-
Notifications
You must be signed in to change notification settings - Fork 4.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Release/6.0] Backport test fixes #68332
[Release/6.0] Backport test fixes #68332
Conversation
Tagging subscribers to this area: @dotnet/ncl, @vcsjones Issue DetailsFixes Issue main PR DescriptionCustomer ImpactRegressionTestingRisk
|
There still seem to be some failures, something more needs to be ported:
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM.
thanks for chasing the changes @rzikm
cc: @danmoseley. I'm not sure what is our vision for platform coverage and if there are good reasons why 6.0 tests different OSes than main. But it makes test stability more challenging. |
I'm not aware of any reason we would want to have different coverage on 6.0 vs main, unless it's adding/removing OS support. @agocke thoughts on concern above? |
Keeping the same test coverage as main makes sense to me, aside from differences in platform support (e.g., there was no support for ARM64 in 3.1) |
looks like the queue update did not help (same errors as before), so there must be other issues I found #65120, which changes how we detect support for NULL encryption which may fix the tests |
* update SSL tests to deal better with disabled protocols * Improve detection of Null encryption on Windows * update expectation for Mismatched protocols * update detection * wrap win32 exception * update ProtocolMismatchData sets * remove debug print * final cleanup * generate mismatch data * avoid SslProtocols.Default
0471c3c
to
032eaac
Compare
BTW @rzikm, @wfurt may have mentioned, but there is no central approval required to backport necessary infra/test fixes. When things are green you simply have to make sure the branch is unlocked -- @carlossanlop owns this currently. |
/azp run runtime |
Azure Pipelines successfully started running 1 pipeline(s). |
Test failures are unrelated (see mentions above this comment). @carlossanlop can you merge this? |
Branding was done today, so I can merge now. |
Backports #67935, #68083, #65322, #65105, #65120
Fixes #67946
Description
Backport several test-only changes to fix frequent test failures on CI pipelines.
It was caused (intentionally) by Helix update (https://github.com/dotnet/core-eng/issues/15858)-- which re-enabled older TLS versions on all OS versions (so that we can get better test coverage - once we got exception from security folks). However, Win7 and Server 2022 currently don't support the full range of all TLS versions and we need to react accordingly in what the tests expect on these platforms.
Note: There will be likely follow up Helix changes removing further restrictions on Win7 and/or Server 2022. Those will need as well reactions from us when it happens.
Customer Impact
None, Test only change.
Regression
Yes, introduced by recent Helix changes -- see above.
Testing
See CI report for this PR
Risk
Very low, Test only change.