Am 30.03.26 um 18:21 schrieb Mark Thomas:
The proposed Apache Tomcat 11.0.21 release is now available for voting.

The notable changes compared to 11.0.20 include:

- Fix a bug in the non-blocking flushing code for NIO+TLS that meant
   that a response may not have been fully written until the connection
   was closed. Pull request 966 provided by Phil Clay.

- Improved HTTP/2 error handling

- Better error handling for the EncryptInterceptor

For full details, see the change log:
https://nightlies.apache.org/tomcat/tomcat-11.0.x/docs/changelog.html

Applications that run on Tomcat 9 and earlier will not run on Tomcat 11 without changes. Java EE applications designed for Tomcat 9 and earlier may be placed in the $CATALINA_BASE/webapps-javaee directory and Tomcat will automatically convert them to Jakarta EE and copy them to the webapps directory. Applications using deprecated APIs may require further changes.

It can be obtained from:
https://dist.apache.org/repos/dist/dev/tomcat/tomcat-11/v11.0.21/

The Maven staging repo is:
https://repository.apache.org/content/repositories/orgapachetomcat-1586

The tag is:
https://github.com/apache/tomcat/tree/11.0.21
1d6b501b493c11ee6fdebae911c67ca214e28c82

The proposed 11.0.21 release is:
[ ] -1 Broken - do not release
[X] +1 Stable - go ahead and release as 11.0.21

+1 to release.

Reproducibility of the build checked (including the Windows installer) using "ant verify-release" on Linux Mint 22.3. OK after setting LANG.

Original Windows installer signature verified with osslsigncode 2.10.

Unit tests ran on platforms

- RHEL 7, 8, 9 and 10 and SLES 12 and 15

using

- recent patch versions of JDK 17, 21, 25, 26 and 27 (EA)

from

- Eclipse Adoptium, Azul Zulu, Amazon Coretto, Oracle, RedHat and from OpenJDK for 27

where available.

Also tested with

- tcnative 1.3.7, 2.0.14 and panama
  - tcnative including post-release memory leak patches

based on

- OpenSSL 3.0.19, 3.5.5, 3.6.1 and 4.0.0-beta1 (for tcnative 2 and panama)
  - OpenSSL containing one post-release patch for 3.5 and 3.6.

Test observations:

  - only JDK 27 on RHEL has not yet fully finished

  - IMHO nothing critical

  - TestOcspEnabled no longer fails when using panama,

  - TestOcspSoftFailTryLater frequent failures fixed
    Remaining only 3 failure instances, sporadic, all jsse JDK 17 NIO2:
      - Zulu 17 SLES 15
      - Zulu 17 RHEL 8
      - Coretto 17 RHEL 8
Testcase: test[JSSE with OpenSSL trust false: softFail false, clientOk true] took 0.2... sec
        Caused an ERROR
Error writing to server
java.io.IOException: Error writing to server
at java.base/sun.net.www.protocol.http.HttpURLConnection.writeRequests(HttpURLConnection.java:776)
...
at java.base/sun.net.www.protocol.https.HttpsURLConnectionImpl.getResponseCode(HttpsURLConnectionImpl.java:308) at org.apache.catalina.startup.TomcatBaseTest.methodUrl(TomcatBaseTest.java:709) at org.apache.catalina.startup.TomcatBaseTest.getUrl(TomcatBaseTest.java:660)

- TestOcspEnabled very sporadically (2 times) failed when using tcnative and JDK25+, this time only on RHEL 10 with NIO and tcnative-1.3.7 and OpenSSL 3.0

Testcase: test[JSSE with OpenSSL trust false: clientOk false, serverOk false, verifyClient DEFAULT, verifyServer false] took 6.562 sec
        FAILED
Handshake failed when not expected to do so.
junit.framework.AssertionFailedError: Handshake failed when not expected to do so. at org.apache.tomcat.util.net.ocsp.TestOcspEnabled.test(TestOcspEnabled.java:117)


  - in addition
    - very few crashes with tcnative (11 in 744 runs)
- two crashes with JSSE (in 107 runs, org.apache.catalina.startup.TestTomcatStandalone)
    - very few failures with jsse (5 in 107 runs)
    - very few non-crash-failures with tcnative (1 in 744 runs)

Thanks for RM!

Best regards,

Rainer


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to