[erlang-questions] Patch package OTP 18.3.2 released
vicbaz@REDACTED
vicbaz@REDACTED
Wed Apr 27 20:52:54 CEST 2016
Hello,
When I run
https://github.com/ninenines/cowboy/tree/1.0.4/examples/ssl_hello_world
under OTP-18.3.2 I got 'unknown POSIX error' (see below).
Could someone explain to me what happened?
It works without problem under OTP-18.3.1.
$ ./_rel/ssl_hello_world_example/bin/ssl_hello_world_example console
Exec:
/home/victor/src/cowboy/examples/ssl_hello_world/_rel/ssl_hello_world_example/erts-7.3.1/bin/erlexec
-boot
/home/victor/src/cowboy/examples/ssl_hello_world/_rel/ssl_hello_world_example/releases/1/ssl_hello_world_example
-mode embedded -boot_var ERTS_LIB_DIR
/home/victor/src/cowboy/examples/ssl_hello_world/_rel/ssl_hello_world_example/erts-7.3.1/../lib
-config
/home/victor/src/cowboy/examples/ssl_hello_world/_rel/ssl_hello_world_example/releases/1/sys.config
-args_file
/home/victor/src/cowboy/examples/ssl_hello_world/_rel/ssl_hello_world_example/releases/1/vm.args
-- console
Root:
/home/victor/src/cowboy/examples/ssl_hello_world/_rel/ssl_hello_world_example
/home/victor/src/cowboy/examples/ssl_hello_world/_rel/ssl_hello_world_example
Erlang/OTP 18 [erts-7.3.1] [source] [64-bit] [smp:2:2]
[async-threads:10] [hipe] [kernel-poll:false]
=ERROR REPORT==== 27-Apr-2016::21:43:11 ===
Failed to start Ranch listener https in ranch_ssl:listen([{port,8443},
{cacertfile,
"/home/victor/src/cowboy/examples/ssl_hello_world/_rel/ssl_hello_world_example/lib/ssl_hello_world-1/priv/ssl/cowboy-ca.crt"},
{certfile,
"/home/victor/src/cowboy/examples/ssl_hello_world/_rel/ssl_hello_world_example/lib/ssl_hello_world-1/priv/ssl/server.crt"},
{keyfile,
"/home/victor/src/cowboy/examples/ssl_hello_world/_rel/ssl_hello_world_example/lib/ssl_hello_world-1/priv/ssl/server.key"}])
for reason {options,
{ciphers,
[{ecdhe_ecdsa,
aes_256_gcm,
null,
sha384},
{ecdhe_rsa,
aes_256_gcm,
null,
sha384},
{ecdhe_ecdsa,
aes_256_cbc,
sha384,
sha384},
{ecdhe_rsa,
aes_256_cbc,
sha384,
sha384},
{ecdh_ecdsa,
aes_256_gcm,
null,
sha384},
{ecdh_rsa,
aes_256_gcm,
null,
sha384},
{ecdh_ecdsa,
aes_256_cbc,
sha384,
sha384},
{ecdh_rsa,
aes_256_cbc,
sha384,
sha384},
{dhe_rsa,
aes_256_gcm,
null,
sha384},
{dhe_dss,
aes_256_gcm,
null,
sha384},
{dhe_rsa,
aes_256_cbc,
sha256},
{dhe_dss,
aes_256_cbc,
sha256},
{rsa,
aes_256_gcm,
null,
sha384},
{rsa,
aes_256_cbc,
sha256},
{ecdhe_ecdsa,
aes_128_gcm,
null,
sha256},
{ecdhe_rsa,
aes_128_gcm,
null,
sha256},
{ecdhe_ecdsa,
aes_128_cbc,
sha256,
sha256},
{ecdhe_rsa,
aes_128_cbc,
sha256,
sha256},
{ecdh_ecdsa,
aes_128_gcm,
null,
sha256},
{ecdh_rsa,
aes_128_gcm,
null,
sha256},
{ecdh_ecdsa,
aes_128_cbc,
sha256,
sha256},
{ecdh_rsa,
aes_128_cbc,
sha256,
sha256},
{dhe_rsa,
aes_128_gcm,
null,
sha256},
{dhe_dss,
aes_128_gcm,
null,
sha256},
{dhe_rsa,
aes_128_cbc,
sha256},
{dhe_dss,
aes_128_cbc,
sha256},
{rsa,
aes_128_gcm,
null,
sha256},
{rsa,
aes_128_cbc,
sha256},
{ecdhe_ecdsa,
aes_256_cbc,
sha},
{ecdhe_rsa,
aes_256_cbc,
sha},
{dhe_rsa,
aes_256_cbc,
sha},
{dhe_dss,
aes_256_cbc,
sha},
{ecdh_ecdsa,
aes_256_cbc,
sha},
{ecdh_rsa,
aes_256_cbc,
sha},
{rsa,
aes_256_cbc,
sha},
{ecdhe_ecdsa,
'3des_ede_cbc',
sha},
{ecdhe_rsa,
'3des_ede_cbc',
sha},
{dhe_rsa,
'3des_ede_cbc',
sha},
{dhe_dss,
'3des_ede_cbc',
sha},
{ecdh_ecdsa,
'3des_ede_cbc',
sha},
{ecdh_rsa,
'3des_ede_cbc',
sha},
{rsa,
'3des_ede_cbc',
sha},
{ecdhe_ecdsa,
aes_128_cbc,
sha},
{ecdhe_rsa,
aes_128_cbc,
sha},
{dhe_rsa,
aes_128_cbc,
sha},
{dhe_dss,
aes_128_cbc,
sha},
{ecdh_ecdsa,
aes_128_cbc,
sha},
{ecdh_rsa,
aes_128_cbc,
sha},
{rsa,
aes_128_cbc,
sha},
{dhe_rsa,
des_cbc,
sha},
{rsa,
des_cbc,
sha}]}}
(unknown POSIX error)
Eshell V7.3.1 (abort with ^G)
(ssl_hello_world_example@REDACTED)1>
=INFO REPORT==== 27-Apr-2016::21:43:11 ===
application: ssl_hello_world
exited: {bad_return,
{{ssl_hello_world_app,start,[normal,[]]},
{'EXIT',
{{badmatch,
{error,
{{shutdown,
{failed_to_start_child,ranch_acceptors_sup,
{listen_error,https,
{options,
{ciphers,
[{ecdhe_ecdsa,aes_256_gcm,null,sha384},
{ecdhe_rsa,aes_256_gcm,null,sha384},
{ecdhe_ecdsa,aes_256_cbc,sha384,sha384},
{ecdhe_rsa,aes_256_cbc,sha384,sha384},
{ecdh_ecdsa,aes_256_gcm,null,sha384},
{ecdh_rsa,aes_256_gcm,null,sha384},
{ecdh_ecdsa,aes_256_cbc,sha384,sha384},
{ecdh_rsa,aes_256_cbc,sha384,sha384},
{dhe_rsa,aes_256_gcm,null,sha384},
{dhe_dss,aes_256_gcm,null,sha384},
{dhe_rsa,aes_256_cbc,sha256},
{dhe_dss,aes_256_cbc,sha256},
{rsa,aes_256_gcm,null,sha384},
{rsa,aes_256_cbc,sha256},
{ecdhe_ecdsa,aes_128_gcm,null,sha256},
{ecdhe_rsa,aes_128_gcm,null,sha256},
{ecdhe_ecdsa,aes_128_cbc,sha256,sha256},
{ecdhe_rsa,aes_128_cbc,sha256,sha256},
{ecdh_ecdsa,aes_128_gcm,null,sha256},
{ecdh_rsa,aes_128_gcm,null,sha256},
{ecdh_ecdsa,aes_128_cbc,sha256,sha256},
{ecdh_rsa,aes_128_cbc,sha256,sha256},
{dhe_rsa,aes_128_gcm,null,sha256},
{dhe_dss,aes_128_gcm,null,sha256},
{dhe_rsa,aes_128_cbc,sha256},
{dhe_dss,aes_128_cbc,sha256},
{rsa,aes_128_gcm,null,sha256},
{rsa,aes_128_cbc,sha256},
{ecdhe_ecdsa,aes_256_cbc,sha},
{ecdhe_rsa,aes_256_cbc,sha},
{dhe_rsa,aes_256_cbc,sha},
{dhe_dss,aes_256_cbc,sha},
{ecdh_ecdsa,aes_256_cbc,sha},
{ecdh_rsa,aes_256_cbc,sha},
{rsa,aes_256_cbc,sha},
{ecdhe_ecdsa,'3des_ede_cbc',sha},
{ecdhe_rsa,'3des_ede_cbc',sha},
{dhe_rsa,'3des_ede_cbc',sha},
{dhe_dss,'3des_ede_cbc',sha},
{ecdh_ecdsa,'3des_ede_cbc',sha},
{ecdh_rsa,'3des_ede_cbc',sha},
{rsa,'3des_ede_cbc',sha},
{ecdhe_ecdsa,aes_128_cbc,sha},
{ecdhe_rsa,aes_128_cbc,sha},
{dhe_rsa,aes_128_cbc,sha},
{dhe_dss,aes_128_cbc,sha},
{ecdh_ecdsa,aes_128_cbc,sha},
{ecdh_rsa,aes_128_cbc,sha},
{rsa,aes_128_cbc,sha},
{dhe_rsa,des_cbc,sha},
{rsa,des_cbc,sha}]}}}}},
{child,undefined,
{ranch_listener_sup,https},
{ranch_listener_sup,start_link,
[https,100,ranch_ssl,
[{port,8443},
{cacertfile,
"/home/victor/src/cowboy/examples/ssl_hello_world/_rel/ssl_hello_world_example/lib/ssl_hello_world-1/priv/ssl/cowboy-ca.crt"},
{certfile,
"/home/victor/src/cowboy/examples/ssl_hello_world/_rel/ssl_hello_world_example/lib/ssl_hello_world-1/priv/ssl/server.crt"},
{keyfile,
"/home/victor/src/cowboy/examples/ssl_hello_world/_rel/ssl_hello_world_example/lib/ssl_hello_world-1/priv/ssl/server.key"}],
cowboy_protocol,
[{env,
[{dispatch,
[{'_',[],[{[],[],toppage_handler,[]}]}]}]}]]},
permanent,infinity,supervisor,
[ranch_listener_sup]}}}},
[{ssl_hello_world_app,start,2,
[{file,"src/ssl_hello_world_app.erl"},{line,20}]},
{application_master,start_it_old,4,
[{file,"application_master.erl"},{line,273}]}]}}}}
type: permanent
{"Kernel pid
terminated",application_controller,"{application_start_failure,ssl_hello_world,{bad_return,{{ssl_hello_world_app,start,[normal,[]]},{'EXIT',{{badmatch,{error,{{shutdown,{failed_to_start_child,ranch_acceptors_sup,{listen_error,https,{options,{ciphers,[{ecdhe_ecdsa,aes_256_gcm,null,sha384},{ecdhe_rsa,aes_256_gcm,null,sha384},{ecdhe_ecdsa,aes_256_cbc,sha384,sha384},{ecdhe_rsa,aes_256_cbc,sha384,sha384},{ecdh_ecdsa,aes_256_gcm,null,sha384},{ecdh_rsa,aes_256_gcm,null,sha384},{ecdh_ecdsa,aes_256_cbc,sha384,sha384},{ecdh_rsa,aes_256_cbc,sha384,sha384},{dhe_rsa,aes_256_gcm,null,sha384},{dhe_dss,aes_256_gcm,null,sha384},{dhe_rsa,aes_256_cbc,sha256},{dhe_dss,aes_256_cbc,sha256},{rsa,aes_256_gcm,null,sha384},{rsa,aes_256_cbc,sha256},{ecdhe_ecdsa,aes_128_gcm,null,sha256},{ecdhe_rsa,aes_128_gcm,null,sha256},{ecdhe_ecdsa,aes_128_cbc,sha256,sha256},{ecdhe_rsa,aes_128_cbc,sha256,sha256},{ecdh_ecdsa,aes_128_gcm,null,sha256},{ecdh_rsa,aes_128_gcm,null,sha256},{ecdh_ecdsa,aes_128_cbc,sha256,sha256},{ec
d
h_rsa,aes_128_cbc,sha256,sha256},{dhe_rsa,aes_128_gcm,null,sha256},{dhe_dss,aes_128_gcm,null,sha256},{dhe_rsa,aes_128_cbc,sha256},{dhe_dss,aes_128_cbc,sha256},{rsa,aes_128_gcm,null,sha256},{rsa,aes_128_cbc,sha256},{ecdhe_ecdsa,aes_256_cbc,sha},{ecdhe_rsa,aes_256_cbc,sha},{dhe_rsa,aes_256_cbc,sha},{dhe_dss,aes_256_cbc,sha},{ecdh_ecdsa,aes_256_cbc,sha},{ecdh_rsa,aes_256_cbc,sha},{rsa,aes_256_cbc,sha},{ecdhe_ecdsa,'3des_ede_cbc',sha},{ecdhe_rsa,'3des_ede_cbc',sha},{dhe_rsa,'3des_ede_cbc',sha},{dhe_dss,'3des_ede_cbc',sha},{ecdh_ecdsa,'3des_ede_cbc',sha},{ecdh_rsa,'3des_ede_cbc',sha},{rsa,'3des_ede_cbc',sha},{ecdhe_ecdsa,aes_128_cbc,sha},{ecdhe_rsa,aes_128_cbc,sha},{dhe_rsa,aes_128_cbc,sha},{dhe_dss,aes_128_cbc,sha},{ecdh_ecdsa,aes_128_cbc,sha},{ecdh_rsa,aes_128_cbc,sha},{rsa,aes_128_cbc,sha},{dhe_rsa,des_cbc,sha},{rsa,des_cbc,sha}]}}}}},{child,undefined,{ranch_listener_sup,https},{ranch_listener_sup,start_link,[https,100,ranch_ssl,[{port,8443},{cacertfile,\"/home/victor/src/cowboy/exampl
e
s/ssl_hello_world/_rel/ssl_hello_world_example/lib/ssl_hello_world-1/priv/ssl/cowboy-ca.crt\"},{certfile,\"/home/victor/src/cowboy/examples/ssl_hello_world/_rel/ssl_hello_world_example/lib/ssl_hello_world-1/priv/ssl/server.crt\"},{keyfile,\"/home/victor/src/cowboy/examples/ssl_hello_world/_rel/ssl_hello_world_example/lib/ssl_hello_world-1/priv/ssl/server.key\"}],cowboy_protocol,[{env,[{dispatch,[{'_',[],[{[],[],toppage_handler,[]}]}]}]}]]},permanent,infinity,supervisor,[ranch_listener_sup]}}}},[{ssl_hello_world_app,start,2,[{file,\"src/ssl_hello_world_app.erl\"},{line,20}]},{application_master,start_it_old,4,[{file,\"application_master.erl\"},{line,273}]}]}}}}}"}
Crash dump is being written to: erl_crash.dump...done
On 27/04/16 11:34, Henrik Nord X wrote:
> Patch Package: OTP 18.3.2
> Git Tag: OTP-18.3.2
> Date: 2016-04-27
> Trouble Report Id: OTP-13261, OTP-13510, OTP-13511
> Seq num:
> System: OTP
> Release: 18
> Application: inets-6.2.2, ssl-7.3.1
> Predecessor: OTP 18.3.1
>
> Check out the git tag OTP-18.3.2, and build a full OTP system
> including documentation. Apply one or more applications from this
> build as patches to your installation using the 'otp_patch_apply'
> tool. For information on install requirements, see descriptions for
> each application version below.
>
> ---------------------------------------------------------------------
> --- inets-6.2.2 -----------------------------------------------------
> ---------------------------------------------------------------------
>
> The inets-6.2.2 application can be applied independently of other
> applications on a full OTP 18 installation.
>
> --- Improvements and New Features ---
>
> OTP-13510 Application(s): inets
>
> Add environment information item peer_cert to mod_esi
>
>
> Full runtime dependencies of inets-6.2.2: erts-6.0, kernel-3.0,
> mnesia-4.12, runtime_tools-1.8.14, ssl-5.3.4, stdlib-2.0
>
>
> ---------------------------------------------------------------------
> --- ssl-7.3.1 -------------------------------------------------------
> ---------------------------------------------------------------------
>
> The ssl-7.3.1 application can be applied independently of other
> applications on a full OTP 18 installation.
>
> --- Fixed Bugs and Malfunctions ---
>
> OTP-13511 Application(s): ssl
>
> Corrections to cipher suite handling using the 3 and 4
> tuple format in addition to commit
> 89d7e21cf4ae988c57c8ef047bfe85127875c70c
>
>
> --- Improvements and New Features ---
>
> OTP-13261 Application(s): ssl
>
> Make values for the TLS-1.2 signature_algorithms
> extension configurable
>
>
> Full runtime dependencies of ssl-7.3.1: crypto-3.3, erts-7.0,
> inets-5.10.7, kernel-3.0, public_key-1.0, stdlib-2.0
>
>
> ---------------------------------------------------------------------
> ---------------------------------------------------------------------
> ---------------------------------------------------------------------
>
> _______________________________________________
> erlang-questions mailing list
> erlang-questions@REDACTED
> http://erlang.org/mailman/listinfo/erlang-questions
More information about the erlang-questions
mailing list