Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix TLS errors preventing Redis connections in production #3899

Merged
merged 1 commit into from
Aug 20, 2019

Conversation

paulmelnikow
Copy link
Member

ioredis 4.14.0 introduced an issue where custom TLS options are no longer honored. I reported it here: redis/ioredis#947

This has been preventing the server from using GitHub tokens, however I'm not sure whether or not this has been causing noticeable issues.

For now let's downgrade to the latest working version, which I've confirmed working via the script (checked in).

ioredis 4.14.0 introduced an issue where custom TLS options are no longer honored. I reported it here: redis/ioredis#947

For now let's downgrade to the latest working version, which I've confirmed working via the script (checked in).
@paulmelnikow paulmelnikow added the operations Hosting, monitoring, and reliability for the production badge servers label Aug 20, 2019
@shields-ci
Copy link

Messages
📖 ✨ Thanks for your contribution to Shields, @paulmelnikow!

Generated by 🚫 dangerJS against 8e5f7ed

@paulmelnikow paulmelnikow merged commit af81095 into master Aug 20, 2019
@shields-deployment
Copy link

This pull request was merged to master branch. This change is now waiting for deployment, which will usually happen within a few days. Stay tuned by joining our #ops channel on Discord!

After deployment, changes are copied to gh-pages branch:

@paulmelnikow paulmelnikow deleted the redis-tls branch August 20, 2019 18:03
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
operations Hosting, monitoring, and reliability for the production badge servers
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants