TPS-4524-RT (cumulative patch) - 7.2

EnrichVersion
7.2
EnrichProdName
Talend ESB
EnrichPlatform
Talend ESB

TPS-4524-RT (cumulative patch)

Info Value
Patch Name Patch_20201204_TPS-4524_v1-RT-7.2.1
Release Date 2020-12-04
Target Version 20190620_1446-7.2.1
Product affected Talend ESB Runtime

Introduction

This patch is cumulative. It includes the previous generally available patches from Talend ESB Runtime 7.2.1.

NOTE: To download this patch, liaise with your Support contact at Talend.

Fixed issues

This patch contains the following fixes:

TESB

  • TPS-4538: [7.2.1] No more authentication methods available (TESB-31051)
  • TPS-4507: [7.2.1] ESB patch doesn't remove all previous talend-data-mapper features (TESB-30676)
  • TPS-4476: [7.2.1] Issues with patch installation (TPS-4257) (TESB-30396)
  • TPS-4469: [7.2.1] java.lang.NoClassDefFoundError: net/sf/saxon/dom/NodeOverNodeInfo (TESB-30581)
  • TPS-4391: [7.2.1] Error Updating talend-data-mapper when installing TPS-4257 (TESB-30308)
  • TPS-4343: [7.2.1] Problems using groovy.json (TESB-29786)
  • TPS-4209: [7.2.1] Camel-salesforce feature failed to be installed on Runtime (TESB-26595)
  • TPS-4170: [7.2.1] Swagger UI not getting updated (TESB-29278)
  • TPS-4133: [7.2.1] Runtime errors net.sf.saxon.trans.LicenseException: when using "camel-saxon" and tdm components (TESB-29218)
  • TPS-4098: [7.2.1] Unsolicited restart of Talend resources while deploying/undeploying routes (TESB-29223)
  • TPS-3791: [7.2.1] Camel route with cSetProperty failing on runtime (TESB-28215)
  • TPS-3646: [7.2.1] The Karaf will not work with an SSL authenticated client set up (TESB-27544)
  • TPS-3613: [7.2.1] Timeout when trying to connect to JMX port 8888 (TESB-26434)
  • TPS-3594: [7.2.1] Runtime "org.ops4j.pax.logging.cfg" overwritten by Cloud-RemoteEngine (TESB-27385)
  • TPS-3333: [7.2.1] Remove hard coded keys used for encryption from JobServer ( Talend Runtime )
  • TPS-3297: [7.2.1] Default user in AMQ WebConsole config (needs to be removed) (TESB-26606)
  • TPS-3279: [7.2.1] Encryption of user passwords does not work as expected (TESB-26507)

TPSVC

  • TPS-4319: [7.2.1] JobServer memory leak related to ZeroMQ mailbox (TPSVC-12728)
  • TPS-3446: [7.2.1] Talend Runtime - Jobserver - [Regression] Not able to overwrite context param through TAC using BigData jobs(TPSVC-11563)
  • TPS-3385: [7.2.1] Talend Runtime - Jobserver - Default context is generated in children job folder falsely (TPSVC-11101)

TDM

  • TPS-4396: [7.2.1] High memory usage by TDMEndpoint class in Runtime (TDM-8307)
  • TPS-4331: [7.2.1] cMap throws classcastException and not able to map a property from java bean (TDM-8225)
  • TPS-4092: [7.2.1] Problem with camel headers when cJMS and cMap are used (TDM-8089)
  • TPS-4081: [7.2.1] TDM Route is running in Local Studio but not on Runtime - Error - A structure associated with the map is not present. (104) (TDM-8066)
  • TPS-3934: [7.2.1] TDM adds unencrypted passwords to error message (TDM-7969)
  • TPS-3818: [7.2.1] After migration errors - Structures throws error Inconsistent Record (TDM-7481 )
  • TPS-3814: [7.2.1] Customer getting null pointer exception when accessing a soap route in 721 studio (TDM-7845)
  • TPS-3610: [7.2.1] thmap appends default_ namespace in the generated xml in output (TDM-7568)
  • TPS-3547: [7.2.1] XML sometimes generated with 2 xmlns attributes(TDM-7509)
  • TPS-3534: [7.2.1] Deploying/restart one service breaks with TDM exception(TDM-7499)
  • TPS-3322: [7.2.1] Error loosing headers after cMap component in 7.2.1 (TDM-7112)
  • TPS-3296: [7.1.1] Job with tHMap fails to compile due to DocumentFunction (TDM-7080)

Prerequisites

Consider the following requirements for your system:

  • Talend ESB Runtime 7.2.1 must be installed.

  • Depending on the product, {container} is Talend-ESB-V7.2.1/container/ or Talend-Runtime-V7.2.1/

  • Before applying the patch, and if old TDM patches have been installed (ie: org.talend.transform.runtime.distrib-X.Y.Z_yyyyMMdd_HHmm.zip), please check the repository files are actually available on system, using this command:

    karaf@trun()> feature:version-list talend-data-mapper | grep file
    Version             | Repository | Repository URL
    --------------------+------------+---------------------------------------------------------------------------------------------------------
    7.2.1.20200413_0622 |            | file:/opt/TALEND/org.talend.transform.runtime.distrib-7.2.1_20200413_0651/features.talend-esb.xml
    7.2.1.20200528_1359 |            | file:/opt/TALEND/org.talend.transform.runtime.distrib-7.2.1_20200528_1415/features.talend-esb.xml
    

Here for instance, check these files are available:

/opt/TALEND/org.talend.transform.runtime.distrib-7.2.1_20200413_0651/features.talend-esb.xml
/opt/TALEND/org.talend.transform.runtime.distrib-7.2.1_20200528_1415/features.talend-esb.xml

If not, make sure to re-extract the old TDM patches to make these files available at the above locations After successful execution of the current patch, these files can be removed

  • Before applying the patch, and if TAC is used, latest TAC patch should be installed

  • Before applying the patch, please change the following properties in file {container}/etc/org.apache.karaf.jaas.cfg

    encryption.enabled = true
    encryption.name = basic (or jasypt)
    
  • Only in case that you have custom changes made in {container}/etc/org.talend.remote.jobserver.server.cfg, you need to backup this file and set the following properties explicit to your file and then copy it back after the patch is applied

    # Set to false to avoid the creation of a temporary context file - useful for big data jobs where the default context is inside the job jar
    # Note that if the default context is not found JS automatically uses the command line to transfer context parameters even if
    # SECURE_CONTEXTS=true
    org.talend.remote.jobserver.commons.config.JobServerConfiguration.SECURE_CONTEXTS=true
    
    # Set the timeout(milliseconds) for job TRACE and STATS LOGS, value shouldn't be less than 0;
    # 0 millisecond means an infinite timeout
    org.talend.remote.jobserver.commons.config.JobServerConfiguration.TRACE_STATS_TIMEOUT=0
    
  • TPS-4319: [7.2.1] JobServer memory leak related to ZeroMQ mailbox (TPSVC-12728) requires configuration in {container}/etc/org.talend.remote.jobserver.server.cfg:

    org.talend.remote.jobserver.server.TalendJobServer.ENABLED_PROCESS_MESSAGE=false
    

Installation

Standalone Activemq

Optional, only needed in case the standalone Apache ActiveMQ Broker is used. This directory also only exists in the Talend-ESB package but is not part of the Talend-Runtime package.

  • Stop Standalone Activemq
  • Extract & replace the content of ZIP directory activemq into Talend-ESB-V7.2.1/activemq/

Structure after extract & replace should be :

Talend-ESB-V7.2.1
├───activemq  : existing dir superseeded by patch
├───add-ons   : existing dir
├───bin       : existing dir
├───container : existing dir
├───...

Container

New Container (never started)

  • Extract & replace the content of ZIP directory container into {container} directory

Structure after extract & replace should be :

{container}
├───bin     : existing dir
├───deploy  : existing dir
├───etc     : existing dir superseeded by patch
├───...
├───patches : dir from current or previous patch
│   └───Patch_20201204_TPS-4524_v1-RT-7.2.1
│           patch.bat
│           patch.commands
│           patch.sh
├───system  : existing dir superseeded by patch
│   ├───... : existing dir
│   ├───... : directories from patch
├───...

Existing Container

  • Start Runtime Container
  • Extract & replace the content of ZIP directory container into {container} directory

Structure after extract & replace should be :

{container}
├───bin     : existing dir
├───deploy  : existing dir
├───etc     : existing dir superseeded by patch
├───...
├───patches : dir from current or previous patch
│   └───Patch_20201204_TPS-4524_v1-RT-7.2.1
│           patch.bat
│           patch.commands
│           patch.sh
├───system  : existing dir superseeded by patch
│   ├───... : existing dir
│   ├───... : directories from patch
├───...
  • Ensure username/password are right in {container}/patches/Patch_20201204_TPS-4524_v1-RT-7.2.1/patch.bat or {container}/patches/Patch_20201204_TPS-4524_v1-RT-7.2.1/patch.sh

    ... -u {username} -p {password} -f patch.commands ... 
    
  • Execute {container}/patches/Patch_20201204_TPS-4524_v1-RT-7.2.1/patch.bat or {container}/patches/Patch_20201204_TPS-4524_v1-RT-7.2.1/patch.sh

  • Ensure directory {container}/patches/Patch_20201204_TPS-4524_v1-RT-7.2.1/ contains new log files :
  • xxx-installation.log: patch installation log
  • xxx-init.log: state before patch installation
  • xxx-installed.log: state after patch installation
Please note that Routes using cMap (TDM feature) are not automatically restarted by the patch procedure.
You will need to restart the Runtime Container for changes to take effect.