Age | Commit message (Collapse) | Author |
|
OTP-10570
ct_netconfc:close_session sometimes returned {error,closed} because
the ssh connection was closed (from the server side) before the
rpc-reply was received by the client. This is normal and can not be
helped. It has been corrected so the return will be 'ok' in this case.
Other error situations will still give {error,Reason}.
|
|
OTP-10510
When starting a named netconf connection directly after stopping one
with the same name, it sometimes failed with 'connection_exists'. This
has been corrected.
|
|
* sverk/halfword-valgrind-suppressions:
crypto: Add valgrind suppression for AES_cbc_encrypt
erts: Expand valgrind suppression for zlib
Add extra valgrind suppression file for halfword emulator
|
|
* bjorn/compiler/binary-matching/OTP-10567:
Fix compiler crash for binary matching and a complicated guard
|
|
* rickard/port-sched-bug/OTP-10556:
Fix bug in erts_port_task_schedule()
|
|
* rickard/sched-wakeup/OTP-10476:
Use reduction limit in order to determine when to do wakeup
|
|
|
|
* fredrik/ssh-password-conf/OTP-10511:
Ssh appup modifications
Updated appup for ssh
Bumped revision
Removed some testing variables
ssh_opts is now a proper list
After auth rsa and dsa passwords is set to undefined
Removing the password after auth
|
|
|
|
* lukas/common_test/multi_require_bug/OTP-10572:
Fix bug where require of same name at same config would return name in use
|
|
|
|
* ia/ssl/gen-fsm-timout/OTP-10569:
ssl: Do not use gen_fsm:sync_send_all_state_event/3 timeout
|
|
The gen_fsm:sync_send_all_state_event/3 timout is a client side timeout.
If timeouts are needed we want them to be server side timeouts.
|
|
* fredrik/ssh-quiet-mode/OTP-10429:
Doc for quiet_mode
SSH quiet mode
|
|
|
|
* bjorn/erts/binary-append/OTP-10524:
Fix binary append exceptions
|
|
|
|
|
|
* anders/diameter/upgrade/OTP-10550:
Allow for no diameter on remote node in connection guard
|
|
* anders/diameter/peer_mapping/OTP-10470:
Document peer_ref() service_info
Use peer_ref() service_info in traffic suite
Add service_info for a peer_ref()
|
|
* anders/diameter/shared_transport/OTP-10443:
Use multiple connections in traffic suite
Implement service_opt() restrict_connections
Document service_opt() restrict_connections
|
|
* anders/diameter/sequence_masks/OTP-10445:
Redo watchdog test suite
Update/clarify some comments
Add reopen message from watchdog
Add options service_info
Add diameter_reg:wait/1
Clarify diameter_transport doc
Remove pre-OTP configure support
Remove obsolete make target
Use sequence masks in test suites
Implement sequence masks
Document sequence masks
|
|
|
|
The compiler would crash when attempting to compile a function
head that did binary matching and had a complex expression using
'andalso' and 'not'.
Noticed-by: José Valim
|
|
|
|
* anders/diameter/patch/R15B02/OTP-10555:
vsn -> 1.2.1
Update appup for OTP-10461/10550
Allow for no diameter on remote node in connection guard
Add missing clause for peer failover
|
|
|
|
|
|
anders/diameter/patch/R15B02/OTP-10555
* anders/diameter/patch/R15B02/upgrade/OTP-10550:
Allow for no diameter on remote node in connection guard
|
|
anders/diameter/patch/R15B02/OTP-10555
* anders/diameter/patch/R15B02/failover_error/OTP-10461:
Add missing clause for peer failover
|
|
|
|
The guard is against a connection to a given peer already existing but
fails if diameter is not running on a remote node.
Note that the guard itself is to be made configurable in R15B03
(OTP-10493) to allow multiple connections per peer.
|
|
|
|
|
|
|
|
|
|
* fredrik/ssh-use-options-alg/OTP-10498:
Option to ssh:connect {pref_public_key_algs, list()} where you can give the algorithms you want to use
|
|
Code such as the following should cause an exception:
Bin = <<0:1>>,
<<Bin/binary,...>>
(Because the "binary" type implies that the binary must have a
size in bits that is a multiple of 8.)
Depending on the binary, either no exception was thrown or the
wrong exception was thrown (because c_p->freason was not set).
Noticed-by: Adam Rutkowski
|
|
The guard is against a connection to a given peer already existing but
fails if diameter is not running on a remote node.
Note that the guard itself is to be made configurable in R15B03
(OTP-10493) to allow multiple connections per peer.
|
|
|
|
|
|
This allows a diameter_app callback to retrieve the corresponding
configuration as passed to diameter:add_transport/2.
|
|
|
|
|
|
Configuration will allow relaxation of the guard against multiple
transport connections to the same peer.
|
|
It was broken by sequence masks and can be simplified using (the
new-ish) watchdog events.
|
|
|
|
This makes capabilities available to service_info as soon as
capabilities exchange has been completed. In particular, before state
OKAY is reached.
|
|
To retrieve service_opt() values. Don't document it yet.
|
|
Mostly to use it in the watchdog test suite that's been broken by
sequence masks. Do a bit of cleanup while we're at it.
|