Update JDK12 and 13 to latest EA releases. (#8809)
Motivation: We use outdated EA releases when building and testing with JDK 12 and 13. Modifications: - Update versions. - Add workaround for possible JDK12+ bug. Result: Use latest releases
This commit is contained in:
parent
94c33936db
commit
0d37b06bc8
@ -7,7 +7,7 @@ services:
|
|||||||
build:
|
build:
|
||||||
args:
|
args:
|
||||||
centos_version : "6"
|
centos_version : "6"
|
||||||
java_version : "openjdk@1.12.0-27"
|
java_version : "openjdk@1.12.0"
|
||||||
|
|
||||||
test:
|
test:
|
||||||
image: netty:centos-6-1.12
|
image: netty:centos-6-1.12
|
||||||
|
@ -7,7 +7,7 @@ services:
|
|||||||
build:
|
build:
|
||||||
args:
|
args:
|
||||||
centos_version : "6"
|
centos_version : "6"
|
||||||
java_version : "openjdk@1.13.0-3"
|
java_version : "openjdk@1.13.0-9"
|
||||||
|
|
||||||
test:
|
test:
|
||||||
image: netty:centos-6-1.13
|
image: netty:centos-6-1.13
|
||||||
|
@ -7,7 +7,7 @@ services:
|
|||||||
build:
|
build:
|
||||||
args:
|
args:
|
||||||
centos_version : "7"
|
centos_version : "7"
|
||||||
java_version : "openjdk@1.12.0-27"
|
java_version : "openjdk@1.12.0"
|
||||||
|
|
||||||
test:
|
test:
|
||||||
image: netty:centos-7-1.12
|
image: netty:centos-7-1.12
|
||||||
|
@ -7,7 +7,7 @@ services:
|
|||||||
build:
|
build:
|
||||||
args:
|
args:
|
||||||
centos_version : "7"
|
centos_version : "7"
|
||||||
java_version : "openjdk@1.13.0-3"
|
java_version : "openjdk@1.13.0-9"
|
||||||
|
|
||||||
test:
|
test:
|
||||||
image: netty:centos-7-1.13
|
image: netty:centos-7-1.13
|
||||||
|
@ -2206,7 +2206,14 @@ public abstract class SSLEngineTest {
|
|||||||
|
|
||||||
assertEquals(SSLEngineResult.Status.CLOSED, result.getStatus());
|
assertEquals(SSLEngineResult.Status.CLOSED, result.getStatus());
|
||||||
// Need an UNWRAP to read the response of the close_notify
|
// Need an UNWRAP to read the response of the close_notify
|
||||||
assertEquals(SSLEngineResult.HandshakeStatus.NEED_UNWRAP, result.getHandshakeStatus());
|
if (PlatformDependent.javaVersion() >= 12 && sslClientProvider() == SslProvider.JDK) {
|
||||||
|
// This is a workaround for a possible JDK12+ bug.
|
||||||
|
//
|
||||||
|
// See http://mail.openjdk.java.net/pipermail/security-dev/2019-February/019406.html.
|
||||||
|
assertEquals(SSLEngineResult.HandshakeStatus.NOT_HANDSHAKING, result.getHandshakeStatus());
|
||||||
|
} else {
|
||||||
|
assertEquals(SSLEngineResult.HandshakeStatus.NEED_UNWRAP, result.getHandshakeStatus());
|
||||||
|
}
|
||||||
|
|
||||||
int produced = result.bytesProduced();
|
int produced = result.bytesProduced();
|
||||||
int consumed = result.bytesConsumed();
|
int consumed = result.bytesConsumed();
|
||||||
|
Loading…
Reference in New Issue
Block a user