aboutsummaryrefslogtreecommitdiffstats
path: root/release-notes/OTP-21.3.8.README.txt
blob: 8f12c81a1f73cd7302fa08d7b1bcce7199039b01 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
Patch Package:           OTP 21.3.8
Git Tag:                 OTP-21.3.8
Date:                    2019-05-07
Trouble Report Id:       OTP-14746, OTP-15295, OTP-15717, OTP-15758,
                         OTP-15781, OTP-15785, OTP-15793, OTP-15802
Seq num:                 ERIERL-143, ERIERL-334, ERIERL-337,
                         ERIERL-342, ERIERL-356, ERL-893, ERL-929,
                         ERL-934
System:                  OTP
Release:                 21
Application:             common_test-1.17.2, eldap-1.2.7,
                         erl_interface-3.11.3, erts-10.3.5,
                         public_key-1.6.6, ssl-9.2.3, stdlib-3.8.2
Predecessor:             OTP 21.3.7

 Check out the git tag OTP-21.3.8, and build a full OTP system
 including documentation. Apply one or more applications from this
 build as patches to your installation using the 'otp_patch_apply'
 tool. For information on install requirements, see descriptions for
 each application version below.

 ---------------------------------------------------------------------
 --- POTENTIAL INCOMPATIBILITIES -------------------------------------
 ---------------------------------------------------------------------

  OTP-15717    Application(s): common_test
               Related Id(s): ERIERL-334

               The test result when a hook function fails is in
               general the same as if the function that the hook is
               associated with fails. For example, if
               post_init_per_testcase fails the result is that the
               test case is skipped, as is the case when
               init_per_testcase fails.This, however, was earlier not
               true for timetrap timeouts or other error situations
               where the process running the hook function was killed.
               This is now corrected, so the error handling should be
               the same no matter how the hook function fails.


 ---------------------------------------------------------------------
 --- common_test-1.17.2 ----------------------------------------------
 ---------------------------------------------------------------------

 The common_test-1.17.2 application can be applied independently of
 other applications on a full OTP 21 installation.

 --- Fixed Bugs and Malfunctions ---

  OTP-15717    Application(s): common_test
               Related Id(s): ERIERL-334

               *** POTENTIAL INCOMPATIBILITY ***

               The test result when a hook function fails is in
               general the same as if the function that the hook is
               associated with fails. For example, if
               post_init_per_testcase fails the result is that the
               test case is skipped, as is the case when
               init_per_testcase fails.This, however, was earlier not
               true for timetrap timeouts or other error situations
               where the process running the hook function was killed.
               This is now corrected, so the error handling should be
               the same no matter how the hook function fails.


  OTP-15758    Application(s): common_test
               Related Id(s): ERIERL-342

               In some rare cases, when two common_test nodes used the
               same log directory, a timing problem could occur which
               caused common_test to crash because it's log cache file
               was unexpectedly empty. This is now corrected.


 --- Improvements and New Features ---

  OTP-14746    Application(s): common_test
               Related Id(s): ERIERL-143

               Two new common_test hook functions are introduced:

               post_groups/2, which is called after Suite:groups/0
               post_all/3, which is called after Suite:all/0

               These functions allow modifying the return values from
               the groups/0 and all/0 functions, respectively.

               A new term, {testcase,TestCase,RepeatProperties} is now
               also allowed in the return from all/0. This can be used
               for repeating a single test case a specific number of
               times, or until it fails or succeeds once.


 Full runtime dependencies of common_test-1.17.2: compiler-6.0,
 crypto-3.6, debugger-4.1, erts-7.0, ftp-1.0.0, inets-6.0, kernel-4.0,
 observer-2.1, runtime_tools-1.8.16, sasl-2.4.2, snmp-5.1.2, ssh-4.0,
 stdlib-3.5, syntax_tools-1.7, tools-2.8, xmerl-1.3.8


 ---------------------------------------------------------------------
 --- eldap-1.2.7 -----------------------------------------------------
 ---------------------------------------------------------------------

 The eldap-1.2.7 application can be applied independently of other
 applications on a full OTP 21 installation.

 --- Improvements and New Features ---

  OTP-15785    Application(s): eldap, public_key, ssl
               Related Id(s): ERL-893, ERL-929, PR-2215

               Back port of bug fix ERL-893 from OTP-22 and document
               enhancements that will solve dialyzer warnings for
               users of the ssl application.

               This change also affects public_key, eldap (and inet
               doc).


 Full runtime dependencies of eldap-1.2.7: asn1-3.0, erts-6.0,
 kernel-3.0, ssl-5.3.4, stdlib-2.0


 ---------------------------------------------------------------------
 --- erl_interface-3.11.3 --------------------------------------------
 ---------------------------------------------------------------------

 The erl_interface-3.11.3 application can be applied independently of
 other applications on a full OTP 21 installation.

 --- Fixed Bugs and Malfunctions ---

  OTP-15781    Application(s): erl_interface
               Related Id(s): ERIERL-356

               erl_interface/ei refused to use node names with an
               alive name (the part of the node name preceding the @
               sign) longer than 63 characters and a host name longer
               than 64 characters. The total amount of characters
               allowed in a node name (alivename@hostname) was thus
               limited to 128 characters. These limits applied both to
               the own node name as well as node names of other nodes.
               Ordinary Erlang nodes limit the node name length to 256
               characters, which meant that you could not communicate
               with certain Erlang nodes due to their node name used.

               erl_interface/ei now allow the total amount of
               characters in a node name to be up to 256 characters.
               These characters may be distributed between alive name
               and host name in whatever way needed. That is, the
               maximum amount of characters in the alive name may be
               254 and the maximum amount of characters in the host
               name may be 254, but in total the node name must not
               exceed 256 characters.


 ---------------------------------------------------------------------
 --- erts-10.3.5 -----------------------------------------------------
 ---------------------------------------------------------------------

 Note! The erts-10.3.5 application *cannot* be applied independently
       of other applications on an arbitrary OTP 21 installation.

       On a full OTP 21 installation, also the following runtime
       dependencies have to be satisfied:
       -- kernel-6.1 (first satisfied in OTP 21.1)
       -- sasl-3.3 (first satisfied in OTP 21.2)


 --- Fixed Bugs and Malfunctions ---

  OTP-15793    Application(s): erts
               Related Id(s): ERIERL-337, OTP-15709

               Fixed more bugs in process_info(reductions) causing it
               to sometimes behave non-monotonic. That is, a
               subsequent call toward the same process could return a
               lower reduction value.


 Full runtime dependencies of erts-10.3.5: kernel-6.1, sasl-3.3,
 stdlib-3.5


 ---------------------------------------------------------------------
 --- public_key-1.6.6 ------------------------------------------------
 ---------------------------------------------------------------------

 The public_key-1.6.6 application can be applied independently of
 other applications on a full OTP 21 installation.

 --- Improvements and New Features ---

  OTP-15785    Application(s): eldap, public_key, ssl
               Related Id(s): ERL-893, ERL-929, PR-2215

               Back port of bug fix ERL-893 from OTP-22 and document
               enhancements that will solve dialyzer warnings for
               users of the ssl application.

               This change also affects public_key, eldap (and inet
               doc).


 Full runtime dependencies of public_key-1.6.6: asn1-3.0, crypto-3.8,
 erts-6.0, kernel-3.0, stdlib-3.5


 ---------------------------------------------------------------------
 --- ssl-9.2.3 -------------------------------------------------------
 ---------------------------------------------------------------------

 The ssl-9.2.3 application can be applied independently of other
 applications on a full OTP 21 installation.

 --- Fixed Bugs and Malfunctions ---

  OTP-15802    Application(s): ssl
               Related Id(s): ERL-934

               Missing check of size of user_data_buffer made internal
               socket behave as an active socket instead of active N.
               This could cause memory problems.


 --- Improvements and New Features ---

  OTP-15785    Application(s): eldap, public_key, ssl
               Related Id(s): ERL-893, ERL-929, PR-2215

               Back port of bug fix ERL-893 from OTP-22 and document
               enhancements that will solve dialyzer warnings for
               users of the ssl application.

               This change also affects public_key, eldap (and inet
               doc).


 Full runtime dependencies of ssl-9.2.3: crypto-4.2, erts-10.0,
 inets-5.10.7, kernel-6.0, public_key-1.5, stdlib-3.5


 ---------------------------------------------------------------------
 --- stdlib-3.8.2 ----------------------------------------------------
 ---------------------------------------------------------------------

 The stdlib-3.8.2 application can be applied independently of other
 applications on a full OTP 21 installation.

 --- Fixed Bugs and Malfunctions ---

  OTP-15295    Application(s): stdlib

               A bug in gen_statem has been fixed where the internal
               timeout message could arrive as an info to the callback
               module during high load due to incorrect use of
               asynchronous timer cancel.


 Full runtime dependencies of stdlib-3.8.2: compiler-5.0, crypto-3.3,
 erts-10.0, kernel-6.0, sasl-3.0


 ---------------------------------------------------------------------
 ---------------------------------------------------------------------
 ---------------------------------------------------------------------