Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Conversation

@rmpalomino
Copy link
Collaborator

@rmpalomino rmpalomino commented Oct 30, 2024

  • Pull in lhttpc ssl fixes for later versions of OTP
  • Update Github Actions runners due to GLIBC errors
  • Update dialyzer usage, apply fixes for OTP 26/27+

Resolves #767

The dialyzer checks and unit tests were also run and passed for OTP 19.3.6.13 and OTP 20.3.8.26 by pulling down the erlang:19 and erlang:20 docker images on my local machine, pinning hackney to 1.15.0 and parse_trans to 3.2.0 due to the latest version of parse_trans having a minimum OTP version of 21.

* Pull in lhttpc ssl fixes for later versions of OTP
* There are clashes between expected GLIBC libraries in Github Actions' checkout action and the runner environments that limit the runs to newer versions of OTP
* Dialyzer refactor: wrap with rebar3's dialyzer config and use a rebar3 profile with hackney included for checking, use map/0 type instead of maps:map/0 type
* Stop using split strings that are ambiguous with OTP 27+ triple-quoted strings (only used currently in unit tests)
@carlisom carlisom merged commit d95a275 into master Oct 31, 2024
4 checks passed
@carlisom carlisom deleted the bump_lhttpc branch October 31, 2024 16:54
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Development

Successfully merging this pull request may close these issues.

OTP26 - ssl issue

2 participants