-
Notifications
You must be signed in to change notification settings - Fork 436
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: handle timeouts during tls negotiation for strict
encryption
#1564
Conversation
Codecov Report
@@ Coverage Diff @@
## master #1564 +/- ##
==========================================
+ Coverage 80.45% 80.67% +0.21%
==========================================
Files 92 92
Lines 4692 4709 +17
Branches 871 871
==========================================
+ Hits 3775 3799 +24
+ Misses 644 633 -11
- Partials 273 277 +4
|
@arthurschreiber remove the TDS 7_1 checks against SQL server 2022 since 7_1 suppose not work with SQL server 2022 and it did failing the encrypt tests. We did no run into this because the added encrypt tests are not actually running due to a error within our test. If we still want to keep the 7_1 test run against SQL server 2022 for certain reason, we can also add some logic to skip the tests like that we did in 'should reset Connection'. |
Figured out, that signal.reason can be undefined which causing an additional error if we do tostring and compare it with the error that has been caught see if it include the abort title. However, just err === signal.reason still does not handles the case that :
err is:
both of these will handle the errors correctly, but not exactly a clean solution in my opinion. |
strict
encryption
856e005
to
33ab74b
Compare
@MichaelSun90 I changed the code to check for If the Anyway, hopefully this can be cleaned up via the changes in #1562. |
strict
encryptionstrict
encryption
🎉 This PR is included in version 16.4.1 🎉 The release is available on: Your semantic-release bot 📦🚀 |
Thanks for help on this change, and release it ! 🙇♂️ |
Network socket not correctly cleaned up when connection timeout fires during TDS8.0 TLS negotiation #1558