* deps: Upgrade to OpenSSL 1.1.0j, fixing + Timing vulnerability in DSA signature generation (bsc#1113652, CVE-2018-0734) + Timing vulnerability in ECDSA signature generation (bsc#1113651, CVE-2018-0735) * http: + Headers received by HTTP servers must not exceed 8192 bytes in total to prevent possible Denial of Service attacks. (bsc#1117626, CVE-2018-12121) + A timeout of 40 seconds now applies to servers receiving HTTP headers. This value can be adjusted with server.headersTimeout. Where headers are not completely received within this period, the socket is destroyed on the next received chunk. In conjunction with server.setTimeout(), this aids in protecting against excessive resource retention and possible Denial of Service. (bsc#1117627, CVE-2018-12122) * url: Fix a bug that would allow a hostname being spoofed when parsing URLs with url.parse() with the 'javascript:' protocol. (bsc#1117629, CVE-2018-12123) OBS-URL: https://build.opensuse.org/package/show/devel:languages:nodejs/nodejs11?expand=0&rev=5
24 lines
765 B
Diff
24 lines
765 B
Diff
diff --git a/tools/test.py b/tools/test.py
|
|
index 67b8cb917e..51aaa3f8e0 100755
|
|
--- a/tools/test.py
|
|
+++ b/tools/test.py
|
|
@@ -512,11 +512,17 @@ class TestCase(object):
|
|
|
|
def RunCommand(self, command, env):
|
|
full_command = self.context.processor(command)
|
|
- output = Execute(full_command,
|
|
+ reruns = 0
|
|
+ while(reruns < 5):
|
|
+ reruns += 1
|
|
+ output = Execute(full_command,
|
|
self.context,
|
|
self.context.GetTimeout(self.mode),
|
|
env,
|
|
disable_core_files = self.disable_core_files)
|
|
+ if output.exit_code == 0:
|
|
+ break;
|
|
+ print("FLAKY rerun: ", command)
|
|
return TestOutput(self,
|
|
full_command,
|
|
output,
|