Impact | Type | Component | Release | Details | |||
---|---|---|---|---|---|---|---|
Impact | Type | Component | Release | Summary | Details | ||
Minor | Defect | General | 9.2.10.0 | FATAL for JDBC process server - Underlying resource has been released |
Before: Under some circumstances, long running processes would not be able to load application resources. After: This has been resolved so that processes can continue to load application resources. Id: RCORE-44846 |
||
Normal | Defect | Connector | 9.2.10.0 | AS400: Make submitting/monitoring jobs failsafe |
Before: Several issues running AS400 Jobs
After: At startup we will better check if we can reach out to the AS400. We leave the Process Server in status Connecting while we can’t reach out to the AS400. If we do find the AS400 and we loose the connection while re-monitoring the jobs that were already started we don’t check the connection anymore. The job is set to Running when all operator messages are replied. We will retry (default 5 times) the login if we get an unexpected connection failure. This can be overruled on Process Server level (AS400JobSubmitRetry) or Job level (SubmitRetry) Id: RCORE-44101 |
||
Normal | Defect | Connector | 9.2.10.0 | HTTP: Make sure to send content-length=0 for empty body in POST request |
Before: When sending an HTTP POST request, a source was mandatory in order to make sure the Content-Length header is set on the request. After: It is now possible to send an HTTP POST request without body (Content-length will be set to 0) Id: RCORE-44184 |
||
Normal | Defect | Connector | 9.2.10.0 | PeopleSoft: Delay the finishing of a job when an exception is thrown |
Before: When we can't check the jobstatus in PeopleSoft the job is set to the final status Unknown. After; A delay (default 60 minutes) can be set that will delay the setting of the final job status when we catch an exception when checking for the job status Id: RCORE-43569 |
||
Normal | Defect | Connector | 9.2.10.0 | Redwood Server X509 credential cert chain and passphrase issues |
Before After 2. Private keys that are passphrase protected can be uploaded for a Client Certificate credential. If the wrong passphrase is presented we fail as expected with, "JCS-102454: X509 Certificate error: Given final block not properly padded. Such issues can arise if a bad key is used during decryption." 3. Protected private key uploaded into ClientCertificate with wrong password and then corrected to right password now loads fine. 4. Trusted Certificates and Client Certificate public attributes such as Serial Number, Subject, Validity, Key algorithm, Issuer, Subject Alternate Name and Basic Constraints are now logged together with Endpoint name whenever these credentials are refreshed/reloaded. Use System_DynamicTrace "api.http=debug;net.tls.client=debug;model.method.impl.CredentialChecker=debug;" to inspect. 5. "Out of heap space"/array copy errors when our own ASN.1 parser is presented with non-ASN.1 in PEM format (such as OpenSSL uses when generating a passphrase protected keypair - see PEM ENCRYPTION FORMAT under https://www.openssl.org/docs/manmaster/man3/PEM_read_PrivateKey.html for details. 6. ASN.1 parsing of private keys now uses much clearer DEBUG logging, in case we encounter key loading issues in a customer ticket. We also explicitly log that we don't support Elliptic Curve cryptography if we ever encounter a private key encrypted this way (There's a separate JIRA to support it when a customer requests it). 7. PEM format certificates that include a certificate chain can now use successfully input into an X.509 Client Certificate. The order is expected to be: public cert, intermediate CA cert, root cert, private key. 8. An attempt to input an Elliptic Curve based private key now results in a clear error message (Elliptic Curve support is the subject of another JIRA). Id: RCORE-43898 |
||
Normal | Defect | Connector | 9.2.10.0 | Unregister Database Drivers when updated or unused |
Before: Libraries that contains a database driver used by a JDBC process server, can result in multiple instances of the database driver being registered with the Java JDBC DriverManager. As it is registered, the driver resources are not released and this can lead to the JVM hitting an OOM, running out of Metaspace. After: Libraries that contains a database driver used by a JDBC process server are properly unregistered and have their consumed memory released. Id: RCORE-44195 |
||
Normal | Defect | Connector | 9.2.10.1 | AS400 jobs running into error - continued (to be released in hf3) |
Before: When a socket is closed without informing the job was put to Error. After: When we get a SocketException we will put the job in the monitor tree again so we can finish the job. Id: RCORE-45190 |
||
Normal | Defect | Connector | 9.2.10.1 | AS400: Event monitor component can be shutdown without notifying the service |
Before: It could be that the event monitor thread is shutdown without notifying the process server when an unexpected exception is thrown. After: An unexpected runtime exception is catched and the monitor thread will continue. Id: RCORE-45225 |
||
Normal | Defect | Connector | 9.2.10.1 | Do not check if fields are empty in constraints |
Before: When you are using an EBS job in a jobchain it is not possible to use restart status handlers because a mandatory userName field is not set. After: The mandatory username check is removed as this field is set when the status handlers are used. Id: RCORE-44842 |
||
Normal | Defect | Connector | 9.2.10.1 | OraApps: Optimize monitored jobs |
Before: Adding child jobs of a monitored job is slow. After: Adding monitored jobs will be done in separated thread so the adding of child jobs is much faster. Id: RCORE-44797 |
||
Normal | Defect | Core | 9.2.10.0 | Chain in inconsistent state with failing pre-conditions |
Before: In a one-step chain, if a precondition REL expression threw an exception, the step would go into Error, however the chain would go into Completed, thus leaving the chain in an inconsistent state. An operator message was generated with a manual restart prompt, however responding to this operator message had no affect. If the chain had two or more steps, then the step would go to error, and the chain would block, again resulting in an inconsistent state. After: If a step precondition throws an exception, it will be handled as if a call had gone into error, and do the appropriate handling based on the final status handlers. All calls in the step will be set to Skipped. Id: RCORE-43520 |
||
Normal | Defect | Core | 9.2.10.0 | Configuration does not update after component is upgraded in the catalog |
Before: When an Extension Point with an updated configuration was uploaded, the new configuration options and default values would not get updated. After: This has been fixed. Id: RCORE-44093 |
||
Normal | Defect | Core | 9.2.10.0 | Default retention for operator messages |
Before: operator messages stayed in the system until a job was manually fired or scheduled to clean them up. After: Introduced a new configuration group DefaultRetentionFroOperatorMessages with a setting RetentionDuration. All operator operator messages will be deleted after this duration which by default is 91 days. Id: RCORE-43271 |
||
Normal | Defect | Core | 9.2.10.0 | Enable Map Return Code to Completed on System_Defaults_% definitions |
Before: When setting "Returncode Map To Completed" on the System_Defaults_Partition or System_Defaults_System process definitions, it was not being considered as a "default value" for any process definition that didn't have this field set. After: When setting "Returncode Map To Completed" on the System_Defaults_Partition or System_Defaults_System process definitions, it is considered as a "default value" for any process definitions that don't have this field set. Id: RCORE-43467 |
||
Normal | Defect | Core | 9.2.10.0 | Ensure that version information is hidden when an incorrect request is received |
Before: Invalid requests would release version information about the underlying application server in error responses. After: This information is now suppressed and will not be displayed. Id: RCORE-44082 |
||
Normal | Defect | Core | 9.2.10.0 | Force refresh of CustomEntityCache after upgrade of column names |
Before: An error could occur when upgrading due to a missing type related to case sensitivity issues with the database. After: The upgrade will now succeed. Id: RCORE-44133 |
||
Normal | Defect | Core | 9.2.10.0 | HistoryJob should be always created |
Before: When the retention on history job was set to 0 and the license was not subscription based, no history jobs were created. After: History jobs are always created. When the retention on history job is set to 0, it will be deleted immediately when the System_AggregateHistoryJob job runs, but only when usage data, based on the history job table, is sent to the usage service. Id: RCORE-44343 |
||
Normal | Defect | Core | 9.2.10.0 | Improve sending of files to upgrading platform agents |
Before: When multiple agents connects after a system upgrade the agents all ask for the same download file to upgrade the PlatformAgent. This could cause a high cpu usage on server side. After: As all agents wants the same upgrade file for a certain platform we now generate this upgrade file only once. The agents needs only to download this single created file for upgrading. Id: RCORE-42785 |
||
Normal | Defect | Core | 9.2.10.0 | Improve time to load large chains in editor |
After: The speed with which large chains can be loaded in the chain editor has been greatly improved. In some cases, improvements of up to 30% have been seen. Id: RCORE-44114 |
||
Normal | Defect | Core | 9.2.10.0 | Job scheduler continuously reschedules jobs |
Before: Calculation for process scheduling when a Time Window closed could degrade system performance due to repeated evaluations of held queues. After: Held queues are no longer evaluated for scheduling changes when the Time Window closes. Id: RCORE-43860 |
||
Normal | Defect | Core | 9.2.10.0 | NullPointerException in CompileListener.updateCurrentNonMasterVersion |
Before: In some circumstances it was possible for process definitions of types other than RedwoodScript and Java to be treated as Java code, and compiled if the library attached to the definition was changed. This would then fail the compilation, and thus prevent the update of the library. After: Now only RedwoodScript and Java processes will be treated as Java code. Id: RCORE-44098 |
||
Normal | Defect | Core | 9.2.10.0 | Observe RestrictedSchedulerSession rank when granted via Role |
Before: The permissions for the Restricted Scheduler Session Specification was limited to being granted directly to a user. After: Role based grants will now be used for determining a user’s permissions for the Restricted Scheduler Session Specification. Id: RCORE-43947 |
||
Normal | Defect | Core | 9.2.10.0 | Old Script definitions may not have been successfully upgraded. |
Before: In certain circumstances with occasional use, Redwood Script definitions that have not be updated recently may fail to run due to a NullPointException when trying to retrieve the underlying resources. After: The old definitions will now correctly be upgrade to the new internal representation and can be run successfully. Id: RCORE-44127 |
||
Normal | Defect | Core | 9.2.10.0 | On-premise installations with usage based contract, should post usage data to usage service |
When the license is based on usage, usage data is collected and sent to Redwood. This requires a license with a company.AccountID key and a key Contract.Subscription set to true. Id: RES-785 |
||
Normal | Defect | Core | 9.2.10.0 | Only create grants for valid object definitions |
Before: It was possible for an import to fail and prevent the user from logging in due to unresolved grants After: Unresolved grants will no longer prevent the user from logging in. Id: RCORE-44135 |
||
Normal | Defect | Core | 9.2.10.0 | ProcessChain Parameter value ignored |
Before: ProcessChain would ignore default array type parameter After: This has been fixed Id: RCORE-43864 |
||
Normal | Defect | Core | 9.2.10.0 | Reading large documents is slow and uses a lot of memory |
Before change: Application was consuming 250 MB memory during uploading 11MB document (For bigger files it can even throw OutOfMemory exception) After change: Now application consuming only 50MB for 11MB document Id: RCORE-43789 |
||
Normal | Defect | Core | 9.2.10.0 | Remove ThreadGroup.destroy and ThreadGroup.setDaemon from RequestQueue |
Before: Internal management of threads could result in attempting to reused the internal ThreadGroup once it has been discarded. After: The shutdown of the ThreadGroup will no longer happen and allow for future reuse. Id: RCORE-44176 |
||
Normal | Defect | Core | 9.2.10.0 | Report fails with invalid DateTimeZone format "2022/08/02 22:00:00,559 -05:00" |
Before: BaseRuleProcessor failed when need to parse date time string with time zone (when time zone as digits) "2022/08/02 22:00:00,559 -05:00" After: BaseRuleProcessor correctly parsing date time string with time zone (time zone as digits +05:00 or letters GMT). When no time zone in string, then takes GMT as default. Id: RCORE-44148 |
||
Normal | Defect | Core | 9.2.10.0 | Restrict access to Java ProcessBuilder from Redwood Script |
Before: ProcessBuilder class could be used in Redwood Scripts After: ProcessBuilder class can only be used in Redwood Scripts only when the configuration JavaToolkit.RedwoodScript.DisableRuntimeExec is set to false. It is not possible to disable this setting in the cloud systems. Tickets: 138455 Id: RCORE-41528 |
||
Normal | Defect | Core | 9.2.10.0 | SecureTempFile performance degrades with large files |
Before: Since 9.2.9.0, exporting of a large CAR file from the product would be a very slow process. After: The regression in the performance has been fixed. Id: RCORE-44270 |
||
Normal | Defect | Core | 9.2.10.0 | Security Performance: optimize query when getting parent object from a child |
Before: In some cases, we add security when it is not necessary After: When we have a child object, we no longer apply security when retrieving the parent, as we already know it must have been applied to get the child in the first place Id: RCORE-43822 |
||
Normal | Defect | Core | 9.2.10.0 | Speed up loading of process chains in chain editor |
The speed loading of chains in the chain editor has been improved, in some cases loading in a quarter of the time. Id: RCORE-42377 |
||
Normal | Defect | Core | 9.2.10.0 | Support for Java 11 within RedwoodScript |
Before: The methods from java.lang.System and java.lang.Runtime since Java 8 are not available, and will prevent the running of Redwood Script if these methods were attempted to be accessed. After: The new methods have been made available, and will allow compilation of the Redwood Script. Id: RCORE-44035 |
||
Normal | Defect | Core | 9.2.10.0 | Unable to use aliased functions in report columns using rel |
Before: There was a problem accessing columns with their alias names in reports using REL
After: In the report REL context a new variable is available: columns. The variable will enable report users to access column values with a new column variable, e.g.: =columns.jd.Description. If a column name is unique in a result set it can be accessed without providing the table alias: =columns.Description. All aliases defined in the original report query are also available within the columns variable. Tickets: 144203 Id: RCORE-42068 |
||
Normal | Defect | Core | 9.2.10.0 | When license key Subscription is set to true history records need to be written |
Before: Customers can set registry key jobhistory to value 0, which will prevent the system from writing historyjob entries. After: When license key Contract.Subscription is set to true, historyjob entries should still be written and can be cleaned up as soon as they have been counted. Id: RCORE-43463 |
||
Normal | Defect | Core | 9.2.10.0 | When user changes JobChain call job, JobChainEngine should ignore scheduling parameters when it gets scheduled |
Before: When a custom start time was entered for a future job chain call, the start time would get overwritten once the step would go into running and there was a scheduling parameter set for the start time.
After: A manual set start time on a job chain call will no longer get overwritten by a scheduling parameter. Id: RCORE-43278 |
||
Normal | Defect | Core | 9.2.10.1 | Check for availability of JDBC drivers more efficiently in the UI |
Before: Testing the JDBC Database connection to a JDBC driver could fail, due to errors initialising the class, preventing the creation of the Database object. This is most often seen with MySQL and Snowflake drivers. After: The validation uses less resources, and works in more cases. Specifically for MySQL, this allows the generation of JDBC connection to the database. Id: RCORE-43060 |
||
Normal | Defect | Core | 9.2.10.1 | Don't prefix custom tables unconditionally and make sure validity is set correctly |
Before: internal references to database tables were potentially set incorrectly (a duplicate prefix in the CustomTableName column of the ObjectDefinition table ). After: existing references will be repaired and new references will be set correctly from the start. Id: RCORE-44389 |
||
Normal | Defect | Core | 9.2.10.1 | Incorrect date time format in UserMessageTableGenerator |
Before: Calls to UserMessage.renderHistoryAsHTML caused a formatting-related exception. After: Formatting has been fixed and UserMessage.renderHistoryAsHTML can be used again. Id: RCORE-44741 |
||
Normal | Defect | Core | 9.2.10.1 | Re-evaluate Wait Event preconditions when a Job Wait Event gets raised on a job |
Before: Clearing raised events inside loop immediately. No possibility to start process when one of few events raised. After: Raised events are clearing after all job preconditions loop finished. User is able to start a process when one of many events have been raised. Events ware cleared after all preconditions were run. Id: RCORE-42928 |
||
Normal | Defect | Extension Points | 9.2.10.0 | "Raw" and "External" extension points should default to being Stateless |
Before: A change was released in 9.2.8.12 that caused some extension points to fail. After: This has been resolved in 9.2.8.13. This does not affect the 9.2.9.x, or 9.2.10.x releases Id: RCORE-44755 |
||
Normal | Defect | General | 9.2.10.0 | Convert tools/rw-bootstrap-api to gradle |
This is purely a build system change that should have no impact on the delivered product. Id: RCORE-45202 |
||
Normal | Defect | General | 9.2.10.0 | Timewindow time format not 24h |
Before: The calendar control in the Time Window edit page did not use the "Force 24-hour format" user setting. After: The calendar control in the Time Window edit page displays time according to the "Force 24-hour format" user setting. Tickets: 142542 Id: RCORE-42001 |
||
Normal | Defect | General | 9.2.10.0 | Upgrade PostgreSQL JDBC driver to 42.5.1 |
Before: The Postgres organisation announced a security flaw in the version of the database driver that we were using. This only impacted systems running on Unix style systems, but not MacOS. This vulnerability could allow other users that had access to the underlying OS to read the contents of any JAR files that were in the process of being persisted. After: The database driver is updated to a version that is resistant to this attack. NOTE: Redwood consider this flaw to be of a LOW risk level, as it only exposes JAR file contents, which are unlikely to contain any confidential information. It also has a HARD exploitation mode. Nonetheless, we are fixing this issue to eliminate that risk. Id: RCORE-44279 |
||
Normal | Defect | General | 9.2.10.0 | Upgrade PostgreSQL JDBC driver to 42.5.3 |
Before: Versions of the Postgres JDBC driver prior to 42.5.2 could, under some circumstances, get stuck when attempting to initiate an SSL connection to the Postgres server. In extreme cases, this could end up locking the product, as it would get stuck waiting for this connection to return. After: The database driver is updated to a version that is resistant to this problem, even if the server is killed, or dies unexpectedly, at an inopportune time. Id: RCORE-44897 |
||
Normal | Defect | General | 9.2.10.0 | Upgrade Tomcat to 9.0.70 to fix CVE |
Before: Apache Tomcat has a security vulnerability (CVE-2022-45143) After: Apache Tomcat has been upgraded to resolve the vulnerability. Id: ENV-2272 |
||
Normal | Defect | General | 9.2.10.1 | AS400 jobs running into error |
Before: It could be that the connection ended because the socket was closed to early. After: The connection is now retried a MaxNumberOfConnectionRetries (That can be set by a ProcessServer parameter). Id: RCORE-45102 |
||
Normal | Defect | General | 9.2.10.1 | AS400: Connection is broken when used during file retrieval |
Before: It could be that the job runs into error while retrieving files from AS400. After: Before using the connection to retrieve files we will check if we have a valid connection. If we don’t have a valid connection we retry to create a valid connection. This only works for AS400 V7R1 and up. Id: RCORE-44744 |
||
Normal | Defect | General | 9.2.10.1 | Issue with System_ArchiveAuditObjects |
Before For process definitions System_ArchiveAuditObjects and System_ExportAuditObjects, the Partition field was a string, and the Business Key Contains field was a Partition dropdown. After For process definitions System_ArchiveAuditObjects and System_ExportAuditObjects, the Partition and Business Key Contains fields have been corrected. Id: RCORE-44889 |
||
Normal | Defect | General | 9.2.10.1 | Replace Signing certificate for Windows platform agent executables. |
Before: Id: RCORE-44892 |
||
Normal | Defect | General | 9.2.10.1 | Upgrade Tomcat to 9.0.73 |
Before: RunMyJobs was using Tomcat 9.0.70, in which a security issue has been found (CVE-2023-28708). After: Tomcat has been upgraded to 9.0.73, where the security issue is resolved. NOTE: The vulnerable classes from the CVE are not used, however the version is being upgraded out of precaution. Id: RCORE-45130 |
||
Normal | Defect | Platform Agent | 9.2.10.0 | Platform Agent install fails for non-GLOBAL partition |
Before: Platform Agent installation on partition other than GLOBAL would fail. Id: RCORE-43903 |
||
Normal | Defect | Platform Agent | 9.2.10.0 | Secure gateway flush out incoming buffer on invalid RFC6455 opcode |
Before: Secure Gateway could refuse to start after switching from one candidate to another, if the switch was not graceful, such as caused by an unexpected Windows upgrade. After: Secure Gateway starts as expected after switching from one candidate to another, even if the switch was not graceful, such as caused by an unexpected Windows upgrade. Id: RCORE-44126 |
||
Normal | Defect | Platform Agent | 9.2.10.1 | Upgrade to OpenSSL 1.1.1t |
Before Platform Agent uses OpenSSL 1.1.1q After Platform Agent uses OpenSSL 1.1.1t which includes the following CVE fixes:
Id: RCORE-44870 |
||
Normal | Defect | Platform Agent | 9.2.10.1 | jtool scp needs to handle SSH2 keyboard-interactive user authentication type |
Before: After: Id: RCORE-45137 |
||
Normal | Defect | SAP | 9.2.10.0 | Large BOBJ Files Are Making The Application To Restart |
Before: Retrieving large output files from SAP BObj was using a lot of memory. Id: RCORE-43489 |
||
Normal | Defect | SAP | 9.2.10.1 | Excel conversion may fail for jobs running in parallel |
Before: SAP jobs running in parallel may fail if they are converting spool to XLSX After: SAP jobs running in parallel don’t fail when converting spool to XLSX Id: RSC-604 |
||
Normal | Defect | SAP | 9.2.10.1 | One of two BW processes run in parallel results in Waiting/Console state when there is error on SAP side |
Before: Skipped process chains cannot be monitored properly After: Skipped process chains can be monitored properly Id: RSC-577 |
||
Normal | Defect | SAP | 9.2.10.1 | Provide S/4 HANA information in SAP System Information |
SAP_Info definition has been extended to indicated if the SAP system is S/4 HANA Id: RCORE-44360 |
||
Normal | Defect | SAP | 9.2.10.1 | SAP PS shouldn't be blocked with invalid Registry Entry value |
Before: Start up of the SAP process server could fail due to invalid registry values After: Start up of the SAP process server will be succeed with invalid registry values Id: RSC-609 |
||
Normal | Defect | Suspended | 9.2.10.0 | Upgrade to OpenJDK-17.0.5-hotspot. |
Before: redwood-platform based on openjdk:17.0.3-hotspot which has high severity CVE. After: upgraded java version for redwood-platform to openjdk:17.0.5-hotspot. Id: RCORE-44288 |
||
Normal | Defect | Third-Party Component | 9.2.10.0 | Upgrade Tomcat to 9.0.68+ (as of 9.2.6) |
This includes the fixes for the following security issues released in 9.0.68, and announced later:
Id: ENV-2116 |
||
Normal | Defect | User Interface | 9.2.10.0 | Fixed potential XSS attack via malicious documents |
Before: Specially crafted documents could be uploaded in such a way that it was possible to perform an XSS attack. After: This has been resolved so that is no longer possible. Id: RCORE-44109 |
||
Normal | Defect | User Interface | 9.2.10.0 | In the document editor, content tab, don't render the text input for non-binary uploads that are larger than 500k |
Before: In the document editor, content tab, non-binary uploads larger than 500k are shown but are in practise unworkable. After: In the document editor, content tab, we now don't render a text input for non-binary uploads that are larger than 500k Id: RCORE-44747 |
||
Normal | Defect | User Interface | 9.2.10.0 | Prevent extremely large queries from being generated |
Intellisearch could generate queries with a very large amount of bind queries in the where clause. This could result in a very slow query and cause severe product slowness in addition. This has been fixed. Id: RCORE-42789 |
||
Normal | Defect | User Interface | 9.2.10.0 | Slow query in monitoring dashboard |
Before: one of the queries used in the dashboard took ~10s to run After: sped up the query by ~3x, further optimizations will be performed in scope of other tickets Id: RCORE-43894 |
||
Normal | Defect | User Interface | 9.2.10.1 | Regression: Empty page - when editing security / selecting "more" in LOV |
Before: Opening the ‘more’ dialog from an autosuggest dropdown sometimes resulted in a blank page After: The ‘more’ dialog from an autosuggest dropdown works again Id: RCORE-44917 |
||
Normal | Feature | Core | 9.2.10.0 | Add support for array parameters to Reports to do proper 'in' list bindings |
Before: User couldn’t add array type parameter for report. Query with in (:paramName) wasn't parsed correctly. After: Reports support array type parameter. Queries with in statement are correctly parsed and processed. Id: RCORE-44124 |
||
Normal | Feature | Core | 9.2.10.0 | Remove CatalogAdmin from scheduler deliverable |
Before: The Catalog interface (catalog-admin.car) is available in the download section ('Download CAR Files'), because it was required to install it manually. After: The Catalog interface is not available in the download section anymore, because it is now automatically downloaded from the Catalog Server and automatically installed. Id: RCORE-44338 |
||
Normal | Feature | Core | 9.2.10.0 | Submit System_Upgrade after a license change. |
Before: the catalog admin needed to be installed manually. After: the catalog admin is installed automatically, depending on the license. When the license is changed and the catalog should be installed, the upgrade job is automatically started to install the catalog. Id: RCORE-44337 |
||
Normal | Feature | Core | 9.2.10.0 | System_Upgrade should install latest CatalogAdmin, downloaded from the Catalog Server |
Before: The Catalog Admin is delivered as a part of RunMyJobs. After: Catalog Admin is downloaded from Catalog Server and installed by System_Upgrade job. Id: RCORE-44336 |
||
Normal | Feature | Platform Agent | 9.2.10.0 | Allow Process Server Description and Application to be set through registration |
Before: There was no option in the platform-agent installers to specify an Application and/or a Description for the Process Server of the newly installed platform-agent After: Two new parameters are added to the platform-agent installers to specify an Application name and/or a Description for this agent in the Process Server. Both installer parameters are optional and will only be used for a 'blank' downloaded platform-agent-installer that will register and create a new Process Server. Id: RCORE-40583 |
||
Normal | Feature | Platform Agent | 9.2.10.0 | Managed Service Accounts support for Windows Platform Agent |
Before: The Windows Platform Agent had no support for running jobs with a RunAsUser field that is a Managed Service Account. Id: RCORE-43839 |
||
Normal | Feature | SAP | 9.2.10.0 | Add builtin component SAP_GetJobDetails |
A new definition SAP_GetJobDetails has been introduced to help troubleshooting issues with SAP jobs Id: RCORE-44146 |
||
Normal | Feature | SAP | 9.2.10.0 | Add new SAP job parameter ARCHIVE_ARCHIV_ID |
Before: The definition SAP_AbapRunPrintExt didn't provide a parameter for setting the target storage system for archive link. Also imported SAP jobs didn't have this parameter. After: A new parameter "Target Storage System " (technical name ARCHIVE_ARCHIV_ID) has been added to the SAP_AbapRunPrintExt definition and is also automatically generated when importing SAP jobs. Id: RCORE-42726 |
||
Normal | Feature | User Interface | 9.2.10.0 | Add a lite version of the JobChain runtime view |
Before: viewing very large chains in the runtime diagram could take a long time to load. After: another option has been added to open these in a lightweight diagram. This diagram loads much faster but only displays basic information and actions are not available. Clicking a box in this diagram opens a details page beneath the diagram where all details and actions are available. Id: RCORE-44066 |
||
Normal | Feature | User Interface | 9.2.10.0 | Make it easier for customers to request help |
A new button ‘Help me automate’ was added to the main page to lower the boundary to request help for automating new processes. Id: RCORE-44057 |
||
Normal | Improvement | Core | 9.2.10.0 | Allow REL to reference columns with spaces in their names |
Before: It was not possible with REL to address columns with spaces in their names in Data Transformer. =columns['column name'] =columns.getMember('column name') The same syntax is now also available for job parameters: =parameters['parameterName'] =parameters.getMember('parameterName') Tickets: 140472 Id: RCORE-41608 |
||
Normal | Improvement | Core | 9.2.10.0 | Allow maximum query time to be configured, default timeout to 180s |
Before: Product queries have no timeout on the database side, this can cause performance issues with outstanding queries blocking new ones from coming in. After: A query timeout parameter has been introduced that will cancel queries automatically after that time. Default value is 180s. Id: RCORE-43824 |
||
Normal | Improvement | Core | 9.2.10.0 | Exclude security clause when user has global view privilege |
Before: SQL query where clause contains lot of conditions including system global privileges verification After: SQL query where clause contains security conditions but without those related to the system global privileges that have been granted to the current user. Id: RCORE-43821 |
||
Normal | Improvement | Core | 9.2.10.1 | Don't update SubjectObjectPrivilegesGrants that are not exportable on import |
Before: Import SubjectObjectPrivilegesGrants override existing grants but doesn’t change flag 'exportable'. If grant doesn’t exist in file then is removed depenently on config. After: Import SubjectObjectPrivilegesGrants override existing grants included change flag 'exportable'. If grant doesn’t exist in file then it is removed when 'exportable' in existing grant. Id: RCORE-31015 |
||
Normal | Improvement | Core | 9.2.10.1 | Don't update SubjectObjectTypePrivilegesGrants and GlobalPrivilegeGrants that are not exportable on import |
Before: Import SubjectObjectTypePrivilegeGrants and GlobalPrivilegeGrants override existing grants but doesn’t change flag 'exportable'. If grant doesn’t exist in file then is removed depenently on config. After: Import SubjectObjectTypePrivilegeGrants and GlobalPrivilegeGrants override existing grants included change flag 'exportable'. If grant doesn’t exist in file then it is removed when 'exportable' in existing grant. Id: RCORE-44999 |
||
Normal | Improvement | General | 9.2.10.0 | Update jsoup from 1.14.2 to fix CVE-2022-36033 |
Before : MailReactor and Robotics libraries contained jsoup.jar version 1.14.2 which is vulnerable to CVE-2022-36033. After : jsoup has been updated to version 1.15.3 which resolves that vulnerability. Note: The product doesn't use jsoup in a way that would be vulnerable, however it has been upgraded out of caution. Id: ENV-2070 |
||
Normal | Improvement | Platform Agent | 9.2.10.0 | Enhance Platform Agent / Spool Host for SAP SNC support |
Before: When jrfc is using SNC to securely connect to the SAP instance, SAP environment variables SNC_LIB and SECUDIR must be set. When these environment variables were not set for the (spoolhost) platform agent, such connections would just fail. After: When one or both environment variables SNC_LIB or SECUDIR are not set when the (spoolhost) platform agent is started, the platform agent makes an effort to set these variables to a default location, if the default location directory exist. For a successful connection the required SAP files must be present in these default locations. These SAP files are not provided by Redwood. Tickets: 145901, 146530, 146633, 146941 Id: RCORE-42400 |
||
Normal | Improvement | Platform Agent | 9.2.10.0 | Platform Agent should gracefully handle invalid FileEventCredentials |
Before: If a user enters an invalid Windows FileEventCredentials Process Server field then the Platform Agent would fail to start. Removing or correcting that field, and restarting the Process Server would have no effect. The only remedy was to remove the FileEventCredentials field and then restart the customer’s Platform Agent. After: Platform Agent will reject an invalid Windows FileEventCredentials Process Server field, and report an Operator Message, but the Platform Agent will start successfully. Id: RCORE-44084 |
||
Normal | Improvement | SAP | 9.2.10.0 | Cannot set XBP error messages via SAP_MaintainXbpOptions |
Before: It was not possible to set SAP error message handling with SAP_MaintainXbpOptions Tickets: 140981 Id: RCORE-41570 |
||
Normal | Improvement | SAP | 9.2.10.0 | Cater for skipped BW processes |
Before: Cannot monitor skipped processes in process chains. Id: RCORE-43982 |
||
Normal | Improvement | SAP | 9.2.10.0 | Disable XMI logon/logoff for RFC call |
RFC scripting interface has been extended to better support function modules which don't require the SAP XBP interface. Id: RCORE-43842 |
||
Normal | Improvement | SAP | 9.2.10.0 | Extend XbpInterface with getSapLanguage() method |
Before: XBP interface was not able to retrieve SAP language directly Id: RCORE-43956 |
||
Normal | Improvement | SAP | 9.2.10.0 | Extend and clean up the output of SAP_Info |
Before: SAP_Info and SAP_GetInstalledComponents show unnecessary content. It didn’t show event control rules. After: Removed unnecessary content from output, added event control rules. Id: RCORE-43917 |
||
Normal | Improvement | SAP | 9.2.10.0 | Remove SAP Transports from Software Download |
Before: The SAP transport files for IDOC, ISU and XBP were available in Software Download Id: RCORE-43168 |
||
Normal | Improvement | SAP | 9.2.10.1 | Improve resilience of SAP_RunTemplateJob |
Before: Under rare conditions of intermittent connection problems with the SAP system, SAP_RunTemplateJob could have submitted multiple jobs in SAP. After: SAP_RunTemplateJob will not submit multiple jobs in SAP. Id: RSC-595 |
||
Normal | Improvement | SAP | 9.2.10.1 | SAP extends fuba RFC_READ_TABLE to retrieve more data |
Before: RFC scripting can not retrieve SAP table larger than 512 characters After: RFC scripting can retrieve SAP table larger than 512 characters if the SAP system supports it (SAP note 2246160) Id: RCORE-44023 |
||
Normal | Improvement | User Interface | 9.2.10.0 | Add support for constraints in forms |
Before: Constraints were not supported in standalone custom submit forms, i.e. if you had a String parameter with an LOV in a standalone custom submit form, a Text Field was rendered, without showing a dropdown with the possible values. After: LOVs are supported in standalone custom submit forms now. Id: RCORE-43430 |
||
Normal | Improvement | User Interface | 9.2.10.1 | Add filtered row count in RTX viewer |
Before: The RTX Viewer only displayed the total row count in the summary panel like: Rows <total> After: The RTX Viewer now also displays the filtered row count in the summary panel like: Rows <filtered>/<total> Id: RCORE-45200 |
||
Normal | Regression | Core | 9.2.10.0 | MST, HST, and EST timezones did not work as in 9.2.8 |
Before: several time zone (like “MST”) were no longer recognised by the system due to their deprecation. After: the time zones have been reinstated. Id: RCORE-44782 |
||
Normal | Regression | General | 9.2.10.1 | Loading chains in the editor with a large number of different children can fail |
Before: Trying to load a chain in the editor that had more than 100 distinct process definitions in it would fail. After: These chains can now be edited. Id: RCORE-45069 |
||
Normal | Regression | User Interface | 9.2.10.1 | Help me automate button broken in 9.2.10 due to CSP |
Before: The click button action does not work correctly Id: RCORE-45152 |
||
Major | Defect | Core | 9.2.10.0 | Add Content-Security-Policy headers that block all external scripts |
Before: A vulnerability to 3rd party script inject was possible through the loading of external resources. After: A default Content-Security-Policy header is now defined that limits the use of external resources for all web pages. Extension points can overwrite this policy, for their generated pages, by adding a csp tag to the extension point deployment descriptor. Id: RCORE-44108 |
||
Major | Defect | Core | 9.2.10.0 | MonitorEvent unique index has nullable columns which are not using -1 |
Before: several monitor events could be created linking to the same monitor node After: only one monitor event can be created linking to a given monitor node Note: in case of existing duplicates all but one (the oldest) monitor events will be deleted and an operator message will be created with XML representation of deleted entries. Id: RCORE-42235 |
||
Major | Defect | SAP | 9.2.10.0 | Use default client to lookup job when client is omitted in TEMPLATE_RUN |
Before: The definition SAP_RunTemplateJob submits the latest matching SAP job regardless of the client if client is omitted Id: RCORE-44075 |
||
Major | Feature | User Interface | 9.2.10.0 | Enabled testing of the new RMJ beta interface |
We invite users to test the new RunMyJobs beta interface. It is accessible via the product information menu ( “i” icon in the right top corner), under the section “Test new beta Interface”. This is a preview of in-development enhancements to the RunMyJobs user interface, intended for your early exploration and feedback. When complete, this interface will be released as the new default for RunMyJobs. Please share your feedback on the new interface by email to feedback@redwood.com. This interface is not fully functional and should never be used to automate business processes in production environments. Id: RCORE-44315 |
||
Major | Improvement | Extension Points | 9.2.10.0 | Provide alternative for invocationID for simple extension points |
Before: extend element in the deployment descriptor of an extension point had a singleSession attribute which could be true or false After: singleSession is deprecated, new attribute was introduced: sessionpersitence, with three possible values:
Tickets: 146390 Id: RCORE-42254 |
||
Major | Improvement | SAP | 9.2.10.0 | Make CTS+ deploy scripts use REST api instead of api-tool |
Before: using CTS+ to deploy car files against RunMyJobs was very cumbersome because of a Java dependency on the Solution Manager host that does not support the required TLS ciphers to connect to runmyjobs.cloud. After: the CTS+ deploy scripts have been adjusted to leverage the Redwood rest api to ingest the car file using either curl (on Unix type systems) and Invoke-WebRequest as native commands to deploy the car file. Note: the interface of the script has change in a not backwards compatible fashion. Instead of two values for host and port in the connection field, a single argument with the full target url is expected now. Id: RCORE-44295 |
||
Major | Improvement | SAP | 9.2.10.0 | Spoolhost ignores saprouter in RFC connect string |
Before: When a SAProuter was defined in the SAP connect string, the spool host would fail the retrieval of SAP spool files as the SAProuter part was removed before connecting. After: The connect string is left as is. Old behavior can be restored by using the registry key <code>/configuration/sap/xbp/output/IgnoreSapRouter = true</code>. Id: RCORE-44048 |
||
Critical | Defect | Core | 9.2.10.1 | Fix issue with loading of classes in 9.2.10.0 |
Before: There was a case present where a class loader which loaded a SQL driver from a library which was used in a JDBC service and a job could be closed and a NoClassDefFoundError error was thrown from the connection pool of the JDBC service. This could also affect extension points through a slightly different mechanism, but with the same net effect. After: The implementation now is not throwing away a class loader when its classes are still in use. Id: RCORE-45097 |
||
Critical | Defect | Suspended | 9.2.10.0 | LOGGER_MANAGER configuration in setenv.bat references non-existing class |
We have detected a memory leak in the logger manager that was used. That got fixed, but on Windows, an explicit reference to the old logger manager is still in place in the setenv.bat script. Customers that upgrade to this version on Windows, need to make sure they do not overwrite the existing setenv.bat script with the previous one! As that could prevent the system from starting up. Id: RCORE-44064 |