Return-Path: Delivered-To: apmail-db-derby-dev-archive@www.apache.org Received: (qmail 84743 invoked from network); 9 Mar 2009 10:25:16 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.2) by minotaur.apache.org with SMTP; 9 Mar 2009 10:25:16 -0000 Received: (qmail 30870 invoked by uid 500); 9 Mar 2009 10:25:15 -0000 Delivered-To: apmail-db-derby-dev-archive@db.apache.org Received: (qmail 30852 invoked by uid 500); 9 Mar 2009 10:25:15 -0000 Mailing-List: contact derby-dev-help@db.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: Delivered-To: mailing list derby-dev@db.apache.org Received: (qmail 30843 invoked by uid 99); 9 Mar 2009 10:25:15 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 09 Mar 2009 03:25:15 -0700 X-ASF-Spam-Status: No, hits=-2000.0 required=10.0 tests=ALL_TRUSTED X-Spam-Check-By: apache.org Received: from [140.211.11.140] (HELO brutus.apache.org) (140.211.11.140) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 09 Mar 2009 10:25:11 +0000 Received: from brutus (localhost [127.0.0.1]) by brutus.apache.org (Postfix) with ESMTP id 99771234C046 for ; Mon, 9 Mar 2009 03:24:50 -0700 (PDT) Message-ID: <664919317.1236594290627.JavaMail.jira@brutus> Date: Mon, 9 Mar 2009 03:24:50 -0700 (PDT) From: "Kristian Waagan (JIRA)" To: derby-dev@db.apache.org Subject: [jira] Updated: (DERBY-4073) Creation/configuration of ClientXDataSource fails because of two setSsl methods In-Reply-To: <4334054.1235652422113.JavaMail.jira@brutus> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-JIRA-FingerPrint: 30527f35849b9dde25b450d4833f0394 X-Virus-Checked: Checked by ClamAV on apache.org [ https://issues.apache.org/jira/browse/DERBY-4073?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Kristian Waagan updated DERBY-4073: ----------------------------------- Derby Info: [Patch Available, Existing Application Impact, Release Note Needed] (was: [Patch Available]) > Creation/configuration of ClientXDataSource fails because of two setSsl methods > ------------------------------------------------------------------------------- > > Key: DERBY-4073 > URL: https://issues.apache.org/jira/browse/DERBY-4073 > Project: Derby > Issue Type: Bug > Components: JDBC, Network Client > Affects Versions: 10.3.3.1, 10.4.2.1, 10.5.0.0 > Reporter: Kristian Waagan > Assignee: Kristian Waagan > Attachments: derby-4073-1a-add_docs_and_remove_setSsl_int.diff, releaseNote.html > > > Applications using reflection (and JavaBean conventions) have problems configuring the Derby client data sources. > Depending on how things are done, the user may or may not see the problems. > For instance, some applications obtain all valid data source properties and list them with their default settings. In the case of SSL, this will be "Ssl" with value "off". When the application is trying to call setSsl("off") through reflection it may invoke setSsl(int) instead of setSsl(String), failing because "off" cannot be converted to an integer. In some implementations both methods will be invoked. > There are two ways to look at this, and I don't know which one is correct: > o the reflection code of the third-party applications using Derby isn't written well enough. > o Derby is to blame for the problem by providing two setSsl-methods. > I don't know if providing overloading setters violates the JavaBean spec, or any other relevant spec we should follow. > The easiest technical solution is to rename one of the methods or possibly making one of them private. Both of these will break existing applications using that method to configure a Derby client data source. > Is doing this, and providing a release note, sufficient? > Does anyone see any other solutions? > It should be noted that in some applications, it is impossible to configure ClientConnectionPoolDataSource or ClientXADataSource to use SSL. The reasons are the problem described here and DERBY-4067. One typical class of software with this problem is application servers. A workaround is to avoid setting the SSL property, which isn't doable if you need SSL of course... > A related issue is whether it should be allowed to set the SSL property both through the setter method(s) and as a connection attribute. -- This message is automatically generated by JIRA. - You can reply to this email to add a comment to the issue online.