1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
|
Patch Package: OTP 21.3.8
Git Tag: OTP-21.3.8
Date: 2019-05-07
Trouble Report Id: OTP-14746, OTP-15295, OTP-15717, OTP-15758,
OTP-15781, OTP-15785, OTP-15793, OTP-15802
Seq num: ERIERL-143, ERIERL-334, ERIERL-337,
ERIERL-342, ERIERL-356, ERL-893, ERL-929,
ERL-934
System: OTP
Release: 21
Application: common_test-1.17.2, eldap-1.2.7,
erl_interface-3.11.3, erts-10.3.5,
public_key-1.6.6, ssl-9.2.3, stdlib-3.8.2
Predecessor: OTP 21.3.7
Check out the git tag OTP-21.3.8, and build a full OTP system
including documentation. Apply one or more applications from this
build as patches to your installation using the 'otp_patch_apply'
tool. For information on install requirements, see descriptions for
each application version below.
---------------------------------------------------------------------
--- POTENTIAL INCOMPATIBILITIES -------------------------------------
---------------------------------------------------------------------
OTP-15717 Application(s): common_test
Related Id(s): ERIERL-334
The test result when a hook function fails is in
general the same as if the function that the hook is
associated with fails. For example, if
post_init_per_testcase fails the result is that the
test case is skipped, as is the case when
init_per_testcase fails.This, however, was earlier not
true for timetrap timeouts or other error situations
where the process running the hook function was killed.
This is now corrected, so the error handling should be
the same no matter how the hook function fails.
---------------------------------------------------------------------
--- common_test-1.17.2 ----------------------------------------------
---------------------------------------------------------------------
The common_test-1.17.2 application can be applied independently of
other applications on a full OTP 21 installation.
--- Fixed Bugs and Malfunctions ---
OTP-15717 Application(s): common_test
Related Id(s): ERIERL-334
*** POTENTIAL INCOMPATIBILITY ***
The test result when a hook function fails is in
general the same as if the function that the hook is
associated with fails. For example, if
post_init_per_testcase fails the result is that the
test case is skipped, as is the case when
init_per_testcase fails.This, however, was earlier not
true for timetrap timeouts or other error situations
where the process running the hook function was killed.
This is now corrected, so the error handling should be
the same no matter how the hook function fails.
OTP-15758 Application(s): common_test
Related Id(s): ERIERL-342
In some rare cases, when two common_test nodes used the
same log directory, a timing problem could occur which
caused common_test to crash because it's log cache file
was unexpectedly empty. This is now corrected.
--- Improvements and New Features ---
OTP-14746 Application(s): common_test
Related Id(s): ERIERL-143
Two new common_test hook functions are introduced:
post_groups/2, which is called after Suite:groups/0
post_all/3, which is called after Suite:all/0
These functions allow modifying the return values from
the groups/0 and all/0 functions, respectively.
A new term, {testcase,TestCase,RepeatProperties} is now
also allowed in the return from all/0. This can be used
for repeating a single test case a specific number of
times, or until it fails or succeeds once.
Full runtime dependencies of common_test-1.17.2: compiler-6.0,
crypto-3.6, debugger-4.1, erts-7.0, ftp-1.0.0, inets-6.0, kernel-4.0,
observer-2.1, runtime_tools-1.8.16, sasl-2.4.2, snmp-5.1.2, ssh-4.0,
stdlib-3.5, syntax_tools-1.7, tools-2.8, xmerl-1.3.8
---------------------------------------------------------------------
--- eldap-1.2.7 -----------------------------------------------------
---------------------------------------------------------------------
The eldap-1.2.7 application can be applied independently of other
applications on a full OTP 21 installation.
--- Improvements and New Features ---
OTP-15785 Application(s): eldap, public_key, ssl
Related Id(s): ERL-893, ERL-929, PR-2215
Back port of bug fix ERL-893 from OTP-22 and document
enhancements that will solve dialyzer warnings for
users of the ssl application.
This change also affects public_key, eldap (and inet
doc).
Full runtime dependencies of eldap-1.2.7: asn1-3.0, erts-6.0,
kernel-3.0, ssl-5.3.4, stdlib-2.0
---------------------------------------------------------------------
--- erl_interface-3.11.3 --------------------------------------------
---------------------------------------------------------------------
The erl_interface-3.11.3 application can be applied independently of
other applications on a full OTP 21 installation.
--- Fixed Bugs and Malfunctions ---
OTP-15781 Application(s): erl_interface
Related Id(s): ERIERL-356
erl_interface/ei refused to use node names with an
alive name (the part of the node name preceding the @
sign) longer than 63 characters and a host name longer
than 64 characters. The total amount of characters
allowed in a node name (alivename@hostname) was thus
limited to 128 characters. These limits applied both to
the own node name as well as node names of other nodes.
Ordinary Erlang nodes limit the node name length to 256
characters, which meant that you could not communicate
with certain Erlang nodes due to their node name used.
erl_interface/ei now allow the total amount of
characters in a node name to be up to 256 characters.
These characters may be distributed between alive name
and host name in whatever way needed. That is, the
maximum amount of characters in the alive name may be
254 and the maximum amount of characters in the host
name may be 254, but in total the node name must not
exceed 256 characters.
---------------------------------------------------------------------
--- erts-10.3.5 -----------------------------------------------------
---------------------------------------------------------------------
Note! The erts-10.3.5 application *cannot* be applied independently
of other applications on an arbitrary OTP 21 installation.
On a full OTP 21 installation, also the following runtime
dependencies have to be satisfied:
-- kernel-6.1 (first satisfied in OTP 21.1)
-- sasl-3.3 (first satisfied in OTP 21.2)
--- Fixed Bugs and Malfunctions ---
OTP-15793 Application(s): erts
Related Id(s): ERIERL-337, OTP-15709
Fixed more bugs in process_info(reductions) causing it
to sometimes behave non-monotonic. That is, a
subsequent call toward the same process could return a
lower reduction value.
Full runtime dependencies of erts-10.3.5: kernel-6.1, sasl-3.3,
stdlib-3.5
---------------------------------------------------------------------
--- public_key-1.6.6 ------------------------------------------------
---------------------------------------------------------------------
The public_key-1.6.6 application can be applied independently of
other applications on a full OTP 21 installation.
--- Improvements and New Features ---
OTP-15785 Application(s): eldap, public_key, ssl
Related Id(s): ERL-893, ERL-929, PR-2215
Back port of bug fix ERL-893 from OTP-22 and document
enhancements that will solve dialyzer warnings for
users of the ssl application.
This change also affects public_key, eldap (and inet
doc).
Full runtime dependencies of public_key-1.6.6: asn1-3.0, crypto-3.8,
erts-6.0, kernel-3.0, stdlib-3.5
---------------------------------------------------------------------
--- ssl-9.2.3 -------------------------------------------------------
---------------------------------------------------------------------
The ssl-9.2.3 application can be applied independently of other
applications on a full OTP 21 installation.
--- Fixed Bugs and Malfunctions ---
OTP-15802 Application(s): ssl
Related Id(s): ERL-934
Missing check of size of user_data_buffer made internal
socket behave as an active socket instead of active N.
This could cause memory problems.
--- Improvements and New Features ---
OTP-15785 Application(s): eldap, public_key, ssl
Related Id(s): ERL-893, ERL-929, PR-2215
Back port of bug fix ERL-893 from OTP-22 and document
enhancements that will solve dialyzer warnings for
users of the ssl application.
This change also affects public_key, eldap (and inet
doc).
Full runtime dependencies of ssl-9.2.3: crypto-4.2, erts-10.0,
inets-5.10.7, kernel-6.0, public_key-1.5, stdlib-3.5
---------------------------------------------------------------------
--- stdlib-3.8.2 ----------------------------------------------------
---------------------------------------------------------------------
The stdlib-3.8.2 application can be applied independently of other
applications on a full OTP 21 installation.
--- Fixed Bugs and Malfunctions ---
OTP-15295 Application(s): stdlib
A bug in gen_statem has been fixed where the internal
timeout message could arrive as an info to the callback
module during high load due to incorrect use of
asynchronous timer cancel.
Full runtime dependencies of stdlib-3.8.2: compiler-5.0, crypto-3.3,
erts-10.0, kernel-6.0, sasl-3.0
---------------------------------------------------------------------
---------------------------------------------------------------------
---------------------------------------------------------------------
|