Hello,
I am updating OJS3.3.0-6 to version 3.3.0-8, and I have noticed that there is a problem when entering in the plugins section, it takes a long time to load and sometimes it shows a 500 error.
I read in other posts that it was a server problem, I already checked on the server side there are no problems. (I had no problems before upgrading)
And this happens to me specifically in version 3.3.0-8 at the end of the update.
Note: I have several days updating others OJS and I started to notice this problem on Thursday of last week.
This is the error:
[Tue Dec 07 16:08:29.942725 2021] [php7:error] [pid 1224] [client 148.234.16.165:50305] PHP Fatal error: Uncaught GuzzleHttp\\Exception\\ConnectException: cURL error 7: Failed to connect to pkp.sfu.ca port 443: Connection timed out (see https://curl.haxx.se/libcurl/c/libcurl-errors.html) in /web/htdocs/revistas/revig/lib/pkp/lib/vendor/guzzlehttp/guzzle/src/Handler/CurlFactory.php:200\nStack trace:\n#0 /web/htdocs/revistas/revig/lib/pkp/lib/vendor/guzzlehttp/guzzle/src/Handler/CurlFactory.php(155): GuzzleHttp\\Handler\\CurlFactory::createRejection(Object(GuzzleHttp\\Handler\\EasyHandle), Array)\n#1 /web/htdocs/revistas/revig/lib/pkp/lib/vendor/guzzlehttp/guzzle/src/Handler/CurlFactory.php(105): GuzzleHttp\\Handler\\CurlFactory::finishError(Object(GuzzleHttp\\Handler\\CurlHandler), Object(GuzzleHttp\\Handler\\EasyHandle), Object(GuzzleHttp\\Handler\\CurlFactory))\n#2 /web/htdocs/revistas/revig/lib/pkp/lib/vendor/guzzlehttp/guzzle/src/Handler/CurlHandler.php(43): GuzzleHttp\\Handler\\CurlFactory::finish(Object(GuzzleHttp\\Handler\\CurlHandler), Object(GuzzleHttp\\Handler\\EasyHandle), Object(GuzzleHttp\\Handler\\CurlFactory))\n#3 /web/htdoc in /web/htdocs/revistas/revig/lib/pkp/lib/vendor/guzzlehttp/guzzle/src/Handler/CurlFactory.php on line 200, referer: https://ingenieriaygestion.uanl.mx/index.php/r/management/settings/website
I repeat, this problem only appears after updating to 3.3.0-8, after several minutes it will be possible to see the plugin section.
I also noticed that if I disabled the “Plugins update notification” plugin the page could now load normally.
OJS3.3.0-8
PHP7.3
@dagosalas Could you please run those commands on your server and reply here with the results?
The first one is to test the SSL connection
openssl s_client -connect pkp.sfu.ca:443
The second one is to test if you’re being able to download the plugins.xml file from our servers.
wget https://pkp.sfu.ca/ojs/xml/plugins.xml
Thank you!
Olá Henrique, cómo vai!
This is te output from openssl
# openssl s_client -connect pkp.sfu.ca:443
CONNECTED(00000003)
depth=2 C = US, O = Internet Security Research Group, CN = ISRG Root X1
verify return:1
depth=1 C = US, O = Let's Encrypt, CN = R3
verify return:1
depth=0 CN = pkp.sfu.ca
verify return:1
---
Certificate chain
0 s:CN = pkp.sfu.ca
i:C = US, O = Let's Encrypt, CN = R3
1 s:C = US, O = Let's Encrypt, CN = R3
i:C = US, O = Internet Security Research Group, CN = ISRG Root X1
2 s:C = US, O = Internet Security Research Group, CN = ISRG Root X1
i:O = Digital Signature Trust Co., CN = DST Root CA X3
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=CN = pkp.sfu.ca
issuer=C = US, O = Let's Encrypt, CN = R3
---
No client certificate CA names sent
Peer signing digest: SHA512
Peer signature type: RSA
Server Temp Key: ECDH, P-256, 256 bits
---
SSL handshake has read 5218 bytes and written 428 bytes
Verification: OK
---
New, TLSv1.2, Cipher is ECDHE-RSA-AES128-GCM-SHA256
Server public key is 4096 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
Protocol : TLSv1.2
Cipher : ECDHE-RSA-AES128-GCM-SHA256
Session-ID: F8A7967C77F8822522701EA8FD6D7DEC0644690138F4634494C804F5EA4676CC
Session-ID-ctx:
Master-Key: 6689717FF211926FA1390121D30F8D7C87DE32405CFB30730A855880F154B12C788DE68A4E300D24AF43332755913939
PSK identity: None
PSK identity hint: None
SRP username: None
TLS session ticket lifetime hint: 300 (seconds)
TLS session ticket:
0000 - a6 10 f5 7b ff e7 f2 82-d0 0a 9b 44 5c 5f e4 77 ...{.......D\_.w
0010 - 33 6e 2a 49 3d 08 64 20-e8 f9 14 d1 cf 36 d7 7f 3n*I=.d .....6..
0020 - dd cb 3c 7d ab 07 2c 71-68 46 e6 40 b5 1c 29 cf ..<}..,qhF.@..).
0030 - 56 9c 2f 1a 54 46 93 2a-e9 10 e8 5f c9 b6 a0 bd V./.TF.*..._....
0040 - 65 63 a7 35 57 1e f6 0b-c9 d5 e8 f6 f1 57 a0 1c ec.5W........W..
0050 - dc f3 2f 5d 24 56 9e ab-74 36 de 14 6b 84 9d bb ../]$V..t6..k...
0060 - ce f4 f5 ac 11 3e 29 77-3b 93 83 06 ec 67 b7 30 .....>)w;....g.0
0070 - 7c 12 a1 aa 74 7f c8 7c-e0 7f 22 16 5a 38 03 c6 |...t..|..".Z8..
0080 - 55 cf 2f b2 8a e2 dc 29-28 17 af 72 6d 5c b0 67 U./....)(..rm\.g
0090 - d7 e3 f6 6d c0 1e ab 37-1d 4c d2 ac 6a 1b 15 35 ...m...7.L..j..5
00a0 - 4b a8 04 c4 0c 4d 3b b8-eb f0 c1 6a 26 7a e1 69 K....M;....j&z.i
00b0 - 0f ea 85 dd 73 e8 1f 2e-8f 5a 84 46 0b 29 16 31 ....s....Z.F.).1
00c0 - a7 6e a2 50 d9 90 fa 65-c5 1d 05 44 7d 25 71 f2 .n.P...e...D}%q.
Start Time: 1639004689
Timeout : 7200 (sec)
Verify return code: 0 (ok)
Extended master secret: no
---
HTTP/1.1 400 Bad Request
Date: Wed, 08 Dec 2021 23:04:52 GMT
Server: Apache
Content-Length: 226
Connection: close
Content-Type: text/html; charset=iso-8859-1
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>400 Bad Request</title>
</head><body>
<h1>Bad Request</h1>
<p>Your browser sent a request that this server could not understand.<br />
</p>
</body></html>
closed
And wget:
# wget https://pkp.sfu.ca/ojs/xml/plugins.xml
--2021-12-08 17:06:38-- https://pkp.sfu.ca/ojs/xml/plugins.xml
Resolving pkp.sfu.ca (pkp.sfu.ca)... 204.187.13.80
Connecting to pkp.sfu.ca (pkp.sfu.ca)|204.187.13.80|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 299926 (293K) [application/xml]
Saving to: ‘plugins.xml’
plugins.xml 100%
Apparently I have no connection problems.
Hi @henriqueramos ,
Again, same connection problem after upgrading to 3.3.0-8. But now it shows me this error:
#openssl s_client -connect pkp.sfu.ca:443
140087660000384:error:0200206E:system library:connect:Connection timed out:../crypto/bio/b_sock2.c:110:
140087660000384:error:2008A067:BIO routines:BIO_connect:connect error:../crypto/bio/b_sock2.c:111:
connect:errno=110
Olá @dagosalas,
this is kind strange, because you’re able to download the plugins.xml
file thru wget
.
Perhaps you could add the timeout
option on the GuzzleClient to see if the connection works.
The GuzzleClient construction resides at /lib/pkp/classes/core/PKPApplication.inc.php
, method getHttpClient
.
The craziest thing about this is that before the upgrade the connection works normal, I run the upgrade and I have the problem, after 5 minutes it works normal again.
So, I have seen this mainly when I am on the System Information page and run the upgrade from the command line.
I still have 5 more OJS to upgrade and I’m going to test if this is correct (the error) or has been a coincidence (too much).