-
Notifications
You must be signed in to change notification settings - Fork 18k
crypto/tls: TestVerifyHostnameResumed consistently failing in longtest builder #32978
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Labels
FrozenDueToAge
release-blocker
Soon
This needs action soon. (recent regressions, service outages, unusual time-sensitive situations)
Testing
An issue that has been verified to require only test changes, not just a test failure.
Milestone
Comments
I can reproduce this on macOS with Go 1.12.6.
|
Change https://golang.org/cl/186239 mentions this issue: |
Change https://golang.org/cl/186277 mentions this issue: |
Change https://golang.org/cl/186279 mentions this issue: |
gopherbot
pushed a commit
that referenced
this issue
Jul 15, 2019
Session resumption is not a reliable TLS behavior: the server can decide to reject a session ticket for a number of reasons, or no reason at all. This makes this non-hermetic test extremely brittle. It's currently broken on the builders for both TLS 1.2 and TLS 1.3, and I could reproduce the issue for TLS 1.3 only. As I was debugging it, it started passing entirely on my machine. In practice, it doesn't get us any coverage as resumption is already tested with the recorded exchange tests, and TestVerifyHostname still provides a smoke test checking that we can in fact talk TLS. Updates #32978 Change-Id: I63505e22ff7704f25ad700d46e4ff14850ba5d3c Reviewed-on: https://go-review.googlesource.com/c/go/+/186239 Run-TryBot: Filippo Valsorda <[email protected]> Reviewed-by: Bryan C. Mills <[email protected]> (cherry-picked from 20e4540) Reviewed-on: https://go-review.googlesource.com/c/go/+/186277 TryBot-Result: Gobot Gobot <[email protected]> Reviewed-by: Dmitri Shuralyov <[email protected]>
gopherbot
pushed a commit
that referenced
this issue
Jul 15, 2019
Session resumption is not a reliable TLS behavior: the server can decide to reject a session ticket for a number of reasons, or no reason at all. This makes this non-hermetic test extremely brittle. It's currently broken on the builders for both TLS 1.2 and TLS 1.3, and I could reproduce the issue for TLS 1.3 only. As I was debugging it, it started passing entirely on my machine. In practice, it doesn't get us any coverage as resumption is already tested with the recorded exchange tests, and TestVerifyHostname still provides a smoke test checking that we can in fact talk TLS. Updates #32978 Change-Id: I63505e22ff7704f25ad700d46e4ff14850ba5d3c Reviewed-on: https://go-review.googlesource.com/c/go/+/186239 Run-TryBot: Filippo Valsorda <[email protected]> Reviewed-by: Bryan C. Mills <[email protected]> (cherry-picked from 20e4540) Reviewed-on: https://go-review.googlesource.com/c/go/+/186279 TryBot-Result: Gobot Gobot <[email protected]> Reviewed-by: Dmitri Shuralyov <[email protected]>
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Labels
FrozenDueToAge
release-blocker
Soon
This needs action soon. (recent regressions, service outages, unusual time-sensitive situations)
Testing
An issue that has been verified to require only test changes, not just a test failure.
crypto/tls.TestVerifyHostnameResumed
is consistently failing in thelinux-amd64-longtest
builder.First failure was at CL 184099, which appears to be unrelated. That suggests some sort of change in a non-hermetic dependency, or perhaps in the builder itself.
Example: https://build.golang.org/log/67d2b12bec6bf70eb818bb3246aee32990ecd9e6
CC @agl
The text was updated successfully, but these errors were encountered: