New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[WFCORE-4842] Add tests for TLS 1.3 that make use of the OpenSSL TLS provider #4271
Conversation
Core - Full Integration Build 9796 outcome was FAILURE using a merge of e7c9e19 Failed tests
|
Core - Full Integration Build 9798 outcome was FAILURE using a merge of 23ea462 |
Core - Full Integration Build 9763 outcome was FAILURE using a merge of 23ea462 |
Core - Full Integration Build 9764 outcome was FAILURE using a merge of 411be6c |
Core - Full Integration Build 9799 outcome was FAILURE using a merge of 411be6c |
Core - Full Integration Build 9800 outcome was FAILURE using a merge of 16a6936 Failed tests
|
There has been no activity on this PR for 30 days. It will be auto-closed after 90 days. |
This PR is awaiting the RFE process to be merged. |
…he WildFly OpenSSL provider
Just FYI, this one has been pre-checked and depends on #4329. |
Assume.assumeTrue("Skipping testSslServiceAuthProtocolMismatch, test is not being run on JDK 11.", | ||
System.getProperty("java.specification.version").equals("11")); | ||
Assume.assumeTrue("Skipping testSslServiceAuthProtocolMismatch, test is not being run on JDK 11+.", | ||
JdkUtils.getJavaSpecVersion() >= 11); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@fjuma, just noticed - isn't here missing the && isOpenSSL111OrHigher()
part here? There is client using TLS13 two lines down...
Of course not - it's not OpenSSL in use. Ignore this comment :)
FYI I have removed the feature label as at this point in time this is now just test cases for an already merged feature. |
https://issues.redhat.com/browse/WFCORE-4842
https://issues.redhat.com/browse/EAP7-1414
To pass CI, this will require a WildFly OpenSSL upgrade but this is ready to be reviewed.
Analysis document: wildfly/wildfly-proposals#288
WildFly PR with documentation: wildfly/wildfly#13414
Depends on: wildfly-security/wildfly-openssl#81