-
Notifications
You must be signed in to change notification settings - Fork 147
8311546: Certificate name constraints improperly validated with leading period #1268
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
👋 Welcome back shade! A progress list of the required criteria for merging this PR into |
|
@shipilev This change now passes all automated pre-integration checks. ℹ️ This project also has non-automated pre-integration requirements. Please see the file CONTRIBUTING.md for details. After integration, the commit message for the final commit will be: You can use pull request commands such as /summary, /contributor and /issue to adjust it as needed. At the time when this comment was updated there had been 79 new commits pushed to the
As there are no conflicts, your changes will automatically be rebased on top of these commits when integrating. If you prefer to avoid this automatic rebasing, please check the documentation for the /integrate command for further details. ➡️ To integrate this PR with the above commit message to the |
|
This backport pull request has now been updated with issue from the original commit. |
Webrevs
|
|
/issue add JDK-8320372 |
|
@shipilev |
|
Both backports are actually clean. /clean |
|
@shipilev The |
:( Ok, then I need some reviews, please. |
simonis
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good.
Just for my education: is it now common/recommended to bundle several downports into a single PR? From my memory (which might be outdated) we used dependent PRs for that purpose. The latter is obviously more complicated and work intensive so I'll probably follow your style in the future if that's OK?
|
|
Thanks!
I think we prefer multi-issue backports if we know there are breakages that are fixed by follow-up changes. This would introduce an atomic commit that would transit the repository from a good state to a good state, without exposing any known bad state in between. This is both cleaner and more convenient for eventual bisects. |
|
Yes, I also combine changes with immediate fixes. Especially if one of them needs a review anyways, so it does not cause an unnecessary review. |
|
I finally figured out why regression test is not working: JDK-8347424 -- I think I'll wait for that and mix the fix here. |
|
/issue add JDK-8347424 |
|
@shipilev |
|
Thanks for reviews! I mixed in the test rewrite that fixes the regression test. Now I can confirm that retracting the product fix shows up as new regression test failure. Unfortunately, this invalidates prior reviews, please review again. |
simonis
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Still good! Thanks.
|
/approval 8311546 request Fixes the compatibility bug in certificate checking. Seen in the wild. The patch was in JDK 22 without product bugtail. The only problems are with the test, which requires additional followups, JDK-8320372, JDK-8347424. Applies cleanly, all tests pass, new test fails without a fix, passes with it. Risk is medium-low: touches certpath code, but the fix is simple and already shipping in existing JDKs. /approval 8320372 request Fixes the test introduced by JDK-8311546. Applies cleanly, test passes. Risk is low: Test-only change, the patch was in JDK 22. /approval 8347424 request Fixes the test introduced by JDK-8311546. Applies cleanly, test passes. Risk is medium-low: Test-only change, but only a recent one, so there might be follow-up test bugs later. |
|
Thanks for reviews! /integrate |
|
Going to push as commit 99a9299.
Your commit was automatically rebased without conflicts. |
Backporting this due to wider customer interest in aligning JDK behavior with other SSL implementations. Both patches apply cleanly. First patch does the fix. Second patch fixes the test.
Additional testing:
sun/security/x509/jdk_securityProgress
Issues
Reviewers
Reviewing
Using
gitCheckout this PR locally:
$ git fetch https://git.openjdk.org/jdk21u-dev.git pull/1268/head:pull/1268$ git checkout pull/1268Update a local copy of the PR:
$ git checkout pull/1268$ git pull https://git.openjdk.org/jdk21u-dev.git pull/1268/headUsing Skara CLI tools
Checkout this PR locally:
$ git pr checkout 1268View PR using the GUI difftool:
$ git pr show -t 1268Using diff file
Download this PR as a diff file:
https://git.openjdk.org/jdk21u-dev/pull/1268.diff
Using Webrev
Link to Webrev Comment