedtea.wildebeest.org/download/icedtea-web-docs/1.7.1/ * and holy source: * http://icedtea.wildebeest.org/download/source/icedtea-web-1.7.1.tar.gz Where sources lacks the windows graphics again (fixed after release), sorry. c972cefaae1e106fc32be4c553616e71c44da21376fde62e164cb7b052043fad icedtea-web-1.7.1.tar.gz 679a92f01a1a6c633e4b9ce71b7b831d10999d61d38a5422a1931ad79c14686c icedtea-web-1.7.1.win.bin.zip 8d050d5e7987fddc029e58880870ae6cdc8d7a71de308084e47033672306a160 itw-installer.msi Happy hacking! J. From bugzilla-daemon at icedtea.classpath.org Tue Dec 19 22:00:22 2017 From: bugzilla-daemon at icedtea.classpath.org (bugzilla-daemon at icedtea.classpath.org) Date: Tue, 19 Dec 2017 22:00:22 +0000 Subject: [Bug 3502] New: Fatal: Read Error: Could not read or parse the JNLP file/ You can try downloading this file manually and sent it as bug report to ITWT. Message-ID: https://icedtea.classpath.org/bugzilla/show_bug.cgi?id=3502 Bug ID: 3502 Summary: Fatal: Read Error: Could not read or parse the JNLP file/ You can try downloading this file manually and sent it as bug report to ITWT. Product: IcedTea Version: unspecified Hardware: x86_64 OS: Linux Status: NEW Severity: enhancement Priority: P5 Component: IcedTea Assignee: gnu.andrew at redhat.com Reporter: jf at talismanmail.com CC: unassigned at icedtea.classpath.org Hello, I am trying to run https://popgen.net/soft/lositan/code2/selwb.jnlp on ubuntu 17.04 with plenty of resources. I am running this command: sudo javaws -jnlp '/home/julian/Documents/selwb4.jnlp' and getting this error: sudo javaws -jnlp '/home/julian/Documents/selwb4.jnlp' java.security.AccessControlException: access denied ("java.io.FilePermission" "/usr/bin/xprop" "execute") at java.security.AccessControlContext.checkPermission(AccessControlContext.java:472) at java.security.AccessController.checkPermission(AccessController.java:884) at java.lang.SecurityManager.checkPermission(SecurityManager.java:549) at java.lang.SecurityManager.checkExec(SecurityManager.java:796) at java.lang.ProcessBuilder.start(ProcessBuilder.java:1018) at java.lang.Runtime.exec(Runtime.java:620) at java.lang.Runtime.exec(Runtime.java:450) at java.lang.Runtime.exec(Runtime.java:347) at org.GNOME.Accessibility.AtkWrapper.(AtkWrapper.java:34) at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method) at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:62) at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:45) at java.lang.reflect.Constructor.newInstance(Constructor.java:423) at java.lang.Class.newInstance(Class.java:442) at java.awt.Toolkit.loadAssistiveTechnologies(Toolkit.java:805) at java.awt.Toolkit.getDefaultToolkit(Toolkit.java:886) at javax.swing.UIManager.getSystemLookAndFeelClassName(UIManager.java:611) at net.sourceforge.jnlp.runtime.JNLPRuntime.initialize(JNLPRuntime.java:218) at net.sourceforge.jnlp.runtime.Boot.init(Boot.java:326) at net.sourceforge.jnlp.runtime.JnlpBoot.run(JnlpBoot.java:58) at net.sourceforge.jnlp.runtime.Boot.run(Boot.java:245) at net.sourceforge.jnlp.runtime.Boot.run(Boot.java:63) at java.security.AccessController.doPrivileged(Native Method) at net.sourceforge.jnlp.runtime.Boot.main(Boot.java:195) Unable to use Firefox's proxy settings. Using "DIRECT" as proxy type. netx: Read Error: Could not read or parse the JNLP file. (java.lang.NullPointerException: name can't be null (name can't be null)) This is from the java console: Disconnecting sun.net.www.protocol.http.HttpURLConnection:http://popgen.net/soft/lositan/code2/selwb4.jnlp isCurrent:isCached false Downloading file: http://popgen.net/soft/lositan/code2/selwb4.jnlp into: /root/.cache/icedtea-web/cache/1/http/popgen.net/soft/lositan/code2/selwb4.jnlp Downloading http://popgen.net/soft/lositan/code2/selwb4.jnlp using http://popgen.net/soft/lositan/code2/selwb4.jnlp (encoding : null) net.sourceforge.jnlp.LaunchException: Fatal: Read Error: Could not read or parse the JNLP file. You can try to download this file manually and send it as bug report to IcedTea-Web team. ????at net.sourceforge.jnlp.Launcher.fromUrl(Launcher.java:490) ????at net.sourceforge.jnlp.Launcher.launch(Launcher.java:286) ????at net.sourceforge.jnlp.runtime.JnlpBoot.run(JnlpBoot.java:67) ????at net.sourceforge.jnlp.runtime.Boot.run(Boot.java:245) ????at net.sourceforge.jnlp.runtime.Boot.run(Boot.java:63) ????at java.security.AccessController.doPrivileged(Native Method) ????at net.sourceforge.jnlp.runtime.Boot.main(Boot.java:195) Caused by: java.io.IOException: java.lang.NullPointerException: name can't be null ????at net.sourceforge.jnlp.JNLPFile.openURL(JNLPFile.java:317) ????at net.sourceforge.jnlp.JNLPFile.(JNLPFile.java:239) ????at net.sourceforge.jnlp.JNLPFile.(JNLPFile.java:214) ????at net.sourceforge.jnlp.JNLPFile.(JNLPFile.java:199) ????at net.sourceforge.jnlp.JNLPFile.(JNLPFile.java:185) ????at net.sourceforge.jnlp.Launcher.fromUrl(Launcher.java:454) ????... 6 more Caused by: java.lang.NullPointerException: name can't be null ????at java.io.FilePermission.init(FilePermission.java:191) ????at java.io.FilePermission.(FilePermission.java:277) ????at java.lang.SecurityManager.checkRead(SecurityManager.java:888) ????at java.io.FileInputStream.(FileInputStream.java:127) ????at net.sourceforge.jnlp.JNLPFile.openURL(JNLPFile.java:315) ????... 11 more netx: Read Error: Could not read or parse the JNLP file. (java.lang.NullPointerException: name can't be null (name can't be null)) Selected proxies: [DIRECT] Browser selected proxies: [DIRECT] Selecting proxy for: http://popgen.net/soft/lositan/code2/selwb4.jnlp done http://popgen.net/soft/lositan/code2/selwb4.jnlp Connecting http://popgen.net/soft/lositan/code2/selwb4.jnlp net.sourceforge.jnlp.cache.ResourceDownloader$RedirectionException: The resource http://popgen.net/soft/lositan/code2/selwb4.jnlp is being redirected (301) to https://popgen.net/soft/lositan/code2/selwb4.jnlp. This is disabled by default. If you wont to allow it, run javaws with -allowredirect parameter. ??? at net.sourceforge.jnlp.cache.ResourceDownloader.findBestUrl(ResourceDownloader.java:270) ????at net.sourceforge.jnlp.cache.ResourceDownloader.initializeOnlineResource(ResourceDownloader.java:126) ????at net.sourceforge.jnlp.cache.ResourceDownloader.initializeResource(ResourceDownloader.java:118) ????at net.sourceforge.jnlp.cache.ResourceDownloader.run(ResourceDownloader.java:107) ???at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149) ????at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624) ????at java.lang.Thread.run(Thread.java:748) Resource location=http://popgen.net/soft/lositan/code2/selwb4.jnlp state=PRECONNECT CONNECTING PREDOWNLOAD PROCESSING got redirect 301 code for HEAD request for http://popgen.net/soft/lositan/code2/selwb4.jnlp adding https://popgen.net/soft/lositan/code2/selwb4.jnlp to list of possible urls Disconnecting sun.net.www.protocol.http.HttpURLConnection:http://popgen.net/soft/lositan/code2/selwb4.jnlp Key : Content-Type ,Value : [text/html] Key : Location ,Value : [https://popgen.net/soft/lositan/code2/selwb4.jnlp] Key : Date ,Value : [Tue, 19 Dec 2017 21:54:28 GMT] Key : Content-Length ,Value : [194] Key : Connection ,Value : [keep-alive] Key : Server ,Value : [nginx/1.10.1 (Ubuntu)] Key : null ,Value : [HTTP/1.1 301 Moved Permanently] Selected proxies: [DIRECT] Browser selected proxies: [DIRECT] Selecting proxy for: socket://popgen.net:80 Selected proxies: [DIRECT] Browser selected proxies: [DIRECT] Selecting proxy for: http://popgen.net/soft/lositan/code2/selwb4.jnlp done http://popgen.net/soft/lositan/code2/selwb4.jnlp Connecting http://popgen.net/soft/lositan/code2/selwb4.jnlp All possible urls for location=http://popgen.net/soft/lositan/code2/selwb4.jnlp state=PRECONNECT CONNECTING PREDOWNLOAD PROCESSING : [http://popgen.net/soft/lositan/code2/selwb4.jnlp, http://popgen.net/soft/lositan/code2/selwb4.jnlp] Finding best URL for: http://popgen.net/soft/lositan/code2/selwb4.jnlp : DownloadOptions[use pack: false; use version: false] good - your JRE - 1.8.0_151 - match requested JRE - 1.6+ Acceptable vendor tag found, contains: Tiago Antao Acceptable title tag found, contains: LOSITAN - Selection Workbench Jars not ready to provide attribute Application-Name Description: LOSITAN Application Homepage: http://popgen.net/soft/lositan line: 43 line: 42 line: 41 line: 40 line: 39? ? line: 38? ? ? ? line: 37? ? line: 36? ? line: 35? ? ? ? line: 34? ? ? ? line: 33? ? ? ? line: 32? ? ? ? line: 31? ? ? ? line: 30? ? ? ? line: 29? ? ? ? line: 28? ? ? ? line: 27? ? ? ? line: 26? ? ? ? line: 25? ? ? ? line: 24? ? line: 23? ? line: 22? ? ? ? line: 21? ? line: 20? ? line: 19? ? line: 18? ? ? ? line: 17? ? ? ? line: 16? ? ? ? ? ? line: 15? ? ? ? ? ? line: 14? ? ? ? line: 13? ? ? ? line: 12? ? ? ? A workbench for selection detection line: 11? ? ? ? LOSITAN Application line: 10? ? ? ? line: 9? ? ? ? Tiago Antao line: 8? ? ? ? LOSITAN - Selection Workbench line: 7? ? line: 6? ? href="selwb4.jnlp"> line: 5? ? codebase="http://popgen.net/soft/lositan/code2" line: 4? ? spec="1.0+" line: 3 java.lang.ClassNotFoundException: net/sourceforge/jnlp/MalformedXMLParser ??? at java.lang.Class.forName0(Native Method) ????at java.lang.Class.forName(Class.java:264) ????at net.sourceforge.jnlp.Parser.getParserInstance(Parser.java:1347) ????at net.sourceforge.jnlp.Parser.getRootNode(Parser.java:1319) ????at net.sourceforge.jnlp.JNLPFile.parse(JNLPFile.java:801) ????at net.sourceforge.jnlp.JNLPFile.(JNLPFile.java:232) ????at net.sourceforge.jnlp.JNLPFile.(JNLPFile.java:214) ????at net.sourceforge.jnlp.JNLPFile.(JNLPFile.java:199) ????at net.sourceforge.jnlp.JNLPFile.(JNLPFile.java:185) ????at net.sourceforge.jnlp.Launcher.fromUrl(Launcher.java:454) ????at net.sourceforge.jnlp.Launcher.launch(Launcher.java:286) ????at net.sourceforge.jnlp.runtime.JnlpBoot.run(JnlpBoot.java:67) ????at net.sourceforge.jnlp.runtime.Boot.run(Boot.java:245) ????at net.sourceforge.jnlp.runtime.Boot.run(Boot.java:63) ????at java.security.AccessController.doPrivileged(Native Method) ????at net.sourceforge.jnlp.runtime.Boot.main(Boot.java:195) JNLP file location: /home/julian/Documents/selwb4.jnlp Proceeding with jnlp System logger called with result of 0 System logger called with result of 0 System logger called with result of 0 Unable to use Firefox's proxy settings. Using "DIRECT" as proxy type. java.io.FileNotFoundException: /root/.mozilla/firefox/profiles.ini ????at net.sourceforge.jnlp.browser.FirefoxPreferencesFinder.find(FirefoxPreferencesFinder.java:72) ????at net.sourceforge.jnlp.browser.BrowserAwareProxySelector.parseBrowserPreferences(BrowserAwareProxySelector.java:151) ????at net.sourceforge.jnlp.browser.BrowserAwareProxySelector.initFromBrowserConfig(BrowserAwareProxySelector.java:114) ????at net.sourceforge.jnlp.browser.BrowserAwareProxySelector.initialize(BrowserAwareProxySelector.java:101) ????at net.sourceforge.jnlp.runtime.JNLPRuntime.initialize(JNLPRuntime.java:292) ??? at net.sourceforge.jnlp.runtime.Boot.init(Boot.java:326) ????at net.sourceforge.jnlp.runtime.JnlpBoot.run(JnlpBoot.java:58) ????at net.sourceforge.jnlp.runtime.Boot.run(Boot.java:245) ????at net.sourceforge.jnlp.runtime.Boot.run(Boot.java:63) ????at java.security.AccessController.doPrivileged(Native Method) ????at net.sourceforge.jnlp.runtime.Boot.main(Boot.java:195) Starting security dialog thread ????at net.sourceforge.jnlp.runtime.Boot.main(Boot.java:195) ????at java.security.AccessController.doPrivileged(Native Method) ????at net.sourceforge.jnlp.runtime.Boot.run(Boot.java:63) ????at net.sourceforge.jnlp.runtime.Boot.run(Boot.java:245) ????at net.sourceforge.jnlp.runtime.JnlpBoot.run(JnlpBoot.java:58) ????at net.sourceforge.jnlp.runtime.Boot.init(Boot.java:326) ????at net.sourceforge.jnlp.runtime.JNLPRuntime.initialize(JNLPRuntime.java:218) ????at javax.swing.UIManager.getSystemLookAndFeelClassName(UIManager.java:611) ????at java.awt.Toolkit.getDefaultToolkit(Toolkit.java:886) ????at java.awt.Toolkit.loadAssistiveTechnologies(Toolkit.java:805) ????at java.lang.Class.newInstance(Class.java:442) ????at java.lang.reflect.Constructor.newInstance(Constructor.java:423) ????at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:45) ????at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:62) ????at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method) ????at org.GNOME.Accessibility.AtkWrapper.(AtkWrapper.java:34) ????at java.lang.Runtime.exec(Runtime.java:347) ????at java.lang.Runtime.exec(Runtime.java:450) ????at java.lang.Runtime.exec(Runtime.java:620) ????at java.lang.ProcessBuilder.start(ProcessBuilder.java:1018) ????at java.lang.SecurityManager.checkExec(SecurityManager.java:796) ????at java.lang.SecurityManager.checkPermission(SecurityManager.java:549) ????at java.security.AccessController.checkPermission(AccessController.java:884) ????at java.security.AccessControlContext.checkPermission(AccessControlContext.java:472) java.security.AccessControlException: access denied ("java.io.FilePermission" "/usr/bin/xprop" "execute") Forcing of offline set to: false WARNING: key deployment.system.cachedir has no value, setting to default value java.io.FileNotFoundException: /root/.config/icedtea-web/deployment.properties (No such file or directory) ????at java.io.FileInputStream.open0(Native Method) ????at java.io.FileInputStream.open(FileInputStream.java:195) ????at java.io.FileInputStream.(FileInputStream.java:138) ????at java.io.FileReader.(FileReader.java:72) ????at net.sourceforge.jnlp.config.DeploymentConfiguration.loadComments(DeploymentConfiguration.java:877) ????at net.sourceforge.jnlp.config.DeploymentConfiguration.load(DeploymentConfiguration.java:336) ????at net.sourceforge.jnlp.config.DeploymentConfiguration.load(DeploymentConfiguration.java:298) ????at net.sourceforge.jnlp.config.DeploymentConfiguration.load(DeploymentConfiguration.java:279) ????at net.sourceforge.jnlp.runtime.JNLPRuntime$DeploymentConfigurationHolder.initConfiguration(JNLPRuntime.java:457) ????at net.sourceforge.jnlp.runtime.JNLPRuntime$DeploymentConfigurationHolder.(JNLPRuntime.java:452) ????at net.sourceforge.jnlp.runtime.JNLPRuntime.getConfiguration(JNLPRuntime.java:487) ????at net.sourceforge.jnlp.config.DirectoryValidator.(DirectoryValidator.java:226) ????at net.sourceforge.jnlp.config.DeploymentConfiguration.move14AndOlderFilesTo15Structure(DeploymentConfiguration.java:836) ????at net.sourceforge.jnlp.config.DeploymentConfiguration.move14AndOlderFilesTo15StructureCatched(DeploymentConfiguration.java:736) ????at net.sourceforge.jnlp.runtime.Boot.main(Boot.java:112) No User level deployment.properties found. java.io.FileNotFoundException: /root/.config/icedtea-web/deployment.properties (No such file or directory) ????at java.io.FileInputStream.open0(Native Method) ????at java.io.FileInputStream.open(FileInputStream.java:195) ????at java.io.FileInputStream.(FileInputStream.java:138) ????at java.io.FileReader.(FileReader.java:72) ????at net.sourceforge.jnlp.config.DeploymentConfiguration.parsePropertiesFile(DeploymentConfiguration.java:661) ????at net.sourceforge.jnlp.config.DeploymentConfiguration.findSystemConfigFile(DeploymentConfiguration.java:484) ????at net.sourceforge.jnlp.config.DeploymentConfiguration.load(DeploymentConfiguration.java:296) ????at net.sourceforge.jnlp.config.DeploymentConfiguration.load(DeploymentConfiguration.java:279) ????at net.sourceforge.jnlp.runtime.JNLPRuntime$DeploymentConfigurationHolder.initConfiguration(JNLPRuntime.java:457) ????at net.sourceforge.jnlp.runtime.JNLPRuntime$DeploymentConfigurationHolder.(JNLPRuntime.java:452) ????at net.sourceforge.jnlp.runtime.JNLPRuntime.getConfiguration(JNLPRuntime.java:487) ????at net.sourceforge.jnlp.config.DirectoryValidator.(DirectoryValidator.java:226) ????at net.sourceforge.jnlp.config.DeploymentConfiguration.move14AndOlderFilesTo15Structure(DeploymentConfiguration.java:836) ????at net.sourceforge.jnlp.config.DeploymentConfiguration.move14AndOlderFilesTo15StructureCatched(DeploymentConfiguration.java:736) ????at net.sourceforge.jnlp.runtime.Boot.main(Boot.java:112) cache: /root/.cache/icedtea-web file exists:true config: /root/.config/icedtea-web file exists: true System is already following XDG .cache and .config specifications Please let me know how we can proceed. -- You are receiving this mail because: You are on the CC list for the bug. -------------- next part -------------- An HTML attachment was scrubbed... URL: From bugzilla-daemon at icedtea.classpath.org Tue Dec 19 22:02:05 2017 From: bugzilla-daemon at icedtea.classpath.org (bugzilla-daemon at icedtea.classpath.org) Date: Tue, 19 Dec 2017 22:02:05 +0000 Subject: [Bug 3502] Fatal: Read Error: Could not read or parse the JNLP file/ You can try downloading this file manually and sent it as bug report to ITWT. In-Reply-To: References: Message-ID: https://icedtea.classpath.org/bugzilla/show_bug.cgi?id=3502 --- Comment #1 from jf at talismanmail.com --- This is my version of icedtea: javaws -version icedtea-web 1.6.2 (1.6.2-3.1ubuntu3 -- You are receiving this mail because: You are on the CC list for the bug. -------------- next part -------------- An HTML attachment was scrubbed... URL: From bugzilla-daemon at icedtea.classpath.org Wed Dec 20 05:52:31 2017 From: bugzilla-daemon at icedtea.classpath.org (bugzilla-daemon at icedtea.classpath.org) Date: Wed, 20 Dec 2017 05:52:31 +0000 Subject: [Bug 3503] New: [IcedTea8] Backport "8191137: keytool fails to format resource strings for keys for some languages after JDK-8171319" Message-ID: https://icedtea.classpath.org/bugzilla/show_bug.cgi?id=3503 Bug ID: 3503 Summary: [IcedTea8] Backport "8191137: keytool fails to format resource strings for keys for some languages after JDK-8171319" Product: IcedTea Version: 8-hg Hardware: all OS: All Status: NEW Severity: normal Priority: P5 Component: IcedTea Assignee: gnu.andrew at redhat.com Reporter: gnu.andrew at redhat.com CC: unassigned at icedtea.classpath.org See https://bugzilla.redhat.com/show_bug.cgi?id=1512647 Translation updates in 8186533 as part of 8u151 create a mismatch between the order of the arguments and their placement in the translated text. 8191137, and the accompanying fix to translations in 8191840, add numbered positions to the arguments. -- You are receiving this mail because: You are on the CC list for the bug. -------------- next part -------------- An HTML attachment was scrubbed... URL: From bugzilla-daemon at icedtea.classpath.org Wed Dec 20 05:53:25 2017 From: bugzilla-daemon at icedtea.classpath.org (bugzilla-daemon at icedtea.classpath.org) Date: Wed, 20 Dec 2017 05:53:25 +0000 Subject: [Bug 3481] [TRACKER] IcedTea 3.7.0 Release In-Reply-To: References: Message-ID: https://icedtea.classpath.org/bugzilla/show_bug.cgi?id=3481 Andrew John Hughes changed: What |Removed |Added ---------------------------------------------------------------------------- Depends on| |3503 -- You are receiving this mail because: You are on the CC list for the bug. -------------- next part -------------- An HTML attachment was scrubbed... URL: From bugzilla-daemon at icedtea.classpath.org Wed Dec 20 05:53:25 2017 From: bugzilla-daemon at icedtea.classpath.org (bugzilla-daemon at icedtea.classpath.org) Date: Wed, 20 Dec 2017 05:53:25 +0000 Subject: [Bug 3503] [IcedTea8] Backport "8191137: keytool fails to format resource strings for keys for some languages after JDK-8171319" In-Reply-To: References: Message-ID: https://icedtea.classpath.org/bugzilla/show_bug.cgi?id=3503 Andrew John Hughes changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |ASSIGNED URL| |https://bugs.openjdk.java.n | |et/browse/JDK-8191137 Blocks| |3481 Target Milestone|--- |3.7.0 -- You are receiving this mail because: You are on the CC list for the bug. -------------- next part -------------- An HTML attachment was scrubbed... URL: From bugzilla-daemon at icedtea.classpath.org Wed Dec 20 09:29:56 2017 From: bugzilla-daemon at icedtea.classpath.org (bugzilla-daemon at icedtea.classpath.org) Date: Wed, 20 Dec 2017 09:29:56 +0000 Subject: [Bug 3502] Fatal: Read Error: Could not read or parse the JNLP file/ You can try downloading this file manually and sent it as bug report to ITWT. In-Reply-To: References: Message-ID: https://icedtea.classpath.org/bugzilla/show_bug.cgi?id=3502 JiriVanek changed: What |Removed |Added ---------------------------------------------------------------------------- Priority|P5 |P2 CC| |jvanek at redhat.com Component|IcedTea |NetX (javaws) Version|unspecified |hg Assignee|gnu.andrew at redhat.com |jvanek at redhat.com Product|IcedTea |IcedTea-Web Severity|enhancement |normal --- Comment #2 from JiriVanek --- I see it differently: javaws https://popgen.net/soft/lositan/code2/selwb.jnlp .... Caused by: net.sourceforge.jnlp.LaunchException: Fatal: Application Error: Cannot grant permissions to unsigned jars. Application requested security permissions, but jars are not signed. ... Where the exception Is eprfectly justified. There are unsigned jars. Why are you running "sudo javaws -jnlp '/home/julian/Documents/selwb4.jnlp'" ? *NEVER* run such applications as root! And it will not help with the issue with unsigned jars. You can workaround it by --nosecurity, but be aware! Why are you lunching local copy of file? As the jnlp file is designed to be lunched over network, this one have a an clausule, that it download itself from the host again. As your host is "nothing" it fails. This can be workarounded by -Xnofork, but regular local file runs ITW with -Xoffline swithc, but even then you should run it from original URL instead of file. As for the topmost of your exception: access denied ("java.io.FilePermission" "/usr/bin/xprop" "execute") - it is not form ITW. where it is from? From the application itself? Strange, but might be. I guess it is unsigned jar, without permissions, (As result of wrong signing) , trying to execute xprop, and beeing not allowed by ITW. As for signing, being root of all evil here, I would recommend to try contact the provider of applciation and ask them to verify the signing - which may lead to discovering bug in ITW. Still, before doing it, please run the jnlp file correctly and investigate a bit so you have something to say to them :) Feel free continue asking here, as it indeed may run to the bug in iTW at the end... (but currently I doubt) -- You are receiving this mail because: You are on the CC list for the bug. -------------- next part -------------- An HTML attachment was scrubbed... URL: From bugzilla-daemon at icedtea.classpath.org Wed Dec 20 16:22:48 2017 From: bugzilla-daemon at icedtea.classpath.org (bugzilla-daemon at icedtea.classpath.org) Date: Wed, 20 Dec 2017 16:22:48 +0000 Subject: [Bug 3502] Fatal: Read Error: Could not read or parse the JNLP file/ You can try downloading this file manually and sent it as bug report to ITWT. In-Reply-To: References: Message-ID: https://icedtea.classpath.org/bugzilla/show_bug.cgi?id=3502 --- Comment #3 from jf at talismanmail.com --- Hello, thanks for the quick responce. I ran this code: javaws --nosecurity '/home/julian/Documents/selwb4.jnlp' Disconnecting sun.net.www.protocol.http.HttpURLConnection:http://popgen.net/soft/lositan/code2/selwb4.jnlp isCurrent:lastModified cache:0 actual:0 isCurrent:isCached true isCached: remote:194 cached:194 Downloading file: http://popgen.net/soft/lositan/code2/selwb4.jnlp into: /home/julian/.cache/icedtea-web/cache/0/http/popgen.net/soft/lositan/code2/selwb4.jnlp Downloading http://popgen.net/soft/lositan/code2/selwb4.jnlp using http://popgen.net/soft/lositan/code2/selwb4.jnlp (encoding : null) net.sourceforge.jnlp.LaunchException: Fatal: Read Error: Could not read or parse the JNLP file. You can try to download this file manually and send it as bug report to IcedTea-Web team. ????at net.sourceforge.jnlp.Launcher.fromUrl(Launcher.java:490) ????at net.sourceforge.jnlp.Launcher.launch(Launcher.java:286) ????at net.sourceforge.jnlp.runtime.JnlpBoot.run(JnlpBoot.java:67) ????at net.sourceforge.jnlp.runtime.Boot.run(Boot.java:245) ????at net.sourceforge.jnlp.runtime.Boot.run(Boot.java:63) ????at java.security.AccessController.doPrivileged(Native Method) ????at net.sourceforge.jnlp.runtime.Boot.main(Boot.java:195) Caused by: java.io.IOException: java.lang.NullPointerException: name can't be null ????at net.sourceforge.jnlp.JNLPFile.openURL(JNLPFile.java:317) ????at net.sourceforge.jnlp.JNLPFile.(JNLPFile.java:239) ????at net.sourceforge.jnlp.JNLPFile.(JNLPFile.java:214) ????at net.sourceforge.jnlp.JNLPFile.(JNLPFile.java:199) ????at net.sourceforge.jnlp.JNLPFile.(JNLPFile.java:185) ????at net.sourceforge.jnlp.Launcher.fromUrl(Launcher.java:454) ????... 6 more Caused by: java.lang.NullPointerException: name can't be null ????at java.io.FilePermission.init(FilePermission.java:191) ????at java.io.FilePermission.(FilePermission.java:277) ????at java.lang.SecurityManager.checkRead(SecurityManager.java:888) ????at java.io.FileInputStream.(FileInputStream.java:127) ????at net.sourceforge.jnlp.JNLPFile.openURL(JNLPFile.java:315) ????... 11 more netx: Read Error: Could not read or parse the JNLP file. (java.lang.NullPointerException: name can't be null (name can't be null)) Selected proxies: [DIRECT] Browser selected proxies: [DIRECT] Selecting proxy for: http://popgen.net/soft/lositan/code2/selwb4.jnlp done http://popgen.net/soft/lositan/code2/selwb4.jnlp Connecting http://popgen.net/soft/lositan/code2/selwb4.jnlp net.sourceforge.jnlp.cache.ResourceDownloader$RedirectionException: The resource http://popgen.net/soft/lositan/code2/selwb4.jnlp is being redirected (301) to https://popgen.net/soft/lositan/code2/selwb4.jnlp. This is disabled by default. If you wont to allow it, run javaws with -allowredirect parameter. ??? at net.sourceforge.jnlp.cache.ResourceDownloader.findBestUrl(ResourceDownloader.java:270) ????at net.sourceforge.jnlp.cache.ResourceDownloader.initializeOnlineResource(ResourceDownloader.java:126) ????at net.sourceforge.jnlp.cache.ResourceDownloader.initializeResource(ResourceDownloader.java:118) ????at net.sourceforge.jnlp.cache.ResourceDownloader.run(ResourceDownloader.java:107) ???at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149) ????at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624) ????at java.lang.Thread.run(Thread.java:748) Resource location=http://popgen.net/soft/lositan/code2/selwb4.jnlp state=PRECONNECT CONNECTING PREDOWNLOAD PROCESSING got redirect 301 code for HEAD request for http://popgen.net/soft/lositan/code2/selwb4.jnlp adding https://popgen.net/soft/lositan/code2/selwb4.jnlp to list of possible urls Disconnecting sun.net.www.protocol.http.HttpURLConnection:http://popgen.net/soft/lositan/code2/selwb4.jnlp Key : Content-Type ,Value : [text/html] Key : Location ,Value : [https://popgen.net/soft/lositan/code2/selwb4.jnlp] Key : Date ,Value : [Wed, 20 Dec 2017 16:19:39 GMT] Key : Content-Length ,Value : [194] Key : Connection ,Value : [keep-alive] Key : Server ,Value : [nginx/1.10.1 (Ubuntu)] Key : null ,Value : [HTTP/1.1 301 Moved Permanently] Selected proxies: [DIRECT] Browser selected proxies: [DIRECT] Selecting proxy for: socket://popgen.net:80 Selected proxies: [DIRECT] Browser selected proxies: [DIRECT] Selecting proxy for: http://popgen.net/soft/lositan/code2/selwb4.jnlp done http://popgen.net/soft/lositan/code2/selwb4.jnlp Connecting http://popgen.net/soft/lositan/code2/selwb4.jnlp All possible urls for location=http://popgen.net/soft/lositan/code2/selwb4.jnlp state=PRECONNECT CONNECTING PREDOWNLOAD PROCESSING : [http://popgen.net/soft/lositan/code2/selwb4.jnlp, http://popgen.net/soft/lositan/code2/selwb4.jnlp] Finding best URL for: http://popgen.net/soft/lositan/code2/selwb4.jnlp : DownloadOptions[use pack: false; use version: false] good - your JRE - 1.8.0_151 - match requested JRE - 1.6+ Acceptable vendor tag found, contains: Tiago Antao Acceptable title tag found, contains: LOSITAN - Selection Workbench Jars not ready to provide attribute Application-Name Description: LOSITAN Application Homepage: http://popgen.net/soft/lositan line: 43 line: 42 line: 41 line: 40 line: 39? ? line: 38? ? ? ? line: 37? ? line: 36? ? line: 35? ? ? ? line: 34? ? ? ? line: 33? ? ? ? line: 32? ? ? ? line: 31? ? ? ? line: 30? ? ? ? line: 29? ? ? ? line: 28? ? ? ? line: 27? ? ? ? line: 26? ? ? ? line: 25? ? ? ? line: 24? ? line: 23? ? line: 22? ? ? ? line: 21? ? line: 20? ? line: 19? ? line: 18? ? ? ? line: 17? ? ? ? line: 16? ? ? ? ? ? line: 15? ? ? ? ? ? line: 14? ? ? ? line: 13? ? ? ? line: 12? ? ? ? A workbench for selection detection line: 11? ? ? ? LOSITAN Application line: 10? ? ? ? line: 9? ? ? ? Tiago Antao line: 8? ? ? ? LOSITAN - Selection Workbench line: 7? ? line: 6? ? href="selwb4.jnlp"> line: 5? ? codebase="http://popgen.net/soft/lositan/code2" line: 4? ? spec="1.0+" line: 3 java.lang.ClassNotFoundException: net/sourceforge/jnlp/MalformedXMLParser ??? at java.lang.Class.forName0(Native Method) ????at java.lang.Class.forName(Class.java:264) ????at net.sourceforge.jnlp.Parser.getParserInstance(Parser.java:1347) ????at net.sourceforge.jnlp.Parser.getRootNode(Parser.java:1319) ????at net.sourceforge.jnlp.JNLPFile.parse(JNLPFile.java:801) ????at net.sourceforge.jnlp.JNLPFile.(JNLPFile.java:232) ????at net.sourceforge.jnlp.JNLPFile.(JNLPFile.java:214) ????at net.sourceforge.jnlp.JNLPFile.(JNLPFile.java:199) ????at net.sourceforge.jnlp.JNLPFile.(JNLPFile.java:185) ????at net.sourceforge.jnlp.Launcher.fromUrl(Launcher.java:454) ????at net.sourceforge.jnlp.Launcher.launch(Launcher.java:286) ????at net.sourceforge.jnlp.runtime.JnlpBoot.run(JnlpBoot.java:67) ????at net.sourceforge.jnlp.runtime.Boot.run(Boot.java:245) ????at net.sourceforge.jnlp.runtime.Boot.run(Boot.java:63) ????at java.security.AccessController.doPrivileged(Native Method) ????at net.sourceforge.jnlp.runtime.Boot.main(Boot.java:195) JNLP file location: /home/julian/Documents/selwb4.jnlp Proceeding with jnlp Read 129 entries from Firefox's preferences Found preferences file: /home/julian/.mozilla/firefox/lkl714k7.default/prefs.js Using firefox's profiles file: /home/julian/.mozilla/firefox/profiles.ini Starting security dialog thread ????at net.sourceforge.jnlp.runtime.Boot.main(Boot.java:195) ????at java.security.AccessController.doPrivileged(Native Method) ????at net.sourceforge.jnlp.runtime.Boot.run(Boot.java:63) ????at net.sourceforge.jnlp.runtime.Boot.run(Boot.java:245) ????at net.sourceforge.jnlp.runtime.JnlpBoot.run(JnlpBoot.java:58) ????at net.sourceforge.jnlp.runtime.Boot.init(Boot.java:326) ????at net.sourceforge.jnlp.runtime.JNLPRuntime.initialize(JNLPRuntime.java:218) ????at javax.swing.UIManager.getSystemLookAndFeelClassName(UIManager.java:611) ????at java.awt.Toolkit.getDefaultToolkit(Toolkit.java:886) ????at java.awt.Toolkit.loadAssistiveTechnologies(Toolkit.java:805) ????at java.lang.Class.newInstance(Class.java:442) ????at java.lang.reflect.Constructor.newInstance(Constructor.java:423) ????at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:45) ????at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:62) ????at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method) ????at org.GNOME.Accessibility.AtkWrapper.(AtkWrapper.java:34) ????at java.lang.Runtime.exec(Runtime.java:347) ????at java.lang.Runtime.exec(Runtime.java:450) ????at java.lang.Runtime.exec(Runtime.java:620) ????at java.lang.ProcessBuilder.start(ProcessBuilder.java:1018) ????at java.lang.SecurityManager.checkExec(SecurityManager.java:796) ????at java.lang.SecurityManager.checkPermission(SecurityManager.java:549) ????at java.security.AccessController.checkPermission(AccessController.java:884) ????at java.security.AccessControlContext.checkPermission(AccessControlContext.java:472) java.security.AccessControlException: access denied ("java.io.FilePermission" "/usr/bin/xprop" "execute") Forcing of offline set to: false WARNING: key deployment.system.cachedir has no value, setting to default value Loading User level properties from: /home/julian/.config/icedtea-web/deployment.properties cache: /home/julian/.cache/icedtea-web file exists:true config: /home/julian/.config/icedtea-web file exists: true System is already following XDG .cache and .config specifications Then I purge the java console and run this: javaws --nosecurity -Xnofork -jnlp '/home/julian/Documents/selwb4.jnlp' and get this error: Disconnecting sun.net.www.protocol.http.HttpURLConnection:http://popgen.net/soft/lositan/code2/selwb4.jnlp isCurrent:isCached false Downloading file: http://popgen.net/soft/lositan/code2/selwb4.jnlp into: /home/julian/.cache/icedtea-web/cache/0/http/popgen.net/soft/lositan/code2/selwb4.jnlp Downloading http://popgen.net/soft/lositan/code2/selwb4.jnlp using http://popgen.net/soft/lositan/code2/selwb4.jnlp (encoding : null) net.sourceforge.jnlp.LaunchException: Fatal: Read Error: Could not read or parse the JNLP file. You can try to download this file manually and send it as bug report to IcedTea-Web team. ????at net.sourceforge.jnlp.Launcher.fromUrl(Launcher.java:490) ????at net.sourceforge.jnlp.Launcher.launch(Launcher.java:286) ????at net.sourceforge.jnlp.runtime.JnlpBoot.run(JnlpBoot.java:67) ????at net.sourceforge.jnlp.runtime.Boot.run(Boot.java:245) ????at net.sourceforge.jnlp.runtime.Boot.run(Boot.java:63) ????at java.security.AccessController.doPrivileged(Native Method) ????at net.sourceforge.jnlp.runtime.Boot.main(Boot.java:195) Caused by: java.io.IOException: java.lang.NullPointerException: name can't be null ????at net.sourceforge.jnlp.JNLPFile.openURL(JNLPFile.java:317) ????at net.sourceforge.jnlp.JNLPFile.(JNLPFile.java:239) ????at net.sourceforge.jnlp.JNLPFile.(JNLPFile.java:214) ????at net.sourceforge.jnlp.JNLPFile.(JNLPFile.java:199) ????at net.sourceforge.jnlp.JNLPFile.(JNLPFile.java:185) ????at net.sourceforge.jnlp.Launcher.fromUrl(Launcher.java:454) ????... 6 more Caused by: java.lang.NullPointerException: name can't be null ????at java.io.FilePermission.init(FilePermission.java:191) ????at java.io.FilePermission.(FilePermission.java:277) ????at java.lang.SecurityManager.checkRead(SecurityManager.java:888) ????at java.io.FileInputStream.(FileInputStream.java:127) ????at net.sourceforge.jnlp.JNLPFile.openURL(JNLPFile.java:315) ????... 11 more netx: Read Error: Could not read or parse the JNLP file. (java.lang.NullPointerException: name can't be null (name can't be null)) Selected proxies: [DIRECT] Browser selected proxies: [DIRECT] Selecting proxy for: http://popgen.net/soft/lositan/code2/selwb4.jnlp done http://popgen.net/soft/lositan/code2/selwb4.jnlp Connecting http://popgen.net/soft/lositan/code2/selwb4.jnlp net.sourceforge.jnlp.cache.ResourceDownloader$RedirectionException: The resource http://popgen.net/soft/lositan/code2/selwb4.jnlp is being redirected (301) to https://popgen.net/soft/lositan/code2/selwb4.jnlp. This is disabled by default. If you wont to allow it, run javaws with -allowredirect parameter. ??? at net.sourceforge.jnlp.cache.ResourceDownloader.findBestUrl(ResourceDownloader.java:270) ????at net.sourceforge.jnlp.cache.ResourceDownloader.initializeOnlineResource(ResourceDownloader.java:126) ????at net.sourceforge.jnlp.cache.ResourceDownloader.initializeResource(ResourceDownloader.java:118) ????at net.sourceforge.jnlp.cache.ResourceDownloader.run(ResourceDownloader.java:107) ???at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149) ????at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624) ????at java.lang.Thread.run(Thread.java:748) Resource location=http://popgen.net/soft/lositan/code2/selwb4.jnlp state=PRECONNECT CONNECTING PREDOWNLOAD PROCESSING got redirect 301 code for HEAD request for http://popgen.net/soft/lositan/code2/selwb4.jnlp adding https://popgen.net/soft/lositan/code2/selwb4.jnlp to list of possible urls Disconnecting sun.net.www.protocol.http.HttpURLConnection:http://popgen.net/soft/lositan/code2/selwb4.jnlp Key : Content-Type ,Value : [text/html] Key : Location ,Value : [https://popgen.net/soft/lositan/code2/selwb4.jnlp] Key : Date ,Value : [Wed, 20 Dec 2017 16:22:09 GMT] Key : Content-Length ,Value : [194] Key : Connection ,Value : [keep-alive] Key : Server ,Value : [nginx/1.10.1 (Ubuntu)] Key : null ,Value : [HTTP/1.1 301 Moved Permanently] Selected proxies: [DIRECT] Browser selected proxies: [DIRECT] Selecting proxy for: socket://popgen.net:80 Selected proxies: [DIRECT] Browser selected proxies: [DIRECT] Selecting proxy for: http://popgen.net/soft/lositan/code2/selwb4.jnlp done http://popgen.net/soft/lositan/code2/selwb4.jnlp Connecting http://popgen.net/soft/lositan/code2/selwb4.jnlp All possible urls for location=http://popgen.net/soft/lositan/code2/selwb4.jnlp state=PRECONNECT CONNECTING PREDOWNLOAD PROCESSING : [http://popgen.net/soft/lositan/code2/selwb4.jnlp, http://popgen.net/soft/lositan/code2/selwb4.jnlp] Finding best URL for: http://popgen.net/soft/lositan/code2/selwb4.jnlp : DownloadOptions[use pack: false; use version: false] good - your JRE - 1.8.0_151 - match requested JRE - 1.6+ Acceptable vendor tag found, contains: Tiago Antao Acceptable title tag found, contains: LOSITAN - Selection Workbench Jars not ready to provide attribute Application-Name Description: LOSITAN Application Homepage: http://popgen.net/soft/lositan line: 43 line: 42 line: 41 line: 40 line: 39? ? line: 38? ? ? ? line: 37? ? line: 36? ? line: 35? ? ? ? line: 34? ? ? ? line: 33? ? ? ? line: 32? ? ? ? line: 31? ? ? ? line: 30? ? ? ? line: 29? ? ? ? line: 28? ? ? ? line: 27? ? ? ? line: 26? ? ? ? line: 25? ? ? ? line: 24? ? line: 23? ? line: 22? ? ? ? line: 21? ? line: 20? ? line: 19? ? line: 18? ? ? ? line: 17? ? ? ? line: 16? ? ? ? ? ? line: 15? ? ? ? ? ? line: 14? ? ? ? line: 13? ? ? ? line: 12? ? ? ? A workbench for selection detection line: 11? ? ? ? LOSITAN Application line: 10? ? ? ? line: 9? ? ? ? Tiago Antao line: 8? ? ? ? LOSITAN - Selection Workbench line: 7? ? line: 6? ? href="selwb4.jnlp"> line: 5? ? codebase="http://popgen.net/soft/lositan/code2" line: 4? ? spec="1.0+" line: 3 java.lang.ClassNotFoundException: net/sourceforge/jnlp/MalformedXMLParser ??? at java.lang.Class.forName0(Native Method) ????at java.lang.Class.forName(Class.java:264) ????at net.sourceforge.jnlp.Parser.getParserInstance(Parser.java:1347) ????at net.sourceforge.jnlp.Parser.getRootNode(Parser.java:1319) ????at net.sourceforge.jnlp.JNLPFile.parse(JNLPFile.java:801) ????at net.sourceforge.jnlp.JNLPFile.(JNLPFile.java:232) ????at net.sourceforge.jnlp.JNLPFile.(JNLPFile.java:214) ????at net.sourceforge.jnlp.JNLPFile.(JNLPFile.java:199) ????at net.sourceforge.jnlp.JNLPFile.(JNLPFile.java:185) ????at net.sourceforge.jnlp.Launcher.fromUrl(Launcher.java:454) ????at net.sourceforge.jnlp.Launcher.launch(Launcher.java:286) ????at net.sourceforge.jnlp.runtime.JnlpBoot.run(JnlpBoot.java:67) ????at net.sourceforge.jnlp.runtime.Boot.run(Boot.java:245) ????at net.sourceforge.jnlp.runtime.Boot.run(Boot.java:63) ????at java.security.AccessController.doPrivileged(Native Method) ????at net.sourceforge.jnlp.runtime.Boot.main(Boot.java:195) JNLP file location: /home/julian/Documents/selwb4.jnlp Proceeding with jnlp Read 129 entries from Firefox's preferences Found preferences file: /home/julian/.mozilla/firefox/lkl714k7.default/prefs.js Using firefox's profiles file: /home/julian/.mozilla/firefox/profiles.ini Starting security dialog thread ????at net.sourceforge.jnlp.runtime.Boot.main(Boot.java:195) ????at java.security.AccessController.doPrivileged(Native Method) ????at net.sourceforge.jnlp.runtime.Boot.run(Boot.java:63) ????at net.sourceforge.jnlp.runtime.Boot.run(Boot.java:245) ????at net.sourceforge.jnlp.runtime.JnlpBoot.run(JnlpBoot.java:58) ????at net.sourceforge.jnlp.runtime.Boot.init(Boot.java:326) ????at net.sourceforge.jnlp.runtime.JNLPRuntime.initialize(JNLPRuntime.java:218) ????at javax.swing.UIManager.getSystemLookAndFeelClassName(UIManager.java:611) ????at java.awt.Toolkit.getDefaultToolkit(Toolkit.java:886) ????at java.awt.Toolkit.loadAssistiveTechnologies(Toolkit.java:805) ????at java.lang.Class.newInstance(Class.java:442) ????at java.lang.reflect.Constructor.newInstance(Constructor.java:423) ????at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:45) ????at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:62) ????at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method) ????at org.GNOME.Accessibility.AtkWrapper.(AtkWrapper.java:34) ????at java.lang.Runtime.exec(Runtime.java:347) ????at java.lang.Runtime.exec(Runtime.java:450) ????at java.lang.Runtime.exec(Runtime.java:620) ????at java.lang.ProcessBuilder.start(ProcessBuilder.java:1018) ????at java.lang.SecurityManager.checkExec(SecurityManager.java:796) ????at java.lang.SecurityManager.checkPermission(SecurityManager.java:549) ????at java.security.AccessController.checkPermission(AccessController.java:884) ????at java.security.AccessControlContext.checkPermission(AccessControlContext.java:472) java.security.AccessControlException: access denied ("java.io.FilePermission" "/usr/bin/xprop" "execute") Forcing of offline set to: false WARNING: key deployment.system.cachedir has no value, setting to default value Loading User level properties from: /home/julian/.config/icedtea-web/deployment.properties cache: /home/julian/.cache/icedtea-web file exists:true config: /home/julian/.config/icedtea-web file exists: true System is already following XDG .cache and .config specifications Any ideas? -- You are receiving this mail because: You are on the CC list for the bug. -------------- next part -------------- An HTML attachment was scrubbed... URL: From bugzilla-daemon at icedtea.classpath.org Wed Dec 20 17:23:33 2017 From: bugzilla-daemon at icedtea.classpath.org (bugzilla-daemon at icedtea.classpath.org) Date: Wed, 20 Dec 2017 17:23:33 +0000 Subject: [Bug 3502] Fatal: Read Error: Could not read or parse the JNLP file/ You can try downloading this file manually and sent it as bug report to ITWT. In-Reply-To: References: Message-ID: https://icedtea.classpath.org/bugzilla/show_bug.cgi?id=3502 --- Comment #4 from JiriVanek --- 1) Why you keep running local file? Run url unless there is reason. 2) you seems to be running ITW without TagSoup. How come? But it do nto affect this issue. 3)I see also this in log: net.sourceforge.jnlp.cache.ResourceDownloader$RedirectionException: The resource http://popgen.net/soft/lositan/code2/selwb4.jnlp is being redirected (301) to https://popgen.net/soft/lositan/code2/selwb4.jnlp. This is disabled by default. If you wont to allow it, run javaws with -allowredirect parameter. So try -allowredirect , or use proper https url for startup Anyway - you will end with the: Caused by: net.sourceforge.jnlp.LaunchException: Fatal: Application Error: Cannot grant permissions to unsigned jars. Application requested security permissions, but jars are not signed properly. As I already wrote. And only way around it would be to contact the provider. Also contact your distribution packager to build ITW with tagsoup. So you are on top of things a bit. However, tagsoup is not meddling this bug. And most important at the end. Again - do not run local file. Run javaws https://popgen.net/soft/lositan/code2/selwb4.jnlp Surprisingly, nosecurity is not helping here. But I guess there is good reason for it, as mixed signatures are very tricky. In all cases, please cntact the provider of application. -- You are receiving this mail because: You are on the CC list for the bug. -------------- next part -------------- An HTML attachment was scrubbed... URL: From bugzilla-daemon at icedtea.classpath.org Wed Dec 20 21:06:55 2017 From: bugzilla-daemon at icedtea.classpath.org (bugzilla-daemon at icedtea.classpath.org) Date: Wed, 20 Dec 2017 21:06:55 +0000 Subject: [Bug 3502] Fatal: Read Error: Could not read or parse the JNLP file/ You can try downloading this file manually and sent it as bug report to ITWT. In-Reply-To: References: Message-ID: https://icedtea.classpath.org/bugzilla/show_bug.cgi?id=3502 --- Comment #5 from jf at talismanmail.com --- this command worked: javaws --nosecurity -Xnofork -allowredirect -jnlp '/home/julian/Documents/selwb4.jnlp' Thank you very much. If I knew how to run the url I am sure that is better but I could not figure it out. -- You are receiving this mail because: You are on the CC list for the bug. -------------- next part -------------- An HTML attachment was scrubbed... URL: From bugzilla-daemon at icedtea.classpath.org Thu Dec 21 02:50:21 2017 From: bugzilla-daemon at icedtea.classpath.org (bugzilla-daemon at icedtea.classpath.org) Date: Thu, 21 Dec 2017 02:50:21 +0000 Subject: [Bug 3504] New: [IcedTea8] Backport "8148421: Transport Layer Security (TLS) Session Hash and Extended Master Secret Extension" Message-ID: https://icedtea.classpath.org/bugzilla/show_bug.cgi?id=3504 Bug ID: 3504 Summary: [IcedTea8] Backport "8148421: Transport Layer Security (TLS) Session Hash and Extended Master Secret Extension" Product: IcedTea Version: 8-hg Hardware: all OS: All Status: NEW Severity: normal Priority: P5 Component: IcedTea Assignee: gnu.andrew at redhat.com Reporter: gnu.andrew at redhat.com CC: unassigned at icedtea.classpath.org https://bugs.openjdk.java.net/browse/JDK-8148421 Looks like Oracle have this scheduled for the January update. -- You are receiving this mail because: You are on the CC list for the bug. -------------- next part -------------- An HTML attachment was scrubbed... URL: From bugzilla-daemon at icedtea.classpath.org Thu Dec 21 02:50:52 2017 From: bugzilla-daemon at icedtea.classpath.org (bugzilla-daemon at icedtea.classpath.org) Date: Thu, 21 Dec 2017 02:50:52 +0000 Subject: [Bug 3481] [TRACKER] IcedTea 3.7.0 Release In-Reply-To: References: Message-ID: https://icedtea.classpath.org/bugzilla/show_bug.cgi?id=3481 Andrew John Hughes changed: What |Removed |Added ---------------------------------------------------------------------------- Depends on| |3504 -- You are receiving this mail because: You are on the CC list for the bug. -------------- next part -------------- An HTML attachment was scrubbed... URL: From bugzilla-daemon at icedtea.classpath.org Thu Dec 21 02:50:52 2017 From: bugzilla-daemon at icedtea.classpath.org (bugzilla-daemon at icedtea.classpath.org) Date: Thu, 21 Dec 2017 02:50:52 +0000 Subject: [Bug 3504] [IcedTea8] Backport "8148421: Transport Layer Security (TLS) Session Hash and Extended Master Secret Extension" In-Reply-To: References: Message-ID: https://icedtea.classpath.org/bugzilla/show_bug.cgi?id=3504 Andrew John Hughes changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |ASSIGNED Blocks| |3481 Target Milestone|--- |3.7.0 -- You are receiving this mail because: You are on the CC list for the bug. -------------- next part -------------- An HTML attachment was scrubbed... URL: From bugzilla-daemon at icedtea.classpath.org Thu Dec 21 02:51:35 2017 From: bugzilla-daemon at icedtea.classpath.org (bugzilla-daemon at icedtea.classpath.org) Date: Thu, 21 Dec 2017 02:51:35 +0000 Subject: [Bug 3505] New: [IcedTea7] [IcedTea8] Backport "8148421: Transport Layer Security (TLS) Session Hash and Extended Master Secret Extension" Message-ID: https://icedtea.classpath.org/bugzilla/show_bug.cgi?id=3505 Bug ID: 3505 Summary: [IcedTea7] [IcedTea8] Backport "8148421: Transport Layer Security (TLS) Session Hash and Extended Master Secret Extension" Product: IcedTea Version: 7-hg Hardware: all OS: All Status: NEW Severity: enhancement Priority: P5 Component: IcedTea Assignee: gnu.andrew at redhat.com Reporter: gnu.andrew at redhat.com CC: unassigned at icedtea.classpath.org Clone of bug 3504 for IcedTea 2.x. -- You are receiving this mail because: You are on the CC list for the bug. -------------- next part -------------- An HTML attachment was scrubbed... URL: From bugzilla-daemon at icedtea.classpath.org Thu Dec 21 02:52:03 2017 From: bugzilla-daemon at icedtea.classpath.org (bugzilla-daemon at icedtea.classpath.org) Date: Thu, 21 Dec 2017 02:52:03 +0000 Subject: [Bug 3505] [IcedTea7] [IcedTea8] Backport "8148421: Transport Layer Security (TLS) Session Hash and Extended Master Secret Extension" In-Reply-To: References: Message-ID: https://icedtea.classpath.org/bugzilla/show_bug.cgi?id=3505 Andrew John Hughes changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |ASSIGNED Target Milestone|--- |2.6.13 -- You are receiving this mail because: You are on the CC list for the bug. -------------- next part -------------- An HTML attachment was scrubbed... URL: From bugzilla-daemon at icedtea.classpath.org Thu Dec 21 02:53:57 2017 From: bugzilla-daemon at icedtea.classpath.org (bugzilla-daemon at icedtea.classpath.org) Date: Thu, 21 Dec 2017 02:53:57 +0000 Subject: [Bug 3506] New: [IcedTea8] Backport "8165996: PKCS11 using NSS throws an error regarding secmod.db when NSS uses sqlite" Message-ID: https://icedtea.classpath.org/bugzilla/show_bug.cgi?id=3506 Bug ID: 3506 Summary: [IcedTea8] Backport "8165996: PKCS11 using NSS throws an error regarding secmod.db when NSS uses sqlite" Product: IcedTea Version: 8-hg Hardware: all OS: All Status: NEW Severity: enhancement Priority: P5 Component: IcedTea Assignee: gnu.andrew at redhat.com Reporter: gnu.andrew at redhat.com CC: unassigned at icedtea.classpath.org NSS 3.12 and later support sqlite-based databases, which OpenJDK doesn't currently support. https://blogs.oracle.com/meena/whats-new-in-nss-312-new-shared-dbs https://bugs.openjdk.java.net/browse/JDK-8165996 -- You are receiving this mail because: You are on the CC list for the bug. -------------- next part -------------- An HTML attachment was scrubbed... URL: From bugzilla-daemon at icedtea.classpath.org Thu Dec 21 02:54:15 2017 From: bugzilla-daemon at icedtea.classpath.org (bugzilla-daemon at icedtea.classpath.org) Date: Thu, 21 Dec 2017 02:54:15 +0000 Subject: [Bug 3506] [IcedTea8] Backport "8165996: PKCS11 using NSS throws an error regarding secmod.db when NSS uses sqlite" In-Reply-To: References: Message-ID: https://icedtea.classpath.org/bugzilla/show_bug.cgi?id=3506 Andrew John Hughes changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |ASSIGNED URL| |https://bugs.openjdk.java.n | |et/browse/JDK-8165996 Blocks| |3481 Target Milestone|--- |3.7.0 -- You are receiving this mail because: You are on the CC list for the bug. -------------- next part -------------- An HTML attachment was scrubbed... URL: From bugzilla-daemon at icedtea.classpath.org Thu Dec 21 02:54:15 2017 From: bugzilla-daemon at icedtea.classpath.org (bugzilla-daemon at icedtea.classpath.org) Date: Thu, 21 Dec 2017 02:54:15 +0000 Subject: [Bug 3481] [TRACKER] IcedTea 3.7.0 Release In-Reply-To: References: Message-ID: https://icedtea.classpath.org/bugzilla/show_bug.cgi?id=3481 Andrew John Hughes changed: What |Removed |Added ---------------------------------------------------------------------------- Depends on| |3506 -- You are receiving this mail because: You are on the CC list for the bug. -------------- next part -------------- An HTML attachment was scrubbed... URL: From bugzilla-daemon at icedtea.classpath.org Thu Dec 21 02:54:56 2017 From: bugzilla-daemon at icedtea.classpath.org (bugzilla-daemon at icedtea.classpath.org) Date: Thu, 21 Dec 2017 02:54:56 +0000 Subject: [Bug 3507] New: [IcedTea7] Backport "8165996: PKCS11 using NSS throws an error regarding secmod.db when NSS uses sqlite" Message-ID: https://icedtea.classpath.org/bugzilla/show_bug.cgi?id=3507 Bug ID: 3507 Summary: [IcedTea7] Backport "8165996: PKCS11 using NSS throws an error regarding secmod.db when NSS uses sqlite" Product: IcedTea Version: 7-hg Hardware: all OS: All Status: NEW Severity: enhancement Priority: P5 Component: IcedTea Assignee: gnu.andrew at redhat.com Reporter: gnu.andrew at redhat.com CC: unassigned at icedtea.classpath.org Clone of bug 3506 for IcedTea 2.x. -- You are receiving this mail because: You are on the CC list for the bug. -------------- next part -------------- An HTML attachment was scrubbed... URL: From bugzilla-daemon at icedtea.classpath.org Thu Dec 21 02:55:09 2017 From: bugzilla-daemon at icedtea.classpath.org (bugzilla-daemon at icedtea.classpath.org) Date: Thu, 21 Dec 2017 02:55:09 +0000 Subject: [Bug 3507] [IcedTea7] Backport "8165996: PKCS11 using NSS throws an error regarding secmod.db when NSS uses sqlite" In-Reply-To: References: Message-ID: https://icedtea.classpath.org/bugzilla/show_bug.cgi?id=3507 Andrew John Hughes changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |ASSIGNED Target Milestone|--- |2.6.13 -- You are receiving this mail because: You are on the CC list for the bug. -------------- next part -------------- An HTML attachment was scrubbed... URL: From bugzilla-daemon at icedtea.classpath.org Thu Dec 21 02:57:08 2017 From: bugzilla-daemon at icedtea.classpath.org (bugzilla-daemon at icedtea.classpath.org) Date: Thu, 21 Dec 2017 02:57:08 +0000 Subject: [Bug 3508] New: [IcedTea8] Backport "8146115: Improve docker container detection and resource configuration usage" Message-ID: https://icedtea.classpath.org/bugzilla/show_bug.cgi?id=3508 Bug ID: 3508 Summary: [IcedTea8] Backport "8146115: Improve docker container detection and resource configuration usage" Product: IcedTea Version: 8-hg Hardware: all OS: Linux Status: NEW Severity: enhancement Priority: P5 Component: IcedTea Assignee: gnu.andrew at redhat.com Reporter: gnu.andrew at redhat.com CC: unassigned at icedtea.classpath.org https://bugzilla.redhat.com/show_bug.cgi?id=1463098 -- You are receiving this mail because: You are on the CC list for the bug. -------------- next part -------------- An HTML attachment was scrubbed... URL: From bugzilla-daemon at icedtea.classpath.org Thu Dec 21 02:57:22 2017 From: bugzilla-daemon at icedtea.classpath.org (bugzilla-daemon at icedtea.classpath.org) Date: Thu, 21 Dec 2017 02:57:22 +0000 Subject: [Bug 3508] [IcedTea8] Backport "8146115: Improve docker container detection and resource configuration usage" In-Reply-To: References: Message-ID: https://icedtea.classpath.org/bugzilla/show_bug.cgi?id=3508 Andrew John Hughes changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |ASSIGNED Blocks| |3481 Target Milestone|--- |3.7.0 -- You are receiving this mail because: You are on the CC list for the bug. -------------- next part -------------- An HTML attachment was scrubbed... URL: From bugzilla-daemon at icedtea.classpath.org Thu Dec 21 02:57:22 2017 From: bugzilla-daemon at icedtea.classpath.org (bugzilla-daemon at icedtea.classpath.org) Date: Thu, 21 Dec 2017 02:57:22 +0000 Subject: [Bug 3481] [TRACKER] IcedTea 3.7.0 Release In-Reply-To: References: Message-ID: https://icedtea.classpath.org/bugzilla/show_bug.cgi?id=3481 Andrew John Hughes changed: What |Removed |Added ---------------------------------------------------------------------------- Depends on| |3508 -- You are receiving this mail because: You are on the CC list for the bug. -------------- next part -------------- An HTML attachment was scrubbed... URL: From bugzilla-daemon at icedtea.classpath.org Thu Dec 21 13:18:36 2017 From: bugzilla-daemon at icedtea.classpath.org (bugzilla-daemon at icedtea.classpath.org) Date: Thu, 21 Dec 2017 13:18:36 +0000 Subject: [Bug 3502] Fatal: Read Error: Could not read or parse the JNLP file/ You can try downloading this file manually and sent it as bug report to ITWT. In-Reply-To: References: Message-ID: https://icedtea.classpath.org/bugzilla/show_bug.cgi?id=3502 JiriVanek changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |ASSIGNED --- Comment #6 from JiriVanek --- Wou. I'm astonished it worked :D Please note that nosecurity is really dangerous. Be sure you know what you are doing. Well, I run the url: javaws -nosecurity -Xnofork -allowredirect https://popgen.net/soft/lositan/code2/selwb4.jnlp (even with deployment.https.noenforce=true, which is the only major change in 1.7 agaisnt 1.6) In same way as you did, but it did not worked: net.sourceforge.jnlp.LaunchException: Fatal: Application Error: Cannot grant permissions to unsigned jars. Application requested security permissions, but jars are not signed. So I have no idea how it can work for you :) I will debug one more times with 1.6 and see. Thank you! -- You are receiving this mail because: You are on the CC list for the bug. -------------- next part -------------- An HTML attachment was scrubbed... URL: From bugzilla-daemon at icedtea.classpath.org Thu Dec 21 13:26:41 2017 From: bugzilla-daemon at icedtea.classpath.org (bugzilla-daemon at icedtea.classpath.org) Date: Thu, 21 Dec 2017 13:26:41 +0000 Subject: [Bug 3502] Fatal: Read Error: Could not read or parse the JNLP file/ You can try downloading this file manually and sent it as bug report to ITWT. In-Reply-To: References: Message-ID: https://icedtea.classpath.org/bugzilla/show_bug.cgi?id=3502 JiriVanek changed: What |Removed |Added ---------------------------------------------------------------------------- Severity|normal |major -- You are receiving this mail because: You are on the CC list for the bug. -------------- next part -------------- An HTML attachment was scrubbed... URL: