You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
For a list of all known issues, visit our [Issue Tracker](https://tickets.puppet.com/browse/SERVER).
8
-
9
-
## Cipher updates in Puppet Server 6.5
10
-
11
-
Puppet Server 6.5 includes an upgrade to the latest release of Jetty's 9.4 series. With this update, you may see "weak cipher" warnings about ciphers that were previously enabled by default. Puppet Server now
12
-
defaults to stronger FIPS-compliant ciphers, but you must first remove the weak ciphers.
13
-
14
-
The ciphers previously enabled by default have not been changed, but are considered weak by the updated standards. Remove the weak ciphers by removing the `cipher-suite` configuration section from the
15
-
`webserver.conf`. After you remove the `cipher-suite`, Puppet Server uses the FIPS-compliant ciphers instead. This release includes the weak ciphers for backward compatibility only.
16
-
17
-
The FIPS-compliant cipher suites, which are not considered weak, will be the default in a future version of Puppet. To maintain backwards compatibility, Puppet Server explicitly enables all cipher suites that
18
-
were available as of Puppet Server 6.0. When you upgrade to Puppet Server 6.5.0, this affects you in in two ways:
19
-
20
-
1. The 6.5 package updates the `webserver.conf` file in Puppet Server's `conf.d` directory.
21
-
2. When Puppet Server starts or reloads, Jetty warns about weak cipher suites being enabled.
22
-
23
-
This update also removes the `so-linger-seconds` configuration setting. This setting is now ignored and a warning is issued if it is set. See Jetty's
24
-
[so-linger-seconds](https://github.com/puppetlabs/trapperkeeper-webserver-jetty9/blob/3.0.1/doc/jetty-config.md#so-linger-seconds) for removal details.
25
-
26
-
> Note: On some older operating systems, you might see additional warnings that newer cipher suites are unavailable. In this case, manage the contents of the `webserver.cipher-suites` configuration value to be
27
-
> those strong suites that available to you.
28
-
29
-
## Server-side Ruby gems might need to be updated for upgrading from JRuby 1.7
30
-
31
-
When upgrading from Puppet Server 5 using JRuby 1.7 (9k was optional in those releases), Server-side gems that were installed manually with the `puppetserver gem` command or using the `puppetserver_gem` package
32
-
provider might need to be updated to work with the newer JRuby. In most cases gems do not have APIs that break when upgrading from the Ruby versions implemented between JRuby 1.7 and JRuby 9k, so there might be
33
-
no necessary updates. However, two notable exceptions are that the autosign gem should be 0.1.3 or later and yard-doc must be 0.9 or later.
6
+
For a list of all known issues, visit the [OpenVox Server issue tracker](https://github.com/OpenVoxProject/openvox-server/issues).
34
7
35
8
## Potential JAVA ARGS settings
36
9
@@ -41,7 +14,7 @@ Similar caveats regarding scaling `ReservedCodeCache` might apply if users are m
41
14
42
15
## `tmp` directory mounted `noexec`
43
16
44
-
In some cases (especially for RHEL 7 installations) if the `/tmp` directory is mounted as `noexec`, Puppet Server may fail to run correctly, and you may see an error in the Puppet Server logs similar to the
17
+
In some cases (especially for RHEL installations) if the `/tmp` directory is mounted as `noexec`, OpenVox Server may fail to run correctly, and you may see an error in the OpenVox Server logs similar to the
This is caused by the fact that JRuby contains some embedded files which need to be copied somewhere on the filesystem before they can be executed
54
27
([see this JRuby issue](https://github.com/jruby/jruby/issues/2186)). To work around this issue, you can either mount the `/tmp` directory without `noexec`, or you can choose a different directory to use as the
55
-
temporary directory for the Puppet Server process.
28
+
temporary directory for the OpenVox Server process.
56
29
57
-
Either way, you'll need to set the permissions of the directory to `1777`. This allows the Puppet Server JRuby process to write a file to `/tmp` and then execute it. If permissions are set incorrectly, you'll
30
+
Either way, you'll need to set the permissions of the directory to `1777`. This allows the OpenVox Server JRuby process to write a file to `/tmp` and then execute it. If permissions are set incorrectly, you'll
58
31
get a massive stack trace without much useful information in it.
59
32
60
33
To use a different temporary directory, you can set the following JVM property:
@@ -63,11 +36,11 @@ To use a different temporary directory, you can set the following JVM property:
63
36
-Djava.io.tmpdir=/some/other/temporary/directory
64
37
```
65
38
66
-
When Puppet Server is installed from packages, add this property to the `JAVA_ARGS` and `JAVA_ARGS_CLI` variables defined in either `/etc/sysconfig/puppetserver` or `/etc/default/puppetserver`, depending on
39
+
When OpenVox Server is installed from packages, add this property to the `JAVA_ARGS` and `JAVA_ARGS_CLI` variables defined in either `/etc/sysconfig/puppetserver` or `/etc/default/puppetserver`, depending on
67
40
your distribution. Invocations of the `gem`, `ruby`, and `irb` subcommands use the updated `JAVA_ARGS_CLI` on their next invocation. The service will need to be restarted in order to re-read the `JAVA_ARGS`
68
41
variable.
69
42
70
-
## Puppet Server Master Fails to Connect to Load-Balanced Servers with Different SSL Certificates
43
+
## OpenVox Server fails to connect to load-balanced servers with different SSL certificates
71
44
72
-
[SERVER-207](https://tickets.puppet.com/browse/SERVER-207): Intermittent SSL connection failures have been seen when the Puppet Server master tries to make SSL requests to servers via the same virtual ip
73
-
address. This has been seen when the servers present different certificates during the SSL handshake. For more information on the issue, see [this page](./ssl_server_certificate_change_and_virtual_ips.html).
45
+
Intermittent SSL connection failures have been seen when OpenVox Server tries to make SSL requests to servers via the same virtual IP address where the servers present different certificates during the SSL
46
+
handshake. For more information, see [this page](./ssl_server_certificate_change_and_virtual_ips.html).
0 commit comments