-
Notifications
You must be signed in to change notification settings - Fork 267
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes for OTP 26 #471
Changes for OTP 26 #471
Conversation
I've had basically the same |
I see. I tried bisecting otp between maint-25..OTP-26.0 and digging manually. The failing test cases:
Fails on OTP-26.0-rc1. Have not looked into why.
Fails on OTP-26.0-rc1. Passes on erlang/otp@9e7c030 . Shows that something is going wrong in the handshake, presumably already in
Fixed in PR. OTP changed default verify option in erlang/otp@bb3603d Adding The better long term option is to generate proper TLS data for testing. |
Regarding {verify, verify_none}, this needs to be changed because https://www.erlang.org/patches/otp-26.0#ssl-11.0 |
Yeah, I've been working on this and found the same. I should probably push my current changes up on a branch, even though they still don't pass all the tests. |
|
This uncovered a bug in OTP where dhfile was not read from the ssl options at all. When the above OTP PR is merged, Yaws works on OTP-26+. It is tested on both |
Perhaps it should be renamed to Changes for OTP-26? |
Yes, done. |
* file:pid2name/1 is removed, update yaws_config:fload functions to pass config file name. * Add OTP 26.0, 26.1, and 26.2 to the test matrix. * Make websockets_SUITE:secure_socket pass OTP changed default ssl verify option in commit bb3603db8459e13e9e5f27c4fb46ca59ee8e4a39 ssl: Change client default verify Adding {verify, verify_none} to websockets_SUITE:sslopen/2 makes the test pass, which could be ok short term. The better long term option is to generate proper TLS data for testing. * Remove unused sni_not_available test The test ssl_sni_SUITE:sni_not_available is failing on OTP-26 and it has not been relevant since OTP R7. * Update ssl/mkcert_altname * Update openssl mkcert_altname README and config, use SHA-256 signature algorithm and 2048 bit keys by defualt. * Regenerate certificates and keys alice.sni.example.com-*.pem and yaws.sni.example.com-*.pem. Used SHA-1 signature algorithm, which OTP ssl doesn't allow anymore. This fixes the failing ssl_sni_SUITE tests. Fixes erlyaws#467
Interesting!
I guess this means we either have to wait to merge this until the OTP team issues a patch release containing the fix that we can then add to our Github Actions for testing, or we have to adjust the code to not run certain tests on OTP 26 unless we can determine we're running the patched release or newer. |
Yes I thought about when to merge and possibly handle tests for OTP-26 versions |
Pushed a suggestion on how and when to skip the dhfile tests on broken The OTP ssl dhfile PR is merged, but I don't know what release it will land in. Disabling the tests for other OTP-26 releases. Perhaps patch releases |
Guessing that the fix will be released in the next OTP-26 point release, OTP 26.2.2.
Looks OK to me. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks great, thanks so much for getting it all working!
file:pid2name/1 is removed, update yaws_config:fload functions to pass config file name.
Fixes build breaks with OTP 27 #467
Add OTP 26.0 to the test matrix.