Return-Path: Delivered-To: apmail-openjpa-users-archive@minotaur.apache.org Received: (qmail 9887 invoked from network); 24 Feb 2010 20:18:41 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.3) by minotaur.apache.org with SMTP; 24 Feb 2010 20:18:41 -0000 Received: (qmail 86851 invoked by uid 500); 24 Feb 2010 20:18:41 -0000 Delivered-To: apmail-openjpa-users-archive@openjpa.apache.org Received: (qmail 86775 invoked by uid 500); 24 Feb 2010 20:18:40 -0000 Mailing-List: contact users-help@openjpa.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: users@openjpa.apache.org Delivered-To: mailing list users@openjpa.apache.org Received: (qmail 86762 invoked by uid 99); 24 Feb 2010 20:18:40 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 24 Feb 2010 20:18:40 +0000 X-ASF-Spam-Status: No, hits=2.2 required=10.0 tests=HTML_MESSAGE,SPF_PASS X-Spam-Check-By: apache.org Received-SPF: pass (nike.apache.org: domain of ljnelson@gmail.com designates 209.85.160.174 as permitted sender) Received: from [209.85.160.174] (HELO mail-gy0-f174.google.com) (209.85.160.174) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 24 Feb 2010 20:18:32 +0000 Received: by gyh20 with SMTP id 20so833603gyh.33 for ; Wed, 24 Feb 2010 12:18:11 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:date:message-id:subject :from:to:content-type; bh=ccoETeLZhpDxFBINrbKVhX4XWvOKpioD7lMcKMaEJvs=; b=vUyycfKZGFarw0fNE69t28p70IpPWNKlxWhZr+DNDMudAZywZhLEGrOQ39gnuk4tmk 9QldvcIkGC2ffIqFTd5rG6C1wTSQTOeHfpcihTV63dPvDZqi0rpClO1L1p6CQk0+T93o cvv4xxqQl3AiwFftzL1uY1Pgm9lG6zWgRcAjA= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:date:message-id:subject:from:to:content-type; b=r+9n6F2qhaEWuB/CjGB9FNFGtHQxgKXEocjVaV0jd9fvJvGuP5MJ9Xj5nURSP0W/jD e3SgGKEItCe2mW7NHJPL5Zm4iQzHSopKWJ/uBMN4ippSv1VSBg0CPQUkwEqjOnt6dEz5 a+106iXsmmEzq906kJ9PZVoN7S+LzJvxsrNjE= MIME-Version: 1.0 Received: by 10.150.128.38 with SMTP id a38mr37403ybd.217.1267042691039; Wed, 24 Feb 2010 12:18:11 -0800 (PST) Date: Wed, 24 Feb 2010 15:18:11 -0500 Message-ID: <2c0ebf0c1002241218m35e57d4do5889caacc4c88930@mail.gmail.com> Subject: clone() contract broken for JDBCConfigurationImpl instances From: Laird Nelson To: users@openjpa.apache.org Content-Type: multipart/alternative; boundary=000e0cd61e6483c1ec04805e5d18 X-Virus-Checked: Checked by ClamAV on apache.org --000e0cd61e6483c1ec04805e5d18 Content-Type: text/plain; charset=ISO-8859-1 Hello; JDBCConfigurationImpl, when cloned, drops its passwords on the floor. This did not happen in version 1.2.2. The problem is related to the introduction of the EncryptionProvider in the 2.0 line (and others). The bug is here: https://issues.apache.org/jira/browse/OPENJPA-1534 This is a showstopper for me, but I'm not clear what the proper resolution is (other than to implement clone() by calling super.clone() as should be the case). Thanks, Laird --000e0cd61e6483c1ec04805e5d18--