Upgrading WebLogic Application Environments

     Previous  Next    Open TOC in new window    View as PDF - New Window  Get Adobe Reader - New Window
Content starts here

WebLogic Server 10.0 Compatibility with Previous Releases

This section describes important compatibility information that you should consider before upgrading to WebLogic Server 10.0.

Also see, Compatibility Statement for BEA WebLogic Server 10.0.

Compatibility considerations are provided in the following categories:

 


JMX 1.2 Implementation

As of WebLogic Server 9.0, WebLogic Server uses the Java Management Extensions (JMX) 1.2 implementation that is included in JDK 5.0. Prior to 9.0, WebLogic Server used its own JMX implementation based on the JMX 1.0 specification.

The JMX 1.2 reference implementation introduces serialization incompatibilities. Despite these incompatibilities in the reference implementation, JMX clients created for WebLogic Server 8.1 can be used with 9.2 and 10.0 as follows:

BEA recommends that you update your JMX clients to be compliant with WebLogic Server 10.0. Prior to 9.0, WebLogic Server supported a typed API layer over its JMX layer. It was possible for your JMX application classes to import type-safe interfaces for WebLogic Server MBeans, retrieve a reference to the MBeans through the weblogic.management.MBeanHome interface, and invoke the MBean methods directly.

As of 9.0, the MBeanHome interface is deprecated. Instead of using this API-like programming model, all JMX applications should use the standard JMX programming model, in which clients use the javax.management.MBeanServerConnection interface to discover MBeans, attributes, and attribute types at runtime. In this JMX model, clients interact indirectly with MBeans through the MBeanServerConnection interface.

If any of your classes import the type-safe interfaces (available under weblogic.management), BEA recommends that you update them to use the standard JMX programming model. For more information, see "Understanding WebLogic Server MBeans" in Developing Custom Management Utilities with JMX at http://download.oracle.com/docs/cd/E13222_01/wls/docs100/jmx/understandWLS.html.

 


Dynamic Configuration Management

Configuration attributes are classified as dynamic or non-dynamic.

WebLogic Server 9.0 introduced a change management process to provide a secure, predictable means for applying configuration changes in a domain. A batch change mechanism changes the way dynamic changes are applied when they are mixed with non-dynamic changes. Specifically, when a configured server or system resource is affected by a change to a non-dynamic attribute, no other changes (even dynamic changes) will take effect, in current or future batches, until after the server or system resource is restarted. In this case, BEA recommends that you restart the entity as soon as possible after the batch change is completed to ensure the system is in a consistent state and to allow future changes to be accepted.

You should test your configuration scripts to determine whether a non-dynamic change has been applied, and if so, restart the server. To determine whether a change is non-dynamic and requires a server restart:

To determine which security attributes are dynamic or non-dynamic, see "Security Configuration MBeans" in Securing WebLogic Server at http://download.oracle.com/docs/cd/E13222_01/wls/docs100/secmanage/mbeans.html.

For more information, see "Managing Configuration Changes" in Understanding Domain Configuration at http://download.oracle.com/docs/cd/E13222_01/wls/docs100/domain_config/changes.html.

 


Modular Configuration and Deployment of JDBC Resources

As of WebLogic Server 9.0, the number of JDBC resource types was reduced to simplify JDBC configuration and to reduce the likelihood of configuration errors. Now, instead of configuring a JDBC connection pool and then configuring a data source or tx data source to point to the connection pool and bind to the JNDI tree, you can configure a data source that encompasses a connection pool. For more information about simplified JDBC resource configuration, see "Simplified JDBC Resource Configuration" in Configuring and Managing WebLogic JDBC at http://download.oracle.com/docs/cd/E13222_01/wls/docs100/jdbc_admin/jdbc_intro.html#simple_res_config.

The WebLogic Upgrade Wizard automatically converts JDBC data sources, connection pools, MultiPools, and data source factories to their new counterparts in WebLogic Server 10.0, as described in the following sections.

Note: Each upgraded JDBC module contains an internal properties section. WebLogic Server uses internal properties to manage the data sources for backward compatibility. Also, some legacy attributes are preserved as properties in the Properties attribute of the JDBC data source file. Do not manually edit any internal properties.

For information about deprecated JDBC features, methods, interfaces, and MBeans, see "Deprecated JDBC Features, Methods, Interfaces, and MBeans" in WebLogic Server and WebLogic Express Release Notes at http://download.oracle.com/docs/cd/E13222_01/wls/docs100/notes/new.html#deprecated_jdbc_features.

JDBC Data Sources and Connection Pools

The Upgrade Wizard converts legacy JDBC data source/connection pool pairs to two data source system resource modules, one for the data source and one for the connection pool:

During an upgrade, the Upgrade Wizard sets the GlobalTransactionsProtocol parameter for a data source based on the type of data source being converted (tx or non-tx) and the type of driver used in the related connection pool, as noted in the following table.

Table B-1 Parameter Settings for Global Transaction Protocol Parameter Setting 
Legacy Data Source Type
Driver Type
Emulate Two-Phase Commit
GlobalTransactionProtocol
Tx Data Source
XA
N/A
TwoPhaseCommit
Tx Data Source
Non-XA
False
OnePhaseCommit (by default; not explicitly set)
Tx Data Source
Non-XA
True
EmulateTwoPhaseCommit1
Data Source
Non-XA
N/A
None

1Depending on your environment, you may want to consider using the LoggingLastResource (LLR) transaction protocol in place of the EmulateTwoPhaseCommit protocol for transaction processing because of its performance benefits. For more information see "Understanding the Logging Last Resource Transaction Option" in Configuring and Managing WebLogic JDBC at
http://download.oracle.com/docs/cd/E13222_01/wls/docs100/jdbc_admin/jdbc_datasources.html#llr.

MultiPools

The Upgrade Wizard converts a MultiPool to a multi-data source, which is another instance of a data source object that provides load balancing and/or failover between data sources.

Data Source Factories

Data source factories are deprecated in this release and are included for backward compatibility only. No conversion of data source factories is required.

 


JDBC Debugging Enhancements

The JDBC subsystem uses the new system-wide WebLogic Diagnostic Service for centralized debugging access and logging.

See Using the WebLogic Diagnostic Framework Console Extension.

 


Modular Configuration and Deployment of JMS Resources

As of WebLogic Server 9.0, JMS configurations are stored as modules, defined by XML documents that conform to the new weblogic-jmsmd.xsd schema. With modular deployment of JMS resources, you can promote your application and the JMS configuration from one environment to another. For example, you can promote your application and the required JMS configuration from a testing environment to a production environment, without opening an EAR file and without extensive manual JMS re-configuration.

For more information, see:

The WebLogic Upgrade Wizard automatically converts pre-10.0 JMS resources to a JMS Interop module file named interop-jms.xml, which is copied to the domain's config\jms directory. For more information, see "JMS Interop Modules" in Configuring and Managing WebLogic JMS at http://download.oracle.com/docs/cd/E13222_01/wls/docs100/jms_admin/overview.html#jms_interop_modules.

Please note the following JMS configuration changes:

 


JMS Message ID Format

As of WebLogic Server 9.0, the format of the JMS message ID has changed. BEA will continue to support the pre-9.0 format for existing consumers, producers, and servers. For example, existing JMS consumers may continue to view messages in the pre-9.0 format, even when received from a new JMS producer and JMS server.

 


Improved Message Paging

The message paging feature for freeing up virtual memory during peak message load situations is always enabled on JMS servers. Additionally, administrators no longer need to create a dedicated message paging store since paged out messages can be stored in a directory on your file system. However, for the best performance you should specify that messages be paged to a directory other than the one used by the JMS server's persistent store.

See " Paging Out Messages To Free Up Memory" in Configuring and Managing WebLogic JMS.

 


Thread Management

BEA recommends using Work Manager concepts to manage threads, as execute queues are no longer the default method used as of WebLogic Server 9.0. You define the rules and constraints for your application by defining a Work Manager and applying it either globally to a WebLogic Server domain or specifically to an application component. For more information, see: "Using Work Managers to Optimize Scheduled Work" in Configuring WebLogic Server Environments at http://download.oracle.com/docs/cd/E13222_01/wls/docs100/config_wls/self_tuned.html.

In WebLogic Server 8.1, processing was performed in multiple execute queues. If you had been using execute queues to improve performance in 8.1, you may continue to use them after you upgrade your application domains. BEA provides a Use81StyleExecuteQueues flag that enables you to disable the self-tuning execute pool and provide backward compatibility for upgraded applications to continue to use user-defined execute queues. For information about enabling the backward compatibility flag, and configuring and monitoring execute queues, see "Using User-defined Execute Queues" in WebLogic Server Performance and Tuning at http://download.oracle.com/docs/cd/E13222_01/wls/docs100/perform/appb_queues.html.

 


JTA Transaction Log Migration

All JTA domain configuration options are persisted from the legacy configuration file. The only changes are at the server level. As of WebLogic Server 9.0, the Transaction Manager uses the default WebLogic persistent store to store transaction log records. During the upgrade, the Upgrade Wizard copies transaction log records to the default store. The transaction log file prefix from the existing server configuration is used only to locate the transaction log (.tlog) files during an upgrade; it is not preserved after the upgrade.

If the entire domain resides on a single machine, the Upgrade Wizard handles the upgrade (and copies transaction log records to the default store) for all Managed Servers during the initial domain upgrade. If Managed Servers reside on separate machines, you must upgrade each Managed Server individually, as described in Upgrade Your Application Environment.

Please note the following:

If you have put your transaction log files in network storage in preparation for Transaction Recovery Service migration, the log file location is not preserved after the upgrade. In this release, the WebLogic Server Transaction Manager uses the WebLogic default persistent store to store transaction log files. You can achieve the same result by moving the location of the WebLogic default persistent store to a network location. Note that you must manually copy the DAT file from the default location of the current default store to the new location of the default store.

If transactions will span multiple domains, you must configure your domain to enable inter-domain transactions. For more information, see "Configuring Domains for Inter-Domain Transactions" in Programming WebLogic JTA at http://download.oracle.com/docs/cd/E13222_01/wls/docs100/jta/trxcon.html#interop.

 


Security

The following sections identify changes to security.

Windows NT Authentication Provider Deprecated

The Windows NT Authentication provider is deprecated as of WebLogic Server 10.0. Use one or more of the other supported Authentication providers instead.

XACML Security Providers

As of 9.2, WebLogic Server includes two new security providers, the XACML Authorization provider and the XACML Role Mapping provider. Previous releases of WebLogic Server used an authorization provider and a role mapping provider based on a proprietary security policy language. These XACML security providers support the eXtensible Access Control Markup Language (XACML) 2.0 standard from OASIS. These providers can import, export, persist, and execute policy expressed using all standard XACML 2.0 functions, attributes, and schema elements.

WebLogic domains created using WebLogic Server 10.0 include the XACML providers by default. The new XACML providers are fully compatible with policies and roles created using the WebLogic Authorization provider (DefaultAuthorizer) and WebLogic Role Mapping provider (DefaultRoleMapper). Existing WebLogic domains that you upgrade to 10.0 will continue to use the authorization and role mapping providers currently specified, such as third-party partner providers or the original WebLogic Authorization and Role Mapping providers. If you wish, you can migrate existing domains from using WebLogic Server proprietary providers to the XACML providers, including performing bulk imports of existing policies. For more information, see Security for BEA WebLogic Server 10.0 at http://download.oracle.com/docs/cd/E13222_01/wls/docs100/security.html.

SAML V2 Providers

New versions of the SAML Credential Mapping provider and SAML Identity Assertion provider were added in WebLogic Server 9.2. The SAML Credential Mapping V1 provider and SAML Identity Assertion V1 provider are deprecated; you should use the V2 versions of the SAML Credential Mapping and SAML Identity Assertion providers.

Although the version number of the providers has been incremented to V2, the new SAML security providers implement the SAML 1.1 standard, as did the V1 providers.

Security MBeans

The following table lists the changes to security MBeans as of WebLogic Server 9.0.

Table B-2 Changes to Security MBeans as of WebLogic Server 9.0 
Type of Security MBean
Description
All security MBeans
In WebLogic Server 8.1, when you updated a security MBean attribute, the values were available to the security configuration and management hierarchy immediately, and to the security runtime hierarchy following a server reboot.
As of WebLogic Server 9.0, whether a security MBean attribute change is effective and available to the configuration, management, and runtime hierarchies immediately or upon server reboot is controlled by setting that attribute as dynamic or non-dynamic. For more information, see Dynamic Configuration Management.
RealmMBean, UserLockoutManagerMBean, and all security provider MBeans
  • The wls_getDisplay method is deprecated. In its place, you should use the new getName method. In addition, the following security methods have been removed:
  • wls_getAttributeTag
    wls_getConstructorTag
    wls_getMBeanTag
    wls_getNotificationTag
    wls_getOperationTag

  • The weblogic.Admin tools and pre-9.2 JMX security APIs can no longer be used to configure security MBeans. These utilities and APIs can still be used, however, to view and invoke methods on the security MBeans.
For security provider MBeans (only):
  • When adding or removing a security provider, you must reboot the server before any changes will take effect.
  • When modifying an existing security provider, if you modify any non-dynamic attributes, the server must be rebooted before any (that is, non-dynamic or dynamic) changes will take effect. For more information, see Dynamic Configuration Management.
All custom security provider MBeans
  • By default, all custom security provider MBeans attributes are non-dynamic. For more information, see Dynamic Configuration Management.
  • You can set an MBean attribute to be dynamic by setting Dynamic="true" for the attribute within the MDF file. For example:
  • <MBeanAttribute
    Name = "Foo"
    Type = "java.lang.String"
    Dynamic = "true"
    Description = "Specifies that this attribute is a dummy."
    />

Password Encryption

To prevent unauthorized access to sensitive data such as passwords, some attributes in configuration MBeans are encrypted. The attributes persist their values in the domain configuration files as an encrypted string. For further security, the in-memory value is stored in the form of an encrypted byte array to help reduce the risk of the password being snooped from memory.

In pre-9.0 releases, you could edit the config.xml file to specify an encrypted attribute, such as a password, in clear-text or encrypted format. In this case, when booted, the WebLogic Server will encrypt the information the next time it writes to the file.

As of WebLogic Server 9.0, when operating in production mode, the password of an encrypted attribute must be encrypted in the configuration files. In development mode, the password of an encrypted attribute can be either encrypted or clear-text.

You can use the weblogic.security.Encrypt command-line utility to encrypt the passwords, as follows:

java weblogic.security.Encrypt

You are prompted to enter a password, and the command returns the encrypted version. Then, copy the encrypted password returned into the appropriate file.

This utility is not just used for passwords in the configuration files. It can also be used to encrypt passwords in descriptor files (for example, a JDBC or JMS descriptor) and in deployment plans. For more information, see "encrypt" in "Using the WebLogic Server Java Utilities" in WebLogic Server Command Reference at http://download.oracle.com/docs/cd/E13222_01/wls/docs100/admin_ref/utils.html.

Security for HTTP Requests

By default, when an instance of WebLogic Server 10.0 responds to an HTTP request, its HTTP response header does not include the WebLogic Server name and version number. This behavior is different from releases prior to WebLogic Server 9.0.

To have the name and version number included in the HTTP response header when responding to an HTTP request, enable the Send Server Header attribute for the WebLogic Server instance in the Administration Console. The attribute is located on the Server Arrow symbolServerName Arrow symbol Protocols Arrow symbolHTTP tab under the Advanced Options section. Note that enabling this feature may creates a security risk if a possible attacker knows about a vulnerability in the specified version of WebLogic Server.

For more information about ensuring security, see "Securing the WebLogic Security Service" in "Ensuring the Security of Your Production Environment" in Securing a Production Environment at http://download.oracle.com/docs/cd/E13222_01/wls/docs100/lockdown/practices.html.

Secure Access to MBeanHome

In pre-9.0 releases of WebLogic Server, anonymous access to MBeanHome was enabled by default. With the security enhancements delivered as of WebLogic Server 9.0, anonymous access to MBeanHome is no longer allowed.

Although doing so is not recommended, you can re-enable anonymous access by specifying the following flag when starting the server:

-Dweblogic.management.anonymousAdminLookupEnabled

Message-Level Security in Web Services

As of WebLogic Server 9.0, message-level security in Web Services was enhanced to use the standards-based Web Services Policy Framework (WS-Policy). WS-Policy provides a flexible and extensible grammar for expressing the capabilities, requirements, and general characteristics of entities in an XML Web Services-based system. For more information about WS-Policy, see "Using WS-Policy Files for Message-Level Security Configuration" in Programming Web Services for WebLogic Server at http://download.oracle.com/docs/cd/E13222_01/wls/docs100/webserv/security.html#ws_policy.

In 8.1, the implementation was based on an OASIS implementation of the Web Services Security (WSS) standard. This implementation is supported for backward compatibility, but is deprecated as of 9.0. For more information, see http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=wss.

 


Web Services

WebLogic Server 8.1 Web Services can be run in 10.0, although the 8.1 Web Services run-time engine has been deprecated as of 9.0.

No web service upgrade is required going from 9.2 to 10.0.

The WebLogic Server 7.0 Web Services need to be upgraded to at least 8.1 in order to run in 10.0. For more information, see "Upgrading WebLogic Web Services" in Programming WebLogic Web Services at http://download.oracle.com/docs/cd/E13222_01/wls/docs81/webserv/migrate.html.

BEA strongly recommends that you upgrade, to 10.0, all of your 8.1 Web Services, including any 7.0 Web Services that have been upgraded to 8.1. For information about upgrading your existing 8.1 Web Services, see Upgrading WebLogic Web Services From Previous Releases to 10.0 in WebLogic Web Services: Getting Started.

Note: See also Message-Level Security in Web Services.

 


Web Applications, JSPs, and Servlets

The following sections provide important compatibility information for Web applications, JSPs, and Servlets in WebLogic Server 10.0:

Deprecated and Obsolete Web Application Features

For a list of Web application features that are deprecated or are not supported as of WebLogic Server 10.0, see WebLogic Server and WebLogic Express Release Notes.

BASIC Authentication with Unsecured Resources

For WebLogic Server versions 9.2 and later, client requests that use HTTP BASIC authentication must pass WebLogic Server authentication, even if access control is not enabled on the target resource.

The setting of the Security Configuration MBean flag enforce-valid-basic-auth-credentials determines this behavior. (The DomainMBean can return the new Security Configuration MBean for the domain.) It specifies whether or not the system should allow requests with invalid HTTP BASIC authentication credentials to access unsecured resources.

Note: The Security Configuration MBean provides domain-wide security configuration information. The enforce-valid-basic-auth-credentials flag effects the entire domain.

The enforce-valid-basic-auth-credentials flag is true by default, and WebLogic Server authentication is performed. If authentication fails, the request is rejected. WebLogic Server must therefore have knowledge of the user and password.

See Understanding BASIC Authentication with Unsecured Resources in Programming WebLogic Security for complete information.

Backwards Compatibility Flags

For WebLogic Server 10.0, backward compatibility for WebLogic Server 9.2 or earlier is supported via the backward-compatible element within the jsp-descriptor element, as described in this section and in jsp-descriptor in Developing Web Applications, Servlets, and JSPs for WebLogic Server.

JSP 2.1 Support and Compatibility With JSP 2.0 Web Applications

JSP 2.1 is supported as of WebLogic Server 10.0. Depending on the version of the Web application (version 2.4 or 2.5) and the setting of the backward-compatible element, Weblogic Server 10.0 also supports JSP 2.0.

See Backwards Compatibility Flags in Developing Web Applications, Servlets, and JSPs for WebLogic Server for important information about the buffer suffix setting and implicit servlet 2.5 package imports.

Support for JSP 2.0

JSP 2.0 was supported as of WebLogic Server 9.0, and continues to be supported as described in Backwards Compatibility Flags. Please note the following changes to the JSP behavior as required in support of JSP 2.0:

Servlet Path Mapping

As of the Servlet 2.3 Specification from Sun Microsystems, which is downloadable at http://java.sun.com/products/servlet/download.html#specs, the following syntax is used to define mappings:

These changes introduce a change in behavior with the following HttpServletRequest methods:

To better illustrate the change in behavior, consider a request /abc/def.html that resolves to ServletA:

To ensure that the path info returned is non-null, replace all occurrences of the / (forward slash) servlet mapping string with /*.

 


XML Implementation

Please note the following changes to XML support as of WebLogic Server 9.0:

 


XMLBeans and XQuery Implementation

As of 9.0, the XMLBean implementation in WebLogic Server has been moved from an internal BEA library (com.bea.xml) to the Apache open source project (org.apache.xmlbeans).

If you used XMLBeans in your WebLogic Server 8.1 applications, you must perform the following steps:

  1. Update the package name used by XMLBeans from com.bea.xml to org.apache.xmlbeans.
  2. Recompile your XMLBean schemas to update the schema metadata (.xsb) files and generated code.

As of 9.0, the XMLQuery (XQuery) implementation conforms to the following specifications:

In WebLogic Server 8.1, the XQuery implementation conformed to XQuery 1.0 and XPath 2.0 Functions and Operators—W3C Working Draft 16 August 2002, available from the W3C Web site at http://www.w3.org/TR/2002/WD-xquery-operators-20020816. The 2002 XQuery implementation is deprecated as of 9.0.

In most cases, simple XQuery and XPath operations in pre-9.0 code will behave the same in 10.0. To ensure that the XQuery and XPath operations produce the expected results, you can review and/or update the existing XMLObject.selectPath() and XMLObject.execQuery() method calls using one of the following methods:

As of 9.0, the behavior of XMLCursor.moveXML() has changed. In 8.1, a cursor that was inside a moved fragment remained on the original document. As of 9.0, cursors move with fragments.

 


WebLogic Administration and Configuration Scripts

Due to changes with the MBean hierarchy, BEA does not guarantee that existing configuration and administration scripts (such as WLST, wlconfig, weblogic.Admin, Ant, and so on) will run in 10.0. BEA recommends that you update your scripts to take advantage of the new features provided as of WebLogic Server 10.0. For more information about new features and changes in the MBean hierarchy, see "What's New in WebLogic Server 10.0" in the WebLogic Server and WebLogic Express Release Notes at http://download.oracle.com/docs/cd/E13222_01/wls/docs100/notes/new.html.

For additional information about upgrading your application infrastructure and the scripting tools that have been deprecated, see Step 1: Upgrade Your Application Infrastructure.

 


Deployment Descriptor Validation and Conversion

This section describes changes in the use of deployment descriptors in a WebLogic Server environment, as of release 9.0:

 


Deprecated Startup and Shutdown Classes

As of 9.0, application-scoped startup and shutdown classes were deprecated in WebLogic Server, in favor of applications that respond to application lifecycle events. BEA recommends that you update your application environment to use the lifecycle events in place of application-scoped and domain-level startup and shutdown classes. For more information, see "Programming Application Lifecycle Events" in Developing Applications with WebLogic Server at http://download.oracle.com/docs/cd/E13222_01/wls/docs100/programming/lifecycle.html.

 


Administration Console Extension Architecture

In WebLogic Server version 9.0, the Administration Console was built on the WebLogic Portal Framework, which makes it more open and more readily extensible. The architecture necessitated new procedures for extending the Administration Console. WebLogic Administration Console extensions built for releases of WebLogic Server prior to 9.0 will not function with the new Console infrastructure.

For more information about extending the Administration Console, see Extending the Administration Console at http://download.oracle.com/docs/cd/E13222_01/wls/docs100/console_ext/index.html.

Important Console-Extension Information for Version 9.2

Version 9.2 of WebLogic Server introduced the following changes to console extensions:

WebLogic Portal Skeleton URI References Should be Fully Qualified

WebLogic Portal requires that any explicit Skeleton URI references be fully qualified relative to the webapp. However, the documentation and some of the console extension examples have sometimes used relative references to these skeletons. Consider the following incorrect example:

<netuix:singleLevelMenu markupType="Menu" markupName="singleLevelMenu" skeletonUri="singlelevelmenu_children2.jsp"/>

This example should have been correctly specified as:

<netuix:singleLevelMenu markupType="Menu" markupName="singleLevelMenu" skeletonUri="/framework/skeletons/default/singlelevelmenu_children2.jsp"/>

For this release, relative skeleton URI references will continue to work. However, any console extensions that you have written should be updated to use fully qualified skeleton URIs, as these relative references may no longer function correctly in a future release.

 


Resource Adapters

The following table lists the configuration settings for resource adapters that are deprecated or no longer supported. For more information about new features and changes, see "New and Changed Features in This Release" in Programming WebLogic Resource Adapters at http://download.oracle.com/docs/cd/E13222_01/wls/docs100/resadapter/intro.html#features.

Table B-3 Deprecated or Unsupported Resource Adapter Configuration Settings 
This element ...
As of WebLogic Server 9.0 ...
Link-Ref Mechanism
This element has been deprecated and replaced by the new Java EE libraries feature. For more information about Java EE libraries, see "Creating Shared J2EE Libraries and Optional Packages" in Developing Applications with WebLogic Server at http://download.oracle.com/docs/cd/E13222_01/wls/docs100/programming/libraries.html.
The Link-Ref mechanism is still supported in this release for resource adapters developed under the J2CA 1.0 Specification. For more information about using the Link-Ref mechanism with 1.0 resource adapters, see "(Deprecated) Configuring the Link-Ref Mechanism" in "Configuring the weblogic-ra.xml File" in Programming WebLogic Resource Adapters at http://download.oracle.com/docs/cd/E13222_01/wls/docs100/resadapter/creating.html#weblogic-ra-xml.
<shrink-period-minutes>
This element has been deprecated and replaced by <shrink-frequency-seconds>, which allows you to specify the shrink period in increments of seconds, instead of minutes.
The <shrink-frequency-seconds> element overrides the <shrink-period-minutes> element if both are set.
<connection-maxidle-time>
This element has been deprecated and is replaced by <inactive-connection-timeout-seconds>, which allows you to specify the connection timeout in increments of seconds.
The <inactive-connection-timeout-seconds> element overrides the <connection-maxidle-time> element if both are set.
<security-principal-map>
This element is no longer supported; the security principal map is configured using the Administration Console.
You should remove the <security-principal-map> definition from the weblogic-ra.xml file. Otherwise, deployment of the resource adapter fails.
<connection-cleanup-frequency>
This element is no longer supported and is ignored during deployment.
<connection-duration-time>
This element is no longer supported and is ignored during deployment.

 


WLEC

WLEC was deprecated in WebLogic Server 8.1. WLEC users should move applications to the WebLogic Tuxedo Connector, as described in WLEC to WebLogic Tuxedo Connector Migration Guide at http://download.oracle.com/docs/cd/E13222_01/wls/docs100/wlec_migration/index.html.

 


SNMP MIB Refresh Interval and Server Status Check Interval No Longer Used

The SNMPAgentMBean MBean MibDataRefreshInterval and ServerStatusCheckIntervalFactor attributes are deprecated and are ignored in WebLogic Server 10.0.

 


Backward Compatibility Flags

The following configuration flags are available to support backward compatibility when you upgrade a domain. By default, these flags are set to support backward compatibility, unless you disable them by selecting the Do not set backwards compatibility flags option during an upgrade, as described in Upgrading a Domain in Graphical Mode.

Table B-4 Backward Compatibility Flags 
Category
Backward Compatibility Flag
For More Information
Security
  • EnforceStrictURLPattern—Specifies whether the server should enforce strict adherance of URL patterns to the Servlet 2.4 specification. During an upgrade, this flag is set to false for backward compatibility.
  • WebAppFilesCaseInsensitive—Specifies whether the URL-pattern matching behavior is case-insensitive for security constraints, servlets, filters, virtual hosts, and so on, in the Webapp container and external security policies. During an upgrade, this flag is set to os, which sets URL-pattern matching as case-sensitive on all platforms except Windows, for compatibility with pre-9.0 releases. As of WebLogic Server 9.0, URL-pattern matching is strictly enforced across operating systems
Web Application
  • backward-compatible—Specifies which JSP version is supported. Depending on the version of the Web application (version 2.4 or 2.5) and the setting of the backward-compatible element, Weblogic Server 10.0 supports JSP 2.1 or JSP 2.0.
  • backward-compatible is located within the jsp-descriptor element, as described in Developing Web Applications, Servlets, and JSPs for WebLogic Server.

  • AllowAllRoles—Specifies that a wildcard (*) character can be used to set the role name to enable all users/roles in the realm to have access to the resource collection. As of WebLogic Server 9.0, if you specify the wildcard (*) character as the role name, all users/roles in the Web application will have access to the resource collection.
  • FilterDispatchedRequestsEnabled—Specifies whether to apply filters to dispatched requests. As of WebLogic Server 9.0, the new Dispatcher element makes this behavior explicit.
  • JSPCompilerBackwardsCompatible—Specifies whether to allow JSPs that do not comply with the JSP 2.0 specification.
  • ReloginEnabled—Specifies whether to allow users multiple attempts to log in to a Web page if the original credentials were not supported. As of WebLogic Server 9.0, the FORM/BASIC authentication behavior has been modified to return the 403 (FORBIDDEN) Web page.
  • RtexprvalueJspParamName—Specifies whether to allow run-time expression values for the JSP <param name> tag. As of WebLogic Server 9.0, the JSP Compiler no longer allows run-time expression values.

 


Deprecated and Removed APIs

This section summarizes APIs that have been deprecated or removed in WebLogic Server 9.0.

Note: If you want to rebuild the WebLogic Server 8.1 MedRec application in the 10.0 environment, you must replace references to the weblogic.webservice.tools.wsdlp package with the new package name, weblogic.webservice.wsdl, in two Java files: medrec/src/common/web/com/bea/medrec/utils/MedRecWebAppUtils.java and medrec/src/clients/com/bea/medrec/webservices/swing/EditProfileFrame.java.
Note: The 8.1, 9.0, and 9.2 packages, weblogic.webservice.tools.wsdlp and weblogic.webservice.wsdl, respectively, are not publicly available.
Note: See also Web Services.

Deprecated APIs

For a list of deprecated APIs, see http://download.oracle.com/docs/cd/E13222_01/wls/docs100/javadocs/deprecated-list.html.

Removed APIs

This section describes the APIs that have been removed in WebLogic Server 9.0, including:

Deprecated APIs in WebLogic Server 10.0

Table B-5 provides a list of APIs that have been deprecated in WebLogic Server 10.0.

Table B-5 Deprecated APIs in WebLogic Server 10.0
Package Name
Interface/Class/Exception
Method/Variable
weblogic.jws
WLHttpsTransport
*
weblogic.logging
ConsoleFormatter
ConsoleFormatter(weblogic.management.configuration.LogMBean)
weblogic.logging.log4j
WLLog4jLogEvent
setThrowableInfo(weblogic.logging.ThrowableInfo)
weblogic.logging.log4j
WLLog4jLogEvent
getThrowableInfo()
weblogic.wsee.jws
JwsContext
getLogger(java.lang.String)
weblogic.wsee.jws
SoapFaultException
 
weblogic.wsee.jws.util
Logger
*

Removed APIs, Deprecated in WebLogic Server 8.1

The following table provides a list of APIs that have been removed in WebLogic Server 10.0 and were deprecated in WebLogic Server 8.1.

Table B-6 Removed APIs, Deprecated in WebLogic Server 8.1
Package Name
Interface/Class/Exception
Method/Variable
weblogic.jms
ServerSessionPoolFactory
createServerSessionPool(javax.jms.Connection, int, int, boolean, java.lang.String,java.io.Serializable)
weblogic.jms
ServerSessionPoolFactory
getServerSessionPool(javax.jms.QueueConnection, int, boolean, int, java.lang.String)
weblogic.jms
ServerSessionPoolFactory
getServerSessionPool(javax.jms.TopicConnection, int, boolean, int, java.lang.String)
weblogic.time.common
ScheduledTriggerDef
setDispatchPolicy(java.lang.String)

Removed APIs, Deprecated in WebLogic Server 7.0

Table B-7 provides a list of APIs that have been removed in WebLogic Server 10.0 and were deprecated in WebLogic Server 7.0.

Table B-7 Removed APIs—Deprecated in WebLogic Server 7.0 
Package Name
Interface/Class/Exception
Method/Variable
weblogic.common
WLSerializable
*
weblogic.io.common
T3File
*
weblogic.io.common
T3FileInputStream
*
weblogic.io.common
T3FileOutputStream
*
weblogic.io.common
T3FileSystem
*
weblogic.security
AuthenticationException
 
weblogic.security
Certificate
*
weblogic.security
Cipher
*
weblogic.security
Cipher3EDE
*
weblogic.security
CipherCBC
*
weblogic.security
CipherException
 
weblogic.security
Coder
*
weblogic.security
CoderException
 
weblogic.security
CoderInputStream
*
weblogic.security
CoderOutputStream
*
weblogic.security
DES
*
weblogic.security
DiffieHellman
*
weblogic.security
DigestInputStream
*
weblogic.security
DigestOutputStream
*
weblogic.security
DigestSignature
*
weblogic.security
Entity
*
weblogic.security
HexOutputStream
*
weblogic.security
JDK11Certificate
*
weblogic.security
KeyManagementException
*
weblogic.security
MD5RandomBitsSource
*
weblogic.security
NullCipher
*
weblogic.security
NullOutputStream
*
weblogic.security
PKCS5
*
weblogic.security
Padding
*
weblogic.security
RC4
*
weblogic.security
RSA
*
weblogic.security
RSAKey
*
weblogic.security
RSAMDSignature
*
weblogic.security
RSAPrivateKey
*
weblogic.security
RSAPrivateKeyPKCS8
*
weblogic.security
RSAPublicKey
*
weblogic.security
RSApkcs1
*
weblogic.security
RandomBitsSource
*
weblogic.security.SSL
BadMACException
 
weblogic.security.SSL
Biguint
*
weblogic.security.SSL
CipherSpec
*
weblogic.security.SSL
RecordInputStream
*
weblogic.security.SSL
SSLCertificate
*
weblogic.security.SSL
SSLParams
*
weblogic.security.SSL
SSLSocket
*
weblogic.security.SSL
SessionParams
*
weblogic.security.SSL
TrustManager
certificateCallback(weblogic.security.X509[],int)
weblogic.security
Signature
*
weblogic.security
SimpleRandomBitsSource
*
weblogic.security
SpinnerRandomBitsSource
*
weblogic.security
StreamCipher
*
weblogic.security
Streamable
*
weblogic.security
SymmetricCipher
*
weblogic.security
TeeOutputStream
*
weblogic.security
X500Name
*
weblogic.security
X509
*
weblogic.security.acl
CertAuthentication
authenticate(java.lang.String,weblogic.security.Certificate[],boolean)
weblogic.security.acl
CertAuthenticator
authenticate(java.lang.String,weblogic.security.Certificate[],boolean)
weblogic.security.acl
SSLUserInfo
setSSLCertificate(weblogic.security.X509)
weblogic.security.acl
Security
receiveSecurityMessage(weblogic.rjvm.JVMID, weblogic.security.acl SecurityMessage)
weblogic.security.acl
SecurityMessage
execute(weblogic.rjvm.JVMID)
weblogic.security.audit
Audit
certificateInvalid(java.lang.String, java.lang.Object,weblogic.security.X509)
weblogic.security.audit
Audit
rootCAInvalid(java.lang.String,java.lang.Object, weblogic.security.X509)
weblogic.security.audit
AuditProvider
certificateInvalid(java.lang.String, java.lang.Object,weblogic.security.X509)
weblogic.security.audit
AuditProvider
rootCAInvalid(java.lang.String, java.lang.Object,weblogic.security.X509)
weblogic.security.service
InvocableResource
toString()
weblogic.security.service
MBeanResource
*
weblogic.security.service
RealmAdapterAclResource
*
weblogic.servlet.security
AuthFilter
doSuccessAuth(javax.servlet.ServletRequest, javax.servlet.ServletResponse)
weblogic.servlet.security
AuthFilter
doFailAuth(javax.servlet.ServletRequest, javax.servlet.ServletResponse)
weblogic.servlet.security
AuthFilter
doPreAuth(javax.servlet.ServletRequest, javax.servlet.ServletResponse)
weblogic.servlet.security
AuthFilter
service(javax.servlet.ServletRequest, javax.servlet.ServletResponse)
weblogic.servlet.security
ServletAuthentication
authObject(java.lang.String, java.lang.Object,javax.servlet.http.HttpSession, javax.servlet.http.HttpServletRequest)
weblogic.servlet.security
ServletAuthentication
authObject(java.lang.String, java.lang.Object,javax.servlet.http.HttpSession, javax.servlet.http.HttpServletRequest)
weblogic.servlet.security
ServletAuthentication
weak(java.lang.String, java.lang.String,javax.servlet.http.HttpSession)
weblogic.xml.sax
XMLInputSource
*

Removed APIs in 9.0 (Not Deprecated)

The following provides a list of APIs that were removed in WebLogic Server 9.0, without being deprecated. Except where indicated, the APIs were removed because the related functionality was no longer supported.

Note: In the following table, * (asterisk) represents a wildcard character.

Table B-8 Removed APIs (Not Deprecated) 
Package Name
Interface/Class/Exception
Method/Variable
weblogic.apache
*
*
weblogic.common
CallbackDispatcher
CallbackDispatcher(weblogic.common.ClientCallback, boolean)
T3ResourceDef
T3ResourceFactory
*
weblogic.jdbc.common
 
*OracleBlob.*
*OracleConnection.*
*OracleCallableStatement.*
*OracleLobCloser.*
*OracleClob.*
weblogic.jms
 
*VirtualDestination.*
weblogic.jms.extensions
JMSHelper
*getRepositoryForDomain.*
weblogic.jndi
Environment
*getProviderRJVM.*
*getSecuritySubject.*
*getUseIIOPServiceProvider.*
*setProviderRJVM.*
*setSecuritySubject.*
*setUseIIOPServiceProvider.*
WLContext
*PROVIDER_RJVM.*
*USE_IIOP_SERVICE_PROVIDER.*
weblogic.logging
ConsoleHandler
*isLoggable.*1
FileStreamHandler
*isLoggable.*1
WLLevel
*WLLevel.*
WLLogRecord
*setId.*
*setMachineName.*
*setServerName.*
*setThreadName.*
*setTransactionId.*
*setUserId.*
weblogic.management
 
*WebServiceLegalHelper.*
AdminServerAdmin
*
DeploymentException
getApplication()
DistributedManagementException
MAX_EXCEPTIONS
LocalAdminServer
*
ManagedServerAdmin
*
RemoteMBeanServer
java.lang.String getSharedCommoMBeanRepositoryIdentifier(javax.management.ObjectName)
java.util.List getCommoMBeans(javax.management.ObjectName)
tools
*
WebLogicObjectName
WebLogicObjectName(java.lang.String, java.lang.String)
UndeploymentException
getApplication()
utils
InvalidPasswordException
InvalidPredicateException
weblogic.management.configuration
*
*
weblogic.management.runtime
*
*
weblogic.management.security
BaseMBeanImpl
*getRequiredModelMBean.*
ProviderMBean
*setRealm*
RealmMBean
*setAdjudicator*
*setUserLockoutManager*
weblogic.management.security.authentication
UserLockoutManagerMBean
*setRealm*
weblogic.management.timer
Timer
void addNotification(weblogic.time.common.internal.TimerNotification)
java.lang.String getDispatchPolicy()
void removeNotification(weblogic.time.common.internal.TimerNotification)
void removeNotification(weblogic.time.common.internal.TimerNotification, boolean)
void run()
void setDispatchPolicy(java.lang.String)
void start(java.lang.ThreadGroup,java.lang.String,int)
weblogic.net.http
HttpClient
 
HttpsClient
 
HttpUnauthorizedException
 
HttpURLConnection
*
HttpsURLConnection
*
KeepAliveCache
 
KeepAliveStream
 
MessageHeader
 
weblogic.rmi
Naming
void bind(java.lang.String, weblogic.rmi.Remote)
weblogic.rmi.Remote lookup(java.lang.String)
void rebind(java.lang.String, weblogic.rmi.Remote)
weblogic.security
HMAC
*
Key
*
weblogic.security.providers.authentication
*
*
weblogic.security.providers.authorization
*
*
weblogic.security.service
Auditor
*
SecurityManager
*
WebResource
*
WebServiceResource
void initialize(java.lang.String)
void main(java.lang.String[])
WebServiceResource WebServiceResource(weblogic.security.service.WebResource, java.lang.String, java.lang.String[], java.lang.String[])
weblogic.security.spi
KeyStoreProvider
 
weblogic.security.SSL
HostnameVerification
 
HostnameVerifier
*verify(java.lang.String, java.lang.String)
*verify(java.net.InetAddress, weblogic.security.X509)
SSLClientInfo
 
SSLSocketFactory
*SSLSocketFactory()
weblogic.servlet.proxy
GenericProxyServlet
 
GenericProxyServlet
ProxyConnection
ProxyConnectionPool
HttpClusterServlet
RequestInfo
Server
ServerList
HttpProxyServlet
 
weblogic.webservice.async
KernelFeederImpl
ExecuteTask void execute(weblogic.kernel.ExecuteThread)
weblogic.webservice.client
BaseWLSSLAdapter
void main(java.lang.String)
void _setStrictChecking(boolean)
JSSEAdapter
javax.net.ssl.SSLSocketFactory getSocketFactory()
void setSocketFactory(javax.net.ssl.SSLSocketFactory)
SSLAdapterFactory
void main(java.lang.String)
weblogic.xml
xpath
*XMLNodeXPath.*
weblogic.xml.security.specs
SecuritySpec
java.lang.String getName()
weblogic.xml.security.wsse
SecurityElementFactory
weblogic.xml.security.wsse.Token createToken(java.lang.String, java.lang.String, javax.xml.namespace.QName)
UsernameToken
String getPasswordType()

1API functionality is supported by the java.util.logging.Handler class.


  Back to Top       Previous  Next