Age | Commit message (Collapse) | Author |
|
|
|
|
|
Presentation (order, cross-references), not content.
|
|
|
|
|
|
|
|
|
|
This allows it to set transport_data and header, inappropriately so
even.
|
|
|
|
Error can be returned if the service process goes down while
remove_transport is ongoing.
|
|
Broken in commit e28ced7b.
|
|
A watchdog timeout after DPR but before DPA would previously result
in the watchdog restarting the transport.
|
|
Long dead.
|
|
|
|
Callback makes sending of DPR configurable.
|
|
* ia/ssl/prepare-for-release:
ssl: Update vsn.mk and ssl.appup.src for release
|
|
* siri/common_test/ct_netconfc-close-problems:
[common_test] Allow server to terminate netconf session before rpc-reply
[common_test] Ensure process down after ct_netconf:close_session
|
|
|
|
test_server_h will now recognize info_reports written by ct connection
handlers (according to the description in cth_conn_log) and ignore
them as they will be completely handled by by ct_conn_log_h.
Earlier test_server_h would print a tag (testcase name) before
forwarding the report to error_logger_tty_h. This would cause lots of
tags in the log with no info report following (since
error_logger_tty_h did not handle them).
|
|
OTP-10570
ct_netconfc:close_session sometimes returned {error,closed} because
the ssh connection was closed (from the server side) before the
rpc-reply was received by the client. This is normal and can not be
helped. It has been corrected so the return will be 'ok' in this case.
Other error situations will still give {error,Reason}.
|
|
OTP-10510
When starting a named netconf connection directly after stopping one
with the same name, it sometimes failed with 'connection_exists'. This
has been corrected.
|
|
* ia/ssl/terminate-handling/OTP-10574:
ssl: Make sure that the ssl connection process will not hang in terminate function.
ssl: Add default values to emulated socket options in internal record
|
|
function.
Avoid doing gen_tcp/inet socket operations in terminate if socket
is already closed. Call gen_tcp:recv/3 in the "data delivery workaround"
to avoid hanging.
|
|
The absence of the active default values could cause a process leak
|
|
* bjorn/compiler/binary-matching/OTP-10567:
Fix compiler crash for binary matching and a complicated guard
|
|
|
|
* fredrik/ssh-password-conf/OTP-10511:
Ssh appup modifications
Updated appup for ssh
Bumped revision
Removed some testing variables
ssh_opts is now a proper list
After auth rsa and dsa passwords is set to undefined
Removing the password after auth
|
|
|
|
|
|
The gen_fsm:sync_send_all_state_event/3 timout is a client side timeout.
If timeouts are needed we want them to be server side timeouts.
|
|
* fredrik/ssh-quiet-mode/OTP-10429:
Doc for quiet_mode
SSH quiet mode
|
|
|
|
|
|
* anders/diameter/upgrade/OTP-10550:
Allow for no diameter on remote node in connection guard
|
|
* anders/diameter/peer_mapping/OTP-10470:
Document peer_ref() service_info
Use peer_ref() service_info in traffic suite
Add service_info for a peer_ref()
|
|
* anders/diameter/shared_transport/OTP-10443:
Use multiple connections in traffic suite
Implement service_opt() restrict_connections
Document service_opt() restrict_connections
|
|
* anders/diameter/sequence_masks/OTP-10445:
Redo watchdog test suite
Update/clarify some comments
Add reopen message from watchdog
Add options service_info
Add diameter_reg:wait/1
Clarify diameter_transport doc
Remove pre-OTP configure support
Remove obsolete make target
Use sequence masks in test suites
Implement sequence masks
Document sequence masks
|
|
|
|
The compiler would crash when attempting to compile a function
head that did binary matching and had a complex expression using
'andalso' and 'not'.
Noticed-by: José Valim
|
|
|
|
|
|
|
|
|
|
|
|
* fredrik/ssh-use-options-alg/OTP-10498:
Option to ssh:connect {pref_public_key_algs, list()} where you can give the algorithms you want to use
|
|
The guard is against a connection to a given peer already existing but
fails if diameter is not running on a remote node.
Note that the guard itself is to be made configurable in R15B03
(OTP-10493) to allow multiple connections per peer.
|
|
|
|
|
|
This allows a diameter_app callback to retrieve the corresponding
configuration as passed to diameter:add_transport/2.
|
|
|