Skip to content

Commit e788d0a

Browse files
authored
Merge pull request #167 from miharp/feat/modernize-known-issues
Modernize known_issues page
2 parents 3f40359 + 4f07119 commit e788d0a

1 file changed

Lines changed: 9 additions & 36 deletions

File tree

Lines changed: 9 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -1,36 +1,9 @@
11
---
22
layout: default
3-
title: "Puppet Server: Known Issues"
4-
canonical: "/puppetserver/latest/known_issues.html"
3+
title: "OpenVox Server: Known Issues"
54
---
65

7-
For a list of all known issues, visit our [Issue Tracker](https://tickets.puppet.com/browse/SERVER).
8-
9-
## Cipher updates in Puppet Server 6.5
10-
11-
Puppet Server 6.5 includes an upgrade to the latest release of Jetty's 9.4 series. With this update, you may see "weak cipher" warnings about ciphers that were previously enabled by default. Puppet Server now
12-
defaults to stronger FIPS-compliant ciphers, but you must first remove the weak ciphers.
13-
14-
The ciphers previously enabled by default have not been changed, but are considered weak by the updated standards. Remove the weak ciphers by removing the `cipher-suite` configuration section from the
15-
`webserver.conf`. After you remove the `cipher-suite`, Puppet Server uses the FIPS-compliant ciphers instead. This release includes the weak ciphers for backward compatibility only.
16-
17-
The FIPS-compliant cipher suites, which are not considered weak, will be the default in a future version of Puppet. To maintain backwards compatibility, Puppet Server explicitly enables all cipher suites that
18-
were available as of Puppet Server 6.0. When you upgrade to Puppet Server 6.5.0, this affects you in in two ways:
19-
20-
1. The 6.5 package updates the `webserver.conf` file in Puppet Server's `conf.d` directory.
21-
2. When Puppet Server starts or reloads, Jetty warns about weak cipher suites being enabled.
22-
23-
This update also removes the `so-linger-seconds` configuration setting. This setting is now ignored and a warning is issued if it is set. See Jetty's
24-
[so-linger-seconds](https://github.com/puppetlabs/trapperkeeper-webserver-jetty9/blob/3.0.1/doc/jetty-config.md#so-linger-seconds) for removal details.
25-
26-
> Note: On some older operating systems, you might see additional warnings that newer cipher suites are unavailable. In this case, manage the contents of the `webserver.cipher-suites` configuration value to be
27-
> those strong suites that available to you.
28-
29-
## Server-side Ruby gems might need to be updated for upgrading from JRuby 1.7
30-
31-
When upgrading from Puppet Server 5 using JRuby 1.7 (9k was optional in those releases), Server-side gems that were installed manually with the `puppetserver gem` command or using the `puppetserver_gem` package
32-
provider might need to be updated to work with the newer JRuby. In most cases gems do not have APIs that break when upgrading from the Ruby versions implemented between JRuby 1.7 and JRuby 9k, so there might be
33-
no necessary updates. However, two notable exceptions are that the autosign gem should be 0.1.3 or later and yard-doc must be 0.9 or later.
6+
For a list of all known issues, visit the [OpenVox Server issue tracker](https://github.com/OpenVoxProject/openvox-server/issues).
347

358
## Potential JAVA ARGS settings
369

@@ -41,7 +14,7 @@ Similar caveats regarding scaling `ReservedCodeCache` might apply if users are m
4114

4215
## `tmp` directory mounted `noexec`
4316

44-
In some cases (especially for RHEL 7 installations) if the `/tmp` directory is mounted as `noexec`, Puppet Server may fail to run correctly, and you may see an error in the Puppet Server logs similar to the
17+
In some cases (especially for RHEL installations) if the `/tmp` directory is mounted as `noexec`, OpenVox Server may fail to run correctly, and you may see an error in the OpenVox Server logs similar to the
4518
following:
4619

4720
```text
@@ -52,9 +25,9 @@ Nov 12 17:46:12 fqdn.com java[56495]: Puppet::Error: Cannot determine basic syst
5225

5326
This is caused by the fact that JRuby contains some embedded files which need to be copied somewhere on the filesystem before they can be executed
5427
([see this JRuby issue](https://github.com/jruby/jruby/issues/2186)). To work around this issue, you can either mount the `/tmp` directory without `noexec`, or you can choose a different directory to use as the
55-
temporary directory for the Puppet Server process.
28+
temporary directory for the OpenVox Server process.
5629

57-
Either way, you'll need to set the permissions of the directory to `1777`. This allows the Puppet Server JRuby process to write a file to `/tmp` and then execute it. If permissions are set incorrectly, you'll
30+
Either way, you'll need to set the permissions of the directory to `1777`. This allows the OpenVox Server JRuby process to write a file to `/tmp` and then execute it. If permissions are set incorrectly, you'll
5831
get a massive stack trace without much useful information in it.
5932

6033
To use a different temporary directory, you can set the following JVM property:
@@ -63,11 +36,11 @@ To use a different temporary directory, you can set the following JVM property:
6336
-Djava.io.tmpdir=/some/other/temporary/directory
6437
```
6538

66-
When Puppet Server is installed from packages, add this property to the `JAVA_ARGS` and `JAVA_ARGS_CLI` variables defined in either `/etc/sysconfig/puppetserver` or `/etc/default/puppetserver`, depending on
39+
When OpenVox Server is installed from packages, add this property to the `JAVA_ARGS` and `JAVA_ARGS_CLI` variables defined in either `/etc/sysconfig/puppetserver` or `/etc/default/puppetserver`, depending on
6740
your distribution. Invocations of the `gem`, `ruby`, and `irb` subcommands use the updated `JAVA_ARGS_CLI` on their next invocation. The service will need to be restarted in order to re-read the `JAVA_ARGS`
6841
variable.
6942

70-
## Puppet Server Master Fails to Connect to Load-Balanced Servers with Different SSL Certificates
43+
## OpenVox Server fails to connect to load-balanced servers with different SSL certificates
7144

72-
[SERVER-207](https://tickets.puppet.com/browse/SERVER-207): Intermittent SSL connection failures have been seen when the Puppet Server master tries to make SSL requests to servers via the same virtual ip
73-
address. This has been seen when the servers present different certificates during the SSL handshake. For more information on the issue, see [this page](./ssl_server_certificate_change_and_virtual_ips.html).
45+
Intermittent SSL connection failures have been seen when OpenVox Server tries to make SSL requests to servers via the same virtual IP address where the servers present different certificates during the SSL
46+
handshake. For more information, see [this page](./ssl_server_certificate_change_and_virtual_ips.html).

0 commit comments

Comments
 (0)