Skip to content

Conversation

@chimurai
Copy link
Owner

Description

Pin node24 due to TLS issue with mockttp
(httptoolkit/mockttp@b591cff)

Failing CI: https://github.com/chimurai/http-proxy-middleware/actions/runs/17008427489/job/48221187057

Unknown TLS error: Error: C01C4B6E117F0000:error:0A00018D:SSL routines:ssl_add_cert_chain:ca key too small:../deps/openssl/openssl/ssl/statem/statem_lib.c:1079:

    at requestOCSPDone (node:_tls_wrap:324:20)
    at requestOCSP (node:_tls_wrap:274:12)
    at node:_tls_wrap:228:5
    at TLSSocket.SNICallback [as _SNICallback] (/home/runner/work/http-proxy-middleware/http-proxy-middleware/node_modules/mockttp/src/server/http-combo-server.ts:211:21)
    at processTicksAndRejections (node:internal/process/task_queues:105:5) {
  library: 'SSL routines',
  reason: 'ca key too small',
  code: 'ERR_SSL_CA_KEY_TOO_SMALL'
}

at getCauseFromError (node_modules/mockttp/src/server/http-combo-server.ts:131:38)

Motivation and Context

How has this been tested?

Types of changes

  • Bug fix (non-breaking change which fixes an issue)
  • New feature (non-breaking change which adds functionality)
  • Breaking change (fix or feature that would cause existing functionality to not work as expected)

Checklist:

  • My change requires a change to the documentation.
  • I have updated the documentation accordingly.

@pkg-pr-new
Copy link

pkg-pr-new bot commented Aug 16, 2025

npm i https://pkg.pr.new/http-proxy-middleware@1137

commit: 10df4d9

@chimurai chimurai merged commit 0a96f39 into master Aug 16, 2025
22 checks passed
@chimurai chimurai deleted the workaround-ci-mockttp-node24-tls-issue branch August 16, 2025 12:42
@coveralls
Copy link

Coverage Status

coverage: 97.129%. remained the same
when pulling 10df4d9 on workaround-ci-mockttp-node24-tls-issue
into e7ae009 on master.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants