-
Notifications
You must be signed in to change notification settings - Fork 6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Release 1.0.0 also leaks tmp files on refresh of page due to renderer #4
Comments
Not using the hashCode but the StringEncrypter utility class which is also used from PrimeFaces 4.x on. (copied from PrimeFaces 4.x as not present in 3.4 and 3.5) |
In the end the original expression that I proposed for generating the Id based on clientId and value expression revealed itself not to be good enough because it is too deterministic for a given veiw. |
When I was using the clientId_expression to generate the id and faced the problem on the page refresh, then the following was the commit that fixed the issue. Where the following method kind of illustrates the fix mentioned in the above post. '''
|
HI,
The process by which the renderer generates a unique id on the 1.0.0 branch also leaks to tmp file leakage, where each referesh of the page will lead for a new RID to be produced for an empty file.
I've presently fixed this by doing the following.
String id = String.format("%1$s_%2$s", image.getClientId(), image.getValueExpression("value")
.getExpressionString());
String rid = String.valueOf(id.hashCode());
The text was updated successfully, but these errors were encountered: