Known issues in OpenEdge 12.8
- Last Updated: April 16, 2025
- 1 minute read
- OpenEdge
- Version 12.8
- Documentation
Click here for a list of the fixed issues.
The following table lists the release notes for this release:
| Component | Issue Number | Description |
|---|---|---|
| ABLTOOLS | OCTA-54890 |
With the release of the Progress.Collections.HashMap in OpenEdge 12.7 there was a need to re-examine the offerings from the OpenEdge.Core library. In the OpenEdge 12.8 release several base classes have been updated to ensure they are compatible with the Progress.Collections.HashMap through implementation of the IHashable interface. This adds to the previous but unannounced capability to support the Progress.Collections.SortedSet, also available in these same classes.
As part of the ability to support these new collections classes, the OpenEdge.Core.Collections.StringStringMap and OpenEdge.Core.Collections.StringKeyedMap classes have been retrofitted to make use of the new Progress.Collections.HashMap built-in object, rather than reliance on static temp-tables which were used for the initial implementation. A new class OpenEdge.Core.Collections.HashMap was also introduced as a more direct implementation of the ProgressCollections.HashMap while remaining compatible with other OpenEdge.Core.Collections classes though this drops some behavior offered by OpenEdge.Core.Collections.Map through its use of a temp-table for storing the key and value objects. |
| ABLTOOLS | OCTA-51063 |
Behavior Change: Processing of errors in a Business Entity now throws error object with multiple error messages. In previous versions, an object with only the first error message was being thrown. |
| DB | OCTA-57445 |
Startup parameters -minport and -maxport are used to specify the lowest and highest port numbers in a specified range of port numbers accessible to a client. |
| DB | OCTA-44216 |
Support for the smaller database block sizes, 1024 and 2048 kilobytes, is deprecated in OpenEdge 12.7. This applies to creating a new database and starting up existing databases.
When existing databases with the smaller block sizes are recreated with a larger block size they experience less system paging. They also can take advantage of features only available with the larger block sizes, for example large index key entries. |
| Lang | OCTA-52510 |
The fix for OCTA-52510 removes the behavior of Java Open Client which previously skipped the PKI chain validation for the OpenEdge supplied certificates even if the server’s certificate is removed from the Open Client application’s certificate store. Java Open Client performs the PKI chain validation for all certificates, including the default server certificates shipped by OpenEdge. The Java TLS implementation used by Open Client client validation logic now requires all server certificates to be properly signed and the server’s certificate chain to be available in the certificate store used by the Java Open Client application. |
| Lang | OCTA-52510 |
The fix for OCTA-52510 removes the behavior of .NET Open Client that had skipped the PKI chain validation for the OpenEdge supplied certificates. .NET Open Client now performs PKI chain validation for all certificates, including the default server certificates shipped by OpenEdge. .NET Open Client relies on the built-in TLS implementation that is built-into the .NET runtime for HTTPS connections to the OpenEdge application server. The TLS implementation validation logic requires all certificates presented by a server be properly signed and the complete certificate chain for the the server certificate be available. Additionally the ROOT certificate must be installed into the ROOT certificate trust store for the platform. |
| Lang | OCTA-48101 |
Starting with OpenEdge 12.7, when an exception is thrown in .NET Open Client performing a request against the application server, the parameter configuration stored in the ParamArray object are no longer reset if the values remain unmodified from their original assignment prior to executing the application server request. |
| Lang | OCTA-33991 | The fix for OCTA-8410 caused a change in behavior
in the AVM when validating XML and JSON Date, Datetime, and
Datetime-TZ types. The empty string, e.g.
<myDate></myDate> or "myDate"
: "", no longer maps to the unknown value for the
type. Instead, error 20015 is issued for JSON and 20237 for
XML.20015: 20237: To revert the behavior of the above
fix, use the |
| OEM | OCTA-59546 |
In OpenEdge Management(OEM)/OpenEdge Explorer(OEE) 12.8 version, configuring database replication properties does not work as the hyperlinks to edit configuration properties are missing when the Database replication is enabled on a Linux platform. Adding Replication Plugin details in ${DLC}/properties/AdminServerPlugins.properties file addresses this problem as a workaround solution. This problem doesn’t exist when OpenEdge Management(OEM)/OpenEdge Explorer(OEE) 12.8 is installed on a Windows platform.
|
| PASOE | OCTA-58799OCTA-59048 |
In Progress OpenEdge 12.8, agent as client run with TLSv1.3 to SOAP out call can sometimes timeout or result in an ABL session going down. As a workaround if you experience this scenario, either disable session resumption with TLSv1.3 or use TLSv1.2 protocol |
| PASOE | OCTA-56770 |
In Progress OpenEdge 12.8, sslc command helps you to get more details about Providers loaded from OpenSSL 3.1. Launching sslc command outside of proenv environment fails with error or it may respond details only for default provider. Progress recommends you to run sslc within the proenv environment to take it’s full advantage. |
| PASOE | OCTA-53514 |
In OpenEdge 12.8, the encryption and decryption algorithm for \webapps\ROOT\WEB-INF\adapters\rest\runtime.properties file has been replaced with a much more secure and robust algorithm. This is to ensure the utmost protection of the passwords stored on the disk. The OpenEdge used to support “PBEWithMD5AndDES" algorithm which has been replaced with more secured encryption algorithm "PBKDF2WithHmacSHA256" and "AES/GCM/NoPadding”. |
| WebClient | OCTA-59483 |
Webclient codebases can no longer be installed for appserver using SSL if the default test certificate or a certificate with an invalid hostname is used. Currently -nohostverify behavior can not be enabled when codebase files are being downloaded for an OE appserver. |
| WebClient | OCTA-59482 |
A nonadmin user can start an uninstall for webclient that an administrator installed but this will break running webclient application an administrator installed as nonadmin user and will not really uninstall webclient. |
| WebClient | OCTA-59481 |
Webclient version and bits are not displayed in "Add or remove programs" when installed by a nonadmin user. |