[jira] [Work logged] (WW-5272) java.lang.UnsupportedOperationException in the Time component

2022-12-29 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/WW-5272?focusedWorklogId=836093&page=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-836093
 ]

ASF GitHub Bot logged work on WW-5272:
--

Author: ASF GitHub Bot
Created on: 29/Dec/22 10:00
Start Date: 29/Dec/22 10:00
Worklog Time Spent: 10m 
  Work Description: sonarcloud[bot] commented on PR #649:
URL: https://github.com/apache/struts/pull/649#issuecomment-1367202782

   Kudos, SonarCloud Quality Gate passed!    [![Quality Gate 
passed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/passed-16px.png
 'Quality Gate 
passed')](https://sonarcloud.io/dashboard?id=apache_struts&pullRequest=649)
   
   
[![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png
 
'Bug')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=649&resolved=false&types=BUG)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=649&resolved=false&types=BUG)
 [0 
Bugs](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=649&resolved=false&types=BUG)
  
   
[![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png
 
'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=649&resolved=false&types=VULNERABILITY)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=649&resolved=false&types=VULNERABILITY)
 [0 
Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=649&resolved=false&types=VULNERABILITY)
  
   [![Security 
Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png
 'Security 
Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_struts&pullRequest=649&resolved=false&types=SECURITY_HOTSPOT)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/security_hotspots?id=apache_struts&pullRequest=649&resolved=false&types=SECURITY_HOTSPOT)
 [0 Security 
Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_struts&pullRequest=649&resolved=false&types=SECURITY_HOTSPOT)
  
   [![Code 
Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png
 'Code 
Smell')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=649&resolved=false&types=CODE_SMELL)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=649&resolved=false&types=CODE_SMELL)
 [0 Code 
Smells](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=649&resolved=false&types=CODE_SMELL)
   
   
[![100.0%](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/100-16px.png
 
'100.0%')](https://sonarcloud.io/component_measures?id=apache_struts&pullRequest=649&metric=new_coverage&view=list)
 [100.0% 
Coverage](https://sonarcloud.io/component_measures?id=apache_struts&pullRequest=649&metric=new_coverage&view=list)
  
   
[![0.0%](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/3-16px.png
 
'0.0%')](https://sonarcloud.io/component_measures?id=apache_struts&pullRequest=649&metric=new_duplicated_lines_density&view=list)
 [0.0% 
Duplication](https://sonarcloud.io/component_measures?id=apache_struts&pullRequest=649&metric=new_duplicated_lines_density&view=list)
   
   




Issue Time Tracking
---

Worklog Id: (was: 836093)
Time Spent: 0.5h  (was: 20m)

> java.lang.UnsupportedOperationException in the Time component
> -
>
> Key: WW-5272
> URL: https://issues.apache.org/jira/browse/WW-5272
> Project: Struts 2
>  Issue Type: Bug
>Affects Versions: 6.0.3
>Reporter: Massimiliano Del Matto
>Priority: Major
> Fix For: 6.2.0
>
>  Time Spent: 0.5h
>  Remaining Estimate: 0h
>
> We are facing a java.lang.UnsupportedOperationException on some java.sql.Time 
> fields in our frontend after migrating from 2.5.26 to 6.0.3.
> Error 12/22/2022 09:52:20:122 Caused by: 
> java.lang.UnsupportedOperationException
> Error 12/22/2022 09:52:20:122 at java.sql.Time.toInstant(Time.java:291)
> Error 12/22/2022 09:52:20:122 at 
> org.apache.struts2.components.Date.end(Date.java:299)
> Error 12/22/2022 09:52:20:122 at 
> org.apache.struts2.views.jsp.ComponentTagSupport.doEndTag(Comp

[GitHub] [struts] sonarcloud[bot] commented on pull request #649: [WW-5272] Extends to support java.sql.Time

2022-12-29 Thread GitBox


sonarcloud[bot] commented on PR #649:
URL: https://github.com/apache/struts/pull/649#issuecomment-1367202782

   Kudos, SonarCloud Quality Gate passed!    [![Quality Gate 
passed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/passed-16px.png
 'Quality Gate 
passed')](https://sonarcloud.io/dashboard?id=apache_struts&pullRequest=649)
   
   
[![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png
 
'Bug')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=649&resolved=false&types=BUG)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=649&resolved=false&types=BUG)
 [0 
Bugs](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=649&resolved=false&types=BUG)
  
   
[![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png
 
'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=649&resolved=false&types=VULNERABILITY)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=649&resolved=false&types=VULNERABILITY)
 [0 
Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=649&resolved=false&types=VULNERABILITY)
  
   [![Security 
Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png
 'Security 
Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_struts&pullRequest=649&resolved=false&types=SECURITY_HOTSPOT)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/security_hotspots?id=apache_struts&pullRequest=649&resolved=false&types=SECURITY_HOTSPOT)
 [0 Security 
Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_struts&pullRequest=649&resolved=false&types=SECURITY_HOTSPOT)
  
   [![Code 
Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png
 'Code 
Smell')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=649&resolved=false&types=CODE_SMELL)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=649&resolved=false&types=CODE_SMELL)
 [0 Code 
Smells](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=649&resolved=false&types=CODE_SMELL)
   
   
[![100.0%](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/100-16px.png
 
'100.0%')](https://sonarcloud.io/component_measures?id=apache_struts&pullRequest=649&metric=new_coverage&view=list)
 [100.0% 
Coverage](https://sonarcloud.io/component_measures?id=apache_struts&pullRequest=649&metric=new_coverage&view=list)
  
   
[![0.0%](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/3-16px.png
 
'0.0%')](https://sonarcloud.io/component_measures?id=apache_struts&pullRequest=649&metric=new_duplicated_lines_density&view=list)
 [0.0% 
Duplication](https://sonarcloud.io/component_measures?id=apache_struts&pullRequest=649&metric=new_duplicated_lines_density&view=list)
   
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: issues-unsubscr...@struts.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



[jira] [Work logged] (WW-5273) Support fileupload using native Servlet API 3.1 logic

2022-12-29 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/WW-5273?focusedWorklogId=836092&page=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-836092
 ]

ASF GitHub Bot logged work on WW-5273:
--

Author: ASF GitHub Bot
Created on: 29/Dec/22 10:00
Start Date: 29/Dec/22 10:00
Worklog Time Spent: 10m 
  Work Description: sonarcloud[bot] commented on PR #650:
URL: https://github.com/apache/struts/pull/650#issuecomment-1367202233

   SonarCloud Quality Gate failed.    [![Quality Gate 
failed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/failed-16px.png
 'Quality Gate 
failed')](https://sonarcloud.io/dashboard?id=apache_struts&pullRequest=650)
   
   
[![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png
 
'Bug')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=650&resolved=false&types=BUG)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=650&resolved=false&types=BUG)
 [0 
Bugs](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=650&resolved=false&types=BUG)
  
   
[![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png
 
'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=650&resolved=false&types=VULNERABILITY)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=650&resolved=false&types=VULNERABILITY)
 [0 
Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=650&resolved=false&types=VULNERABILITY)
  
   [![Security 
Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png
 'Security 
Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_struts&pullRequest=650&resolved=false&types=SECURITY_HOTSPOT)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/security_hotspots?id=apache_struts&pullRequest=650&resolved=false&types=SECURITY_HOTSPOT)
 [0 Security 
Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_struts&pullRequest=650&resolved=false&types=SECURITY_HOTSPOT)
  
   [![Code 
Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png
 'Code 
Smell')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=650&resolved=false&types=CODE_SMELL)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=650&resolved=false&types=CODE_SMELL)
 [4 Code 
Smells](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=650&resolved=false&types=CODE_SMELL)
   
   
[![50.2%](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/50-16px.png
 
'50.2%')](https://sonarcloud.io/component_measures?id=apache_struts&pullRequest=650&metric=new_coverage&view=list)
 [50.2% 
Coverage](https://sonarcloud.io/component_measures?id=apache_struts&pullRequest=650&metric=new_coverage&view=list)
  
   
[![0.0%](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/3-16px.png
 
'0.0%')](https://sonarcloud.io/component_measures?id=apache_struts&pullRequest=650&metric=new_duplicated_lines_density&view=list)
 [0.0% 
Duplication](https://sonarcloud.io/component_measures?id=apache_struts&pullRequest=650&metric=new_duplicated_lines_density&view=list)
   
   




Issue Time Tracking
---

Worklog Id: (was: 836092)
Time Spent: 40m  (was: 0.5h)

> Support fileupload using native Servlet API 3.1 logic
> -
>
> Key: WW-5273
> URL: https://issues.apache.org/jira/browse/WW-5273
> Project: Struts 2
>  Issue Type: Improvement
>  Components: Core
>Reporter: Lukasz Lenart
>Priority: Major
> Fix For: 6.2.0
>
>  Time Spent: 40m
>  Remaining Estimate: 0h
>
> Since Servlet API 3.1 there is no need in using Commons Fileupload as the 
> servlets support it.
> https://stackoverflow.com/questions/68820707/jetty-11-and-commons-fileupload



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[GitHub] [struts] sonarcloud[bot] commented on pull request #650: [WW-5273] Supports file upload using Servlet API 3.1

2022-12-29 Thread GitBox


sonarcloud[bot] commented on PR #650:
URL: https://github.com/apache/struts/pull/650#issuecomment-1367202233

   SonarCloud Quality Gate failed.    [![Quality Gate 
failed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/failed-16px.png
 'Quality Gate 
failed')](https://sonarcloud.io/dashboard?id=apache_struts&pullRequest=650)
   
   
[![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png
 
'Bug')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=650&resolved=false&types=BUG)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=650&resolved=false&types=BUG)
 [0 
Bugs](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=650&resolved=false&types=BUG)
  
   
[![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png
 
'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=650&resolved=false&types=VULNERABILITY)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=650&resolved=false&types=VULNERABILITY)
 [0 
Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=650&resolved=false&types=VULNERABILITY)
  
   [![Security 
Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png
 'Security 
Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_struts&pullRequest=650&resolved=false&types=SECURITY_HOTSPOT)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/security_hotspots?id=apache_struts&pullRequest=650&resolved=false&types=SECURITY_HOTSPOT)
 [0 Security 
Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_struts&pullRequest=650&resolved=false&types=SECURITY_HOTSPOT)
  
   [![Code 
Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png
 'Code 
Smell')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=650&resolved=false&types=CODE_SMELL)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=650&resolved=false&types=CODE_SMELL)
 [4 Code 
Smells](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=650&resolved=false&types=CODE_SMELL)
   
   
[![50.2%](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/50-16px.png
 
'50.2%')](https://sonarcloud.io/component_measures?id=apache_struts&pullRequest=650&metric=new_coverage&view=list)
 [50.2% 
Coverage](https://sonarcloud.io/component_measures?id=apache_struts&pullRequest=650&metric=new_coverage&view=list)
  
   
[![0.0%](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/3-16px.png
 
'0.0%')](https://sonarcloud.io/component_measures?id=apache_struts&pullRequest=650&metric=new_duplicated_lines_density&view=list)
 [0.0% 
Duplication](https://sonarcloud.io/component_measures?id=apache_struts&pullRequest=650&metric=new_duplicated_lines_density&view=list)
   
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: issues-unsubscr...@struts.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



[jira] [Commented] (WW-5272) java.lang.UnsupportedOperationException in the Time component

2022-12-29 Thread ASF subversion and git services (Jira)


[ 
https://issues.apache.org/jira/browse/WW-5272?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17652791#comment-17652791
 ] 

ASF subversion and git services commented on WW-5272:
-

Commit 08de24588ad5b88ec3554b476c9d3cf0fb47b32c in struts's branch 
refs/heads/WW-5272-time from Lukasz Lenart
[ https://gitbox.apache.org/repos/asf?p=struts.git;h=08de24588 ]

WW-5272 Extends  to support java.sql.Time


> java.lang.UnsupportedOperationException in the Time component
> -
>
> Key: WW-5272
> URL: https://issues.apache.org/jira/browse/WW-5272
> Project: Struts 2
>  Issue Type: Bug
>Affects Versions: 6.0.3
>Reporter: Massimiliano Del Matto
>Priority: Major
> Fix For: 6.2.0
>
>  Time Spent: 20m
>  Remaining Estimate: 0h
>
> We are facing a java.lang.UnsupportedOperationException on some java.sql.Time 
> fields in our frontend after migrating from 2.5.26 to 6.0.3.
> Error 12/22/2022 09:52:20:122 Caused by: 
> java.lang.UnsupportedOperationException
> Error 12/22/2022 09:52:20:122 at java.sql.Time.toInstant(Time.java:291)
> Error 12/22/2022 09:52:20:122 at 
> org.apache.struts2.components.Date.end(Date.java:299)
> Error 12/22/2022 09:52:20:122 at 
> org.apache.struts2.views.jsp.ComponentTagSupport.doEndTag(ComponentTagSupport.java:40)
> Error 12/22/2022 09:52:20:122 at 
> JEE_jsp_pages_ReadTicketGoing_1671640129851._jspx_method_s_date_2(JEE_jsp_pages_ReadTicketGoing_1671640129851.java:408)
> Error 12/22/2022 09:52:20:122 at 
> JEE_jsp_pages_ReadTicketGoing_1671640129851._jspx_method_s_form_0(JEE_jsp_pages_ReadTicketGoing_1671640129851.java:1950)
> Error 12/22/2022 09:52:20:122 at 
> JEE_jsp_pages_ReadTicketGoing_1671640129851._jspService(JEE_jsp_pages_ReadTicketGoing_1671640129851.java:60)
> ...
>  
> At line 299 in Date.java there is no code related to java.sql.Time
> [https://github.com/apache/struts/blob/STRUTS_6_0_3/core/src/main/java/org/apache/struts2/components/Date.java#L299]
>  
> java.sql.Time extends java.util.Date so when dateObject is java.sql.Time is 
> treated like an instanceof java.util.Date and toInstant() throws the 
> UnsupportedOperationException.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Commented] (WW-5273) Support fileupload using native Servlet API 3.1 logic

2022-12-29 Thread ASF subversion and git services (Jira)


[ 
https://issues.apache.org/jira/browse/WW-5273?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17652789#comment-17652789
 ] 

ASF subversion and git services commented on WW-5273:
-

Commit 99e3992ed27bdbb82a902537ae9df07e7d65a9c1 in struts's branch 
refs/heads/WW-5273-servlet-upload from Lukasz Lenart
[ https://gitbox.apache.org/repos/asf?p=struts.git;h=99e3992ed ]

WW-5273 Supports file upload using Servlet API 3.1


> Support fileupload using native Servlet API 3.1 logic
> -
>
> Key: WW-5273
> URL: https://issues.apache.org/jira/browse/WW-5273
> Project: Struts 2
>  Issue Type: Improvement
>  Components: Core
>Reporter: Lukasz Lenart
>Priority: Major
> Fix For: 6.2.0
>
>  Time Spent: 0.5h
>  Remaining Estimate: 0h
>
> Since Servlet API 3.1 there is no need in using Commons Fileupload as the 
> servlets support it.
> https://stackoverflow.com/questions/68820707/jetty-11-and-commons-fileupload



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Resolved] (WW-5266) Add configuration option for a per-file max size for multipart requests

2022-12-29 Thread Lukasz Lenart (Jira)


 [ 
https://issues.apache.org/jira/browse/WW-5266?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Lukasz Lenart resolved WW-5266.
---
Resolution: Won't Fix

> Add configuration option for a per-file max size for multipart requests
> ---
>
> Key: WW-5266
> URL: https://issues.apache.org/jira/browse/WW-5266
> Project: Struts 2
>  Issue Type: Improvement
>  Components: Core
>Reporter: Kusal Kithul-Godage
>Priority: Minor
> Fix For: 6.2.0
>
>
> In addition to the existing `struts.multipart.maxSize`, allow the 
> configuration of a per-file max size using `struts.multipart.maxFileSize`



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Comment Edited] (WW-5266) Add configuration option for a per-file max size for multipart requests

2022-12-29 Thread Lukasz Lenart (Jira)


[ 
https://issues.apache.org/jira/browse/WW-5266?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17652786#comment-17652786
 ] 

Lukasz Lenart edited comment on WW-5266 at 12/29/22 9:46 AM:
-

There is already {{maximumSize}} parameter in the file upload interceptor for 
such needs

https://struts.apache.org/core-developers/file-upload.html#file-size-limits


was (Author: lukaszlenart):
There is already {{

> Add configuration option for a per-file max size for multipart requests
> ---
>
> Key: WW-5266
> URL: https://issues.apache.org/jira/browse/WW-5266
> Project: Struts 2
>  Issue Type: Improvement
>  Components: Core
>Reporter: Kusal Kithul-Godage
>Priority: Minor
> Fix For: 6.2.0
>
>
> In addition to the existing `struts.multipart.maxSize`, allow the 
> configuration of a per-file max size using `struts.multipart.maxFileSize`



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Reopened] (WW-5266) Add configuration option for a per-file max size for multipart requests

2022-12-29 Thread Lukasz Lenart (Jira)


 [ 
https://issues.apache.org/jira/browse/WW-5266?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Lukasz Lenart reopened WW-5266:
---

> Add configuration option for a per-file max size for multipart requests
> ---
>
> Key: WW-5266
> URL: https://issues.apache.org/jira/browse/WW-5266
> Project: Struts 2
>  Issue Type: Improvement
>  Components: Core
>Reporter: Kusal Kithul-Godage
>Priority: Minor
> Fix For: 6.2.0
>
>
> In addition to the existing `struts.multipart.maxSize`, allow the 
> configuration of a per-file max size using `struts.multipart.maxFileSize`



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (WW-5273) Support fileupload using native Servlet API 3.1 logic

2022-12-29 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/WW-5273?focusedWorklogId=836090&page=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-836090
 ]

ASF GitHub Bot logged work on WW-5273:
--

Author: ASF GitHub Bot
Created on: 29/Dec/22 09:45
Start Date: 29/Dec/22 09:45
Worklog Time Spent: 10m 
  Work Description: sonarcloud[bot] commented on PR #650:
URL: https://github.com/apache/struts/pull/650#issuecomment-1367194607

   SonarCloud Quality Gate failed.    [![Quality Gate 
failed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/failed-16px.png
 'Quality Gate 
failed')](https://sonarcloud.io/dashboard?id=apache_struts&pullRequest=650)
   
   
[![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png
 
'Bug')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=650&resolved=false&types=BUG)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=650&resolved=false&types=BUG)
 [0 
Bugs](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=650&resolved=false&types=BUG)
  
   
[![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png
 
'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=650&resolved=false&types=VULNERABILITY)
 
[![B](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/B-16px.png
 
'B')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=650&resolved=false&types=VULNERABILITY)
 [2 
Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=650&resolved=false&types=VULNERABILITY)
  
   [![Security 
Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png
 'Security 
Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_struts&pullRequest=650&resolved=false&types=SECURITY_HOTSPOT)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/security_hotspots?id=apache_struts&pullRequest=650&resolved=false&types=SECURITY_HOTSPOT)
 [0 Security 
Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_struts&pullRequest=650&resolved=false&types=SECURITY_HOTSPOT)
  
   [![Code 
Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png
 'Code 
Smell')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=650&resolved=false&types=CODE_SMELL)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=650&resolved=false&types=CODE_SMELL)
 [13 Code 
Smells](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=650&resolved=false&types=CODE_SMELL)
   
   
[![50.2%](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/50-16px.png
 
'50.2%')](https://sonarcloud.io/component_measures?id=apache_struts&pullRequest=650&metric=new_coverage&view=list)
 [50.2% 
Coverage](https://sonarcloud.io/component_measures?id=apache_struts&pullRequest=650&metric=new_coverage&view=list)
  
   
[![0.0%](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/3-16px.png
 
'0.0%')](https://sonarcloud.io/component_measures?id=apache_struts&pullRequest=650&metric=new_duplicated_lines_density&view=list)
 [0.0% 
Duplication](https://sonarcloud.io/component_measures?id=apache_struts&pullRequest=650&metric=new_duplicated_lines_density&view=list)
   
   




Issue Time Tracking
---

Worklog Id: (was: 836090)
Time Spent: 20m  (was: 10m)

> Support fileupload using native Servlet API 3.1 logic
> -
>
> Key: WW-5273
> URL: https://issues.apache.org/jira/browse/WW-5273
> Project: Struts 2
>  Issue Type: Improvement
>  Components: Core
>Reporter: Lukasz Lenart
>Priority: Major
> Fix For: 6.2.0
>
>  Time Spent: 20m
>  Remaining Estimate: 0h
>
> Since Servlet API 3.1 there is no need in using Commons Fileupload as the 
> servlets support it.
> https://stackoverflow.com/questions/68820707/jetty-11-and-commons-fileupload



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Closed] (WW-5266) Add configuration option for a per-file max size for multipart requests

2022-12-29 Thread Lukasz Lenart (Jira)


 [ 
https://issues.apache.org/jira/browse/WW-5266?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Lukasz Lenart closed WW-5266.
-
Resolution: Won't Fix

There is already {{

> Add configuration option for a per-file max size for multipart requests
> ---
>
> Key: WW-5266
> URL: https://issues.apache.org/jira/browse/WW-5266
> Project: Struts 2
>  Issue Type: Improvement
>  Components: Core
>Reporter: Kusal Kithul-Godage
>Priority: Minor
> Fix For: 6.2.0
>
>
> In addition to the existing `struts.multipart.maxSize`, allow the 
> configuration of a per-file max size using `struts.multipart.maxFileSize`



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (WW-5273) Support fileupload using native Servlet API 3.1 logic

2022-12-29 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/WW-5273?focusedWorklogId=836091&page=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-836091
 ]

ASF GitHub Bot logged work on WW-5273:
--

Author: ASF GitHub Bot
Created on: 29/Dec/22 09:45
Start Date: 29/Dec/22 09:45
Worklog Time Spent: 10m 
  Work Description: github-code-scanning[bot] commented on code in PR #650:
URL: https://github.com/apache/struts/pull/650#discussion_r1058848403


##
core/src/main/java/org/apache/struts2/dispatcher/multipart/ServletMultiPartRequest.java:
##
@@ -0,0 +1,246 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements.  See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership.  The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License.  You may obtain a copy of the License at
+ *
+ *  http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied.  See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ */
+package org.apache.struts2.dispatcher.multipart;
+
+import org.apache.logging.log4j.LogManager;
+import org.apache.logging.log4j.Logger;
+import org.apache.struts2.dispatcher.LocalizedMessage;
+
+import javax.servlet.ServletException;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.Part;
+import java.io.File;
+import java.io.IOException;
+import java.io.Serializable;
+import java.util.ArrayList;
+import java.util.Collection;
+import java.util.Collections;
+import java.util.Enumeration;
+import java.util.HashMap;
+import java.util.List;
+import java.util.Map;
+import java.util.UUID;
+
+/**
+ * Pure Servlet API 3.1 based implementation
+ */
+public class ServletMultiPartRequest extends AbstractMultiPartRequest {
+
+private static final Logger LOG = 
LogManager.getLogger(ServletMultiPartRequest.class);
+
+private Map> uploadedFiles = new HashMap<>();
+private Map> parameters = new HashMap<>();
+
+@Override
+public void parse(HttpServletRequest request, String saveDir) throws 
IOException {
+try {
+if (isSizeLimitExceeded(request)) {
+applySizeLimitExceededError(request);
+return;
+}
+parseParts(request, saveDir);
+} catch (ServletException e) {
+LOG.warn("Error occurred during parsing of multi part request", e);
+LocalizedMessage errorMessage = buildErrorMessage(e, new 
Object[]{e.getMessage()});
+if (!errors.contains(errorMessage)) {
+errors.add(errorMessage);
+}
+}
+}
+
+private void parseParts(HttpServletRequest request, String saveDir) throws 
IOException, ServletException {
+Collection parts = request.getParts();
+if (parts.isEmpty()) {
+LocalizedMessage error = buildErrorMessage(new IOException(), new 
Object[]{"No boundary defined!"});
+if (!errors.contains(error)) {
+errors.add(error);
+}
+return;
+}
+for (Part part : parts) {
+if (part.getSubmittedFileName() == null) { // normal field
+LOG.debug("Ignoring a normal form field: {}", part.getName());
+} else { // file upload
+LOG.debug("Storing file: {} in save dir: {}", 
part.getSubmittedFileName(), saveDir);

Review Comment:
   ## Logging should not be vulnerable to injection attacks
   
   Change this code to not log 
user-controlled data. See more on https://sonarcloud.io/project/issues?id=apache_struts&issues=AYVdRXPwlHcyP0Z-M9IE&open=AYVdRXPwlHcyP0Z-M9IE&pullRequest=650";>SonarCloud
   
   [Show more 
details](https://github.com/apache/struts/security/code-scanning/205)



##
core/src/main/java/org/apache/struts2/dispatcher/multipart/ServletMultiPartRequest.java:
##
@@ -0,0 +1,246 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements.  See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership.  The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License.  You may obtain a copy of the License at
+ *
+ *  http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BAS

[GitHub] [struts] github-code-scanning[bot] commented on a diff in pull request #650: [WW-5273] Supports file upload using Servlet API 3.1

2022-12-29 Thread GitBox


github-code-scanning[bot] commented on code in PR #650:
URL: https://github.com/apache/struts/pull/650#discussion_r1058848403


##
core/src/main/java/org/apache/struts2/dispatcher/multipart/ServletMultiPartRequest.java:
##
@@ -0,0 +1,246 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements.  See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership.  The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License.  You may obtain a copy of the License at
+ *
+ *  http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied.  See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ */
+package org.apache.struts2.dispatcher.multipart;
+
+import org.apache.logging.log4j.LogManager;
+import org.apache.logging.log4j.Logger;
+import org.apache.struts2.dispatcher.LocalizedMessage;
+
+import javax.servlet.ServletException;
+import javax.servlet.http.HttpServletRequest;
+import javax.servlet.http.Part;
+import java.io.File;
+import java.io.IOException;
+import java.io.Serializable;
+import java.util.ArrayList;
+import java.util.Collection;
+import java.util.Collections;
+import java.util.Enumeration;
+import java.util.HashMap;
+import java.util.List;
+import java.util.Map;
+import java.util.UUID;
+
+/**
+ * Pure Servlet API 3.1 based implementation
+ */
+public class ServletMultiPartRequest extends AbstractMultiPartRequest {
+
+private static final Logger LOG = 
LogManager.getLogger(ServletMultiPartRequest.class);
+
+private Map> uploadedFiles = new HashMap<>();
+private Map> parameters = new HashMap<>();
+
+@Override
+public void parse(HttpServletRequest request, String saveDir) throws 
IOException {
+try {
+if (isSizeLimitExceeded(request)) {
+applySizeLimitExceededError(request);
+return;
+}
+parseParts(request, saveDir);
+} catch (ServletException e) {
+LOG.warn("Error occurred during parsing of multi part request", e);
+LocalizedMessage errorMessage = buildErrorMessage(e, new 
Object[]{e.getMessage()});
+if (!errors.contains(errorMessage)) {
+errors.add(errorMessage);
+}
+}
+}
+
+private void parseParts(HttpServletRequest request, String saveDir) throws 
IOException, ServletException {
+Collection parts = request.getParts();
+if (parts.isEmpty()) {
+LocalizedMessage error = buildErrorMessage(new IOException(), new 
Object[]{"No boundary defined!"});
+if (!errors.contains(error)) {
+errors.add(error);
+}
+return;
+}
+for (Part part : parts) {
+if (part.getSubmittedFileName() == null) { // normal field
+LOG.debug("Ignoring a normal form field: {}", part.getName());
+} else { // file upload
+LOG.debug("Storing file: {} in save dir: {}", 
part.getSubmittedFileName(), saveDir);

Review Comment:
   ## Logging should not be vulnerable to injection attacks
   
   Change this code to not log 
user-controlled data. See more on https://sonarcloud.io/project/issues?id=apache_struts&issues=AYVdRXPwlHcyP0Z-M9IE&open=AYVdRXPwlHcyP0Z-M9IE&pullRequest=650";>SonarCloud
   
   [Show more 
details](https://github.com/apache/struts/security/code-scanning/205)



##
core/src/main/java/org/apache/struts2/dispatcher/multipart/ServletMultiPartRequest.java:
##
@@ -0,0 +1,246 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements.  See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership.  The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License.  You may obtain a copy of the License at
+ *
+ *  http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied.  See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ */
+package org.apache.struts2.dispatcher.multipart;
+
+import org.apache.logging.log4j.LogManager;
+import org.apache.logging.log4j.Logger;
+import org.apache.struts2.dispatcher.LocalizedMessage;
+
+import javax.servlet.Servle

[jira] [Updated] (WW-2278) Move S2 Tags into a plugin

2022-12-29 Thread Lukasz Lenart (Jira)


 [ 
https://issues.apache.org/jira/browse/WW-2278?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Lukasz Lenart updated WW-2278:
--
Fix Version/s: 7.0.0
   (was: 6.2.0)

> Move S2 Tags into a plugin
> --
>
> Key: WW-2278
> URL: https://issues.apache.org/jira/browse/WW-2278
> Project: Struts 2
>  Issue Type: Task
>  Components: Plugin - Tags
>Affects Versions: 2.1.0
>Reporter: Ted Husted
>Priority: Major
> Fix For: 7.0.0
>
>
> See tread on list "Should tags be their own plugin?" beginning 5 Oct 2007. 



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[GitHub] [struts] sonarcloud[bot] commented on pull request #650: [WW-5273] Supports file upload using Servlet API 3.1

2022-12-29 Thread GitBox


sonarcloud[bot] commented on PR #650:
URL: https://github.com/apache/struts/pull/650#issuecomment-1367194607

   SonarCloud Quality Gate failed.    [![Quality Gate 
failed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/failed-16px.png
 'Quality Gate 
failed')](https://sonarcloud.io/dashboard?id=apache_struts&pullRequest=650)
   
   
[![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png
 
'Bug')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=650&resolved=false&types=BUG)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=650&resolved=false&types=BUG)
 [0 
Bugs](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=650&resolved=false&types=BUG)
  
   
[![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png
 
'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=650&resolved=false&types=VULNERABILITY)
 
[![B](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/B-16px.png
 
'B')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=650&resolved=false&types=VULNERABILITY)
 [2 
Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=650&resolved=false&types=VULNERABILITY)
  
   [![Security 
Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png
 'Security 
Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_struts&pullRequest=650&resolved=false&types=SECURITY_HOTSPOT)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/security_hotspots?id=apache_struts&pullRequest=650&resolved=false&types=SECURITY_HOTSPOT)
 [0 Security 
Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_struts&pullRequest=650&resolved=false&types=SECURITY_HOTSPOT)
  
   [![Code 
Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png
 'Code 
Smell')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=650&resolved=false&types=CODE_SMELL)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=650&resolved=false&types=CODE_SMELL)
 [13 Code 
Smells](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=650&resolved=false&types=CODE_SMELL)
   
   
[![50.2%](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/50-16px.png
 
'50.2%')](https://sonarcloud.io/component_measures?id=apache_struts&pullRequest=650&metric=new_coverage&view=list)
 [50.2% 
Coverage](https://sonarcloud.io/component_measures?id=apache_struts&pullRequest=650&metric=new_coverage&view=list)
  
   
[![0.0%](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/3-16px.png
 
'0.0%')](https://sonarcloud.io/component_measures?id=apache_struts&pullRequest=650&metric=new_duplicated_lines_density&view=list)
 [0.0% 
Duplication](https://sonarcloud.io/component_measures?id=apache_struts&pullRequest=650&metric=new_duplicated_lines_density&view=list)
   
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: issues-unsubscr...@struts.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



[jira] [Updated] (WW-4393) Move FreeMarker support into dedicated plugin

2022-12-29 Thread Lukasz Lenart (Jira)


 [ 
https://issues.apache.org/jira/browse/WW-4393?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Lukasz Lenart updated WW-4393:
--
Fix Version/s: 7.0.0
   (was: 6.2.0)

> Move FreeMarker support into dedicated plugin
> -
>
> Key: WW-4393
> URL: https://issues.apache.org/jira/browse/WW-4393
> Project: Struts 2
>  Issue Type: Improvement
>Reporter: Lukasz Lenart
>Priority: Major
> Fix For: 7.0.0
>
>
> The same as WW-4243



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (WW-5273) Support fileupload using native Servlet API 3.1 logic

2022-12-29 Thread Lukasz Lenart (Jira)


 [ 
https://issues.apache.org/jira/browse/WW-5273?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Lukasz Lenart updated WW-5273:
--
Summary: Support fileupload using native Servlet API 3.1 logic  (was: 
Migrate Commons Fileupload to native Servlet-based multipart file upload)

> Support fileupload using native Servlet API 3.1 logic
> -
>
> Key: WW-5273
> URL: https://issues.apache.org/jira/browse/WW-5273
> Project: Struts 2
>  Issue Type: Improvement
>  Components: Core
>Reporter: Lukasz Lenart
>Priority: Major
> Fix For: 6.2.0
>
>  Time Spent: 10m
>  Remaining Estimate: 0h
>
> Since Servlet API 3.1 there is no need in using Commons Fileupload as the 
> servlets support it.
> https://stackoverflow.com/questions/68820707/jetty-11-and-commons-fileupload



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (WW-5233) Include Apache Tiles code base in the Tiles plugin

2022-12-29 Thread Lukasz Lenart (Jira)


 [ 
https://issues.apache.org/jira/browse/WW-5233?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Lukasz Lenart updated WW-5233:
--
Fix Version/s: 7.0.0
   (was: 6.2.0)

> Include Apache Tiles code base in the Tiles plugin
> --
>
> Key: WW-5233
> URL: https://issues.apache.org/jira/browse/WW-5233
> Project: Struts 2
>  Issue Type: Improvement
>  Components: Plugin - Tiles
>Reporter: Lukasz Lenart
>Priority: Major
> Fix For: 7.0.0
>
>  Time Spent: 3h
>  Remaining Estimate: 0h
>
> Apache Tiles has retired and it isn't maintained anymore. There are some 
> outstanding security issues that can be addressed right now. It will be 
> easier to maintain the code base as a part of the Tiles plugin instead of 
> taking the project back from attick.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (WW-5273) Migrate Commons Fileupload to native Servlet-based multipart file upload

2022-12-29 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/WW-5273?focusedWorklogId=836089&page=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-836089
 ]

ASF GitHub Bot logged work on WW-5273:
--

Author: ASF GitHub Bot
Created on: 29/Dec/22 09:37
Start Date: 29/Dec/22 09:37
Worklog Time Spent: 10m 
  Work Description: lukaszlenart opened a new pull request, #650:
URL: https://github.com/apache/struts/pull/650

   Also documents update is needed
   Closes [WW-5273](https://issues.apache.org/jira/browse/WW-5273)




Issue Time Tracking
---

Worklog Id: (was: 836089)
Remaining Estimate: 0h
Time Spent: 10m

> Migrate Commons Fileupload to native Servlet-based multipart file upload
> 
>
> Key: WW-5273
> URL: https://issues.apache.org/jira/browse/WW-5273
> Project: Struts 2
>  Issue Type: Improvement
>  Components: Core
>Reporter: Lukasz Lenart
>Priority: Major
> Fix For: 6.2.0
>
>  Time Spent: 10m
>  Remaining Estimate: 0h
>
> Since Servlet API 3.1 there is no need in using Commons Fileupload as the 
> servlets support it.
> https://stackoverflow.com/questions/68820707/jetty-11-and-commons-fileupload



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Commented] (WW-5273) Migrate Commons Fileupload to native Servlet-based multipart file upload

2022-12-29 Thread ASF subversion and git services (Jira)


[ 
https://issues.apache.org/jira/browse/WW-5273?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17652784#comment-17652784
 ] 

ASF subversion and git services commented on WW-5273:
-

Commit f92e3b945dd69d18034c6aa09ad6dcbec128f1fc in struts's branch 
refs/heads/WW-5273-servlet-upload from Lukasz Lenart
[ https://gitbox.apache.org/repos/asf?p=struts.git;h=f92e3b945 ]

WW-5273 Supports file upload using Servlet API 3.1


> Migrate Commons Fileupload to native Servlet-based multipart file upload
> 
>
> Key: WW-5273
> URL: https://issues.apache.org/jira/browse/WW-5273
> Project: Struts 2
>  Issue Type: Improvement
>  Components: Core
>Reporter: Lukasz Lenart
>Priority: Major
> Fix For: 6.2.0
>
>
> Since Servlet API 3.1 there is no need in using Commons Fileupload as the 
> servlets support it.
> https://stackoverflow.com/questions/68820707/jetty-11-and-commons-fileupload



--
This message was sent by Atlassian Jira
(v8.20.10#820010)