Return-Path: X-Original-To: archive-asf-public-internal@cust-asf2.ponee.io Delivered-To: archive-asf-public-internal@cust-asf2.ponee.io Received: from cust-asf.ponee.io (cust-asf.ponee.io [163.172.22.183]) by cust-asf2.ponee.io (Postfix) with ESMTP id 2D1CE200B6B for ; Fri, 9 Sep 2016 23:37:16 +0200 (CEST) Received: by cust-asf.ponee.io (Postfix) id 2BC44160AC2; Fri, 9 Sep 2016 21:37:16 +0000 (UTC) Delivered-To: archive-asf-public@cust-asf.ponee.io Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by cust-asf.ponee.io (Postfix) with SMTP id 4E1AD160AA3 for ; Fri, 9 Sep 2016 23:37:15 +0200 (CEST) Received: (qmail 22028 invoked by uid 500); 9 Sep 2016 21:37:14 -0000 Mailing-List: contact dev-help@tomcat.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: "Tomcat Developers List" Delivered-To: mailing list dev@tomcat.apache.org Received: (qmail 22017 invoked by uid 99); 9 Sep 2016 21:37:14 -0000 Received: from pnap-us-west-generic-nat.apache.org (HELO spamd3-us-west.apache.org) (209.188.14.142) by apache.org (qpsmtpd/0.29) with ESMTP; Fri, 09 Sep 2016 21:37:14 +0000 Received: from localhost (localhost [127.0.0.1]) by spamd3-us-west.apache.org (ASF Mail Server at spamd3-us-west.apache.org) with ESMTP id DA0F2180457 for ; Fri, 9 Sep 2016 21:37:13 +0000 (UTC) X-Virus-Scanned: Debian amavisd-new at spamd3-us-west.apache.org X-Spam-Flag: NO X-Spam-Score: -0.82 X-Spam-Level: X-Spam-Status: No, score=-0.82 tagged_above=-999 required=6.31 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, WEIRD_PORT=0.001] autolearn=disabled Authentication-Results: spamd3-us-west.apache.org (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com Received: from mx1-lw-eu.apache.org ([10.40.0.8]) by localhost (spamd3-us-west.apache.org [10.40.0.10]) (amavisd-new, port 10024) with ESMTP id gJ_fWgNEMUU3 for ; Fri, 9 Sep 2016 21:37:11 +0000 (UTC) Received: from mail-oi0-f54.google.com (mail-oi0-f54.google.com [209.85.218.54]) by mx1-lw-eu.apache.org (ASF Mail Server at mx1-lw-eu.apache.org) with ESMTPS id D312C5FB6F for ; Fri, 9 Sep 2016 21:37:10 +0000 (UTC) Received: by mail-oi0-f54.google.com with SMTP id m11so167204427oif.1 for ; Fri, 09 Sep 2016 14:37:10 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to; bh=izFFfGoGfiku20cWN2ONzli2EOGudWj4Gza6KAwHEok=; b=HogulQyfulYb/l3NtKWDk5383TCV2sy8QVrxkn+7sd30Wzmk1s/BGs5Ty2j6StjEGq APiAN78jKVCcXcmtdgae7LET41gEJg7LUQnxh+uszsPMBoVF+AOOCmx9B62nplv6rsmP 6jgEPKLFhcOn6IVYUn8ygJ95ioiHTn4SKfVk5AeRtwIphYvv0zLLVXjExzZpwkBmP8YC 3rcdYpUnD6XnKWylSNBVzJnQwlOn1m+crdprMZJJJf4AvevQAkW1ZGvwWzbM+sK7xdvF XnC+7++aa4k+X128c+BY49MZ8Cv/qcm0OEo2qvU8FnTqwKv12DmFTzPyEWyPrDLvXVgJ K5qQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to; bh=izFFfGoGfiku20cWN2ONzli2EOGudWj4Gza6KAwHEok=; b=kUHG1g2zarV48wKq4S0+N5J2joy5nQ1X/fEERXZb8P7+mDaX0o6mC1M2ywHAK0O25h OcdDYob/tDKrEJgIoGRm7Ej/KnFCavLV/MYJNXrCpxKz6ea9JrEdf4UstpuK+BbBDaoZ 8L2x9cj4fTF+Wh0NPphE6WBb2dEFkkZeWnsyKJu68IXNyYYrDXLzcILca21JNxcfrpbE Retc1eaJ6kiKe88bxuV9C86KwSUPQ/o9PXgogawGKfiqZ9umlUdk1Fnfoy22Aq9nXmkw 7H0c1iDwdoijm69Q4G86aa7K6+Z8fqg/MNczWlnWQ/VdzrO4EGQSaMcnDUw6ff0r1CyL +CBw== X-Gm-Message-State: AE9vXwOBxNhQXyBPDUZBlluJtKygmY1ZQz/AB8yKe2Ahb6K/ST6D+gCmLjG2FQ2HDMS6D/jdTkGmfOG9ak7ABA== X-Received: by 10.202.218.2 with SMTP id r2mr8328799oig.177.1473457023784; Fri, 09 Sep 2016 14:37:03 -0700 (PDT) MIME-Version: 1.0 Received: by 10.202.172.23 with HTTP; Fri, 9 Sep 2016 14:37:03 -0700 (PDT) In-Reply-To: References: From: Konstantin Kolinko Date: Sat, 10 Sep 2016 00:37:03 +0300 Message-ID: Subject: Re: [VOTE] Release Apache Tomcat 7.0.71 To: Tomcat Developers List Content-Type: text/plain; charset=UTF-8 archived-at: Fri, 09 Sep 2016 21:37:16 -0000 2016-09-07 14:00 GMT+03:00 Violeta Georgieva : > The proposed Apache Tomcat 7.0.71 release is now available for voting. > > It can be obtained from: > https://dist.apache.org/repos/dist/dev/tomcat/tomcat-7/v7.0.71/ > The Maven staging repo is: > https://repository.apache.org/content/repositories/orgapachetomcat-1094/ > The svn tag is: > http://svn.apache.org/repos/asf/tomcat/tc7.0.x/tags/TOMCAT_7_0_71/ > > The proposed 7.0.71 release is: > [X] Broken - do not release > [ ] Stable - go ahead and release as 7.0.71 Stable 1. Good news: ============ All tests with various java versions (6u45, 7u80, 8u102) x all connectors (bio, nio, apr) - OK Tested with 32-bit JDKs on Windows. I am ignoring the following failures with 6u45 - TEST-org.apache.catalina.startup.TestHostConfigAutomaticDeployment.NIO.txt TEST-org.apache.catalina.startup.TestHostConfigAutomaticDeployment.BIO.txt TEST-org.apache.catalina.startup.TestHostConfigAutomaticDeployment.APR.txt TEST-org.apache.tomcat.util.net.TestSsl.APR.txt TestHostConfigAutomaticDeployment with Java 6u45: It is known issue with Java 6u45 on Windows caused Java locking jar (war) files that cannot be renamed. Fixed in Java 7. TestSsl with Java 6u45: [[[ Testcase: testSimpleSsl took 4,239 sec Caused an ERROR java.lang.RuntimeException: Could not generate DH keypair javax.net.ssl.SSLException: java.lang.RuntimeException: Could not generate DH keypair at com.sun.net.ssl.internal.ssl.Alerts.getSSLException(Alerts.java:190) at com.sun.net.ssl.internal.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1747) at com.sun.net.ssl.internal.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1708) at com.sun.net.ssl.internal.ssl.SSLSocketImpl.handleException(SSLSocketImpl.java:1691) at com.sun.net.ssl.internal.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1222) at com.sun.net.ssl.internal.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1199) at sun.net.www.protocol.https.HttpsClient.afterConnect(HttpsClient.java:434) at sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:166) at sun.net.www.protocol.https.HttpsURLConnectionImpl.connect(HttpsURLConnectionImpl.java:133) at org.apache.catalina.startup.TomcatBaseTest.methodUrl(TomcatBaseTest.java:651) at org.apache.catalina.startup.TomcatBaseTest.getUrl(TomcatBaseTest.java:625) at org.apache.catalina.startup.TomcatBaseTest.getUrl(TomcatBaseTest.java:619) at org.apache.catalina.startup.TomcatBaseTest.getUrl(TomcatBaseTest.java:608) at org.apache.catalina.startup.TomcatBaseTest.getUrl(TomcatBaseTest.java:602) at org.apache.tomcat.util.net.TestSsl.testSimpleSsl(TestSsl.java:62) Caused by: java.lang.RuntimeException: Could not generate DH keypair at com.sun.net.ssl.internal.ssl.DHCrypt.(DHCrypt.java:114) at com.sun.net.ssl.internal.ssl.ClientHandshaker.serverKeyExchange(ClientHandshaker.java:559) at com.sun.net.ssl.internal.ssl.ClientHandshaker.processMessage(ClientHandshaker.java:186) at com.sun.net.ssl.internal.ssl.Handshaker.processLoop(Handshaker.java:593) at com.sun.net.ssl.internal.ssl.Handshaker.process_record(Handshaker.java:529) at com.sun.net.ssl.internal.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:943) at com.sun.net.ssl.internal.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1188) at com.sun.net.ssl.internal.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1215) Caused by: java.security.InvalidAlgorithmParameterException: Prime size must be multiple of 64, and can only range from 512 to 1024 (inclusive) at com.sun.crypto.provider.DHKeyPairGenerator.initialize(DashoA13*..) at java.security.KeyPairGenerator$Delegate.initialize(KeyPairGenerator.java:627) at com.sun.net.ssl.internal.ssl.DHCrypt.(DHCrypt.java:107) ]]] I do not remember seeing it earlier, but as this error is at client side of a test connection and as the test successfully runs with Java 7 and later I am not very concerned. The following documentation update in Tomcat 8 explains this "Prime size must be multiple of 64" issue (see the text added to ssl-howto.xml). Maybe add this text to Tomcat 7 documentation as well? http://svn.apache.org/viewvc?view=revision&revision=1681703 2. Bad news: ========= Smoke testing fails: Running with SecurityManager enabled is broken. Jasper fails to initialize and none of JSP pages work. I filed the details into Bugzilla: https://bz.apache.org/bugzilla/show_bug.cgi?id=60101 I think this is a showstopper. That said, this build is usable when SecurityManager is not enabled. Best regards, Konstantin Kolinko --------------------------------------------------------------------- To unsubscribe, e-mail: dev-unsubscribe@tomcat.apache.org For additional commands, e-mail: dev-help@tomcat.apache.org