Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Conversation

@IngelaAndin
Copy link
Contributor

Optimization commit 28f7e80 broke max_fragment_length handling, that is the TLS sender lost its knowledge of the maximum fragment length.

Make TLS sender process aware of it in the cases it is negotiated, for default maximum we do not need to store it in the connection state.

Closes #10191

@IngelaAndin IngelaAndin force-pushed the ingela/ssl/max-frag-len/OTP-19774 branch from 11be4f9 to 538178c Compare September 16, 2025 10:44
@IngelaAndin IngelaAndin added the team:PS Assigned to OTP team PS label Sep 16, 2025
@IngelaAndin IngelaAndin force-pushed the ingela/ssl/max-frag-len/OTP-19774 branch 2 times, most recently from 2a08c91 to c969142 Compare September 16, 2025 10:53
@github-actions
Copy link
Contributor

github-actions bot commented Sep 16, 2025

CT Test Results

    38 files   1 006 suites   7h 23m 10s ⏱️
12 568 tests 11 764 ✅   802 💤 2 ❌
26 986 runs  24 840 ✅ 2 144 💤 2 ❌

For more details on these failures, see this check.

Results for commit 0d8cf06.

♻️ This comment has been updated with latest results.

To speed up review, make sure that you have read Contributing to Erlang/OTP and that all checks pass.

See the TESTING and DEVELOPMENT HowTo guides for details about how to run test locally.

Artifacts

// Erlang/OTP Github Action Bot

@IngelaAndin IngelaAndin self-assigned this Sep 16, 2025
@IngelaAndin IngelaAndin force-pushed the ingela/ssl/max-frag-len/OTP-19774 branch from c969142 to 570685f Compare September 16, 2025 12:12
@IngelaAndin IngelaAndin requested a review from dgud September 16, 2025 13:21
@IngelaAndin IngelaAndin force-pushed the ingela/ssl/max-frag-len/OTP-19774 branch from 570685f to dde2b54 Compare September 16, 2025 14:21
@IngelaAndin IngelaAndin requested a review from dgud September 16, 2025 14:24
dgud
dgud previously approved these changes Sep 16, 2025
Copy link
Contributor

@dgud dgud left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nice.

@IngelaAndin IngelaAndin added the full-build-and-check Run a more thorough testing of this PR label Sep 16, 2025
Optimization commit 28f7e80
broke max_fragment_length handling, that is the TLS sender
lost its knowledge of the maximum fragment length.

Make TLS sender process aware of it in the cases it is negotiated,
for default maximum we do not need to store it in the connection state.

Closes erlang#10191
@IngelaAndin IngelaAndin force-pushed the ingela/ssl/max-frag-len/OTP-19774 branch from dde2b54 to 0d8cf06 Compare September 16, 2025 14:54
@IngelaAndin IngelaAndin removed the full-build-and-check Run a more thorough testing of this PR label Sep 16, 2025
@IngelaAndin IngelaAndin requested a review from dgud September 16, 2025 14:56
@IngelaAndin IngelaAndin merged commit d7434b1 into erlang:maint Sep 17, 2025
127 of 170 checks passed
@zmstone
Copy link
Contributor

zmstone commented Sep 18, 2025

Thanks for the fix. Since this PR is fixing a regression that was introduced during an optimization, could you please add a test case that covers this scenario?

Without a regression test, we risk the same issue creeping back in the future when performance-related changes are made again. A targeted test would both validate this fix and serve as protection against similar regressions.

@IngelaAndin
Copy link
Contributor Author

Yes we will be adding a regression test. We are working on some property based tests where this is easy to test, this is not ready for production yet. It could be possible with an awkward white-box test but we will put our efforts into the property based test instead, so it is coming.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

team:PS Assigned to OTP team PS

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants