Weld 3.1.2.Final

2019-8-6   release   Matej Novotny

Weld 3.1.2.Final is coming along with Weld API 3.1.SP1. It is another small release bringing in mainly bugfixes. One notable thing is that thanks to guys from Jetty, Weld 3.1.2.Final is ready to operate with lastest Jetty 9 as well as upcoming Jetty 10. Other than that we have tried to address some dodgy issues with possible race conditions and leaks - see for yourself!

Fixes and improvements:

  • Weld API/SPI

    • Fixed possible leak in Jandex index through SimpleServiceRegistry (WELD-2592)

      • This could only happen on application server supporting Jandex index and was only noticeable with a lot of application deployed at the same time

  • Weld Core

    • Fixed a case where some context event notification wouldn’t trigger observers due to race condition (WELD-2557)

    • Fixed rare IllegalAccessError problem during interception when methods had (package) private parameters from different methods (WELD-2583)

      • Such methods are now automatically ignored when creating intercepted subclasses

    • Attempted to fix a race condition that could happen when trying to concurrently initiate conversation ID generator (WELD-2585)

    • Weld now correctly disregards synthetic methods when considering proxyability (WELD-2586)

    • Correction to beans.xml parses when using Weld namespace (WELD-2591)

  • Weld SE

    • Improved classpath scanning to account for manifest file entries (WELD-2589)

    • javax.enterprise.inject.scan.implicit=true and org.jboss.weld.se.archive.isolation=false now work together correctly (WELD-2590)

  • Weld Servlet

    • Update Weld to new Jetty integration model prior to Jetty release (WELD-2587)

      • Weld 3.1.2.Final is ready to roll with to-be-released Jetty 9.4.x as well as Jetty 10.x

      • Of course we also kept legacy support in place, so even older version will still run

WildFly Patch

This time around, the patch for WildFly 17.0.1.Final is available.

If you’re not familiar with patching WildFly, check the FAQ.