From beac669a066f3d8936c392976531a0070ce93c63 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Lo=C3=AFc=20Hoguin?= Date: Mon, 22 Apr 2019 21:56:53 +0200 Subject: Use ssl:ssl_accept/2 in tests to support OTP 20+ ssl:handshake/2 was introduced in OTP 21. --- src/gun_tls_proxy.erl | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) (limited to 'src/gun_tls_proxy.erl') diff --git a/src/gun_tls_proxy.erl b/src/gun_tls_proxy.erl index 123a156..d66e91c 100644 --- a/src/gun_tls_proxy.erl +++ b/src/gun_tls_proxy.erl @@ -41,6 +41,10 @@ -module(gun_tls_proxy). -behaviour(gen_statem). +-ifdef(OTP_RELEASE). +-compile({nowarn_deprecated_function, [{ssl, ssl_accept, 2}]}). +-endif. + %% Gun-specific interface. -export([start_link/6]). @@ -416,7 +420,7 @@ do_proxy_init(Parent, Host, Port) -> {ok, {_, ListenPort}} = ssl:sockname(ListenSocket), Parent ! {self(), ListenPort}, {ok, ClientSocket} = ssl:transport_accept(ListenSocket, 10000), - {ok, _} = ssl:handshake(ClientSocket, 10000), + ok = ssl:ssl_accept(ClientSocket, 10000), {ok, OriginSocket} = gen_tcp:connect( Host, Port, [binary, {active, false}]), -- cgit v1.2.3