Bug#978353: serf: FTBFS: test_ssl_handshake fails with OpenSSL 1.1.1i

2021-01-18 Thread Justin Erenkrantz
On Fri, Jan 15, 2021 at 9:13 PM James McCoy wrote: > On Fri, Jan 15, 2021 at 08:36:22AM -0500, Justin Erenkrantz wrote: > > Sadly, my Debian sid box ran into other issues and is currently > inaccessible. > > > > I *think* that this would address the 1.3.x test iss

Bug#978353: serf: FTBFS: test_ssl_handshake fails with OpenSSL 1.1.1i

2021-01-15 Thread Justin Erenkrantz
void *acceptor_baton, On Thu, Jan 14, 2021 at 11:35 PM James McCoy wrote: > Happy New Year! > > On Wed, Dec 30, 2020 at 10:39:28PM -0500, James McCoy wrote: > > On Tue, Dec 29, 2020 at 02:35:11PM -0500, Justin Erenkrantz wrote: > > > The OpenSSL d

Bug#978353: serf: FTBFS: test_ssl_handshake fails with OpenSSL 1.1.1i

2020-12-29 Thread Justin Erenkrantz
apr_status_t status; + +status = run_client_and_mock_servers_loops(tb, num_requests, handler_ctx, + pool); + CuAssertIntEquals_Msg(tc, serf_error_string(status), APR_EGENERAL, status); +} + void setup_test_mock_server(test_baton_t *tb) {

Bug#978353: serf: FTBFS: test_ssl_handshake fails with OpenSSL 1.1.1i

2020-12-28 Thread Justin Erenkrantz
On Mon, Dec 28, 2020 at 5:00 PM Justin Erenkrantz wrote: > It's not clear to me if OpenSSL authors intended to make this breaking > change. On the serf side, we would need to think through what it would > mean to have our app callback return false upon failure in order to >

Bug#978353: serf: FTBFS: test_ssl_handshake fails with OpenSSL 1.1.1i

2020-12-28 Thread Justin Erenkrantz
lures, expected_failures); /* We expect an error from the certificate validation function. */ if (failures & expected_failures) return APR_SUCCESS; On Sun, Dec 27, 2020 at 11:22 AM James McCoy wrote: > On Sun, Dec 27, 2020 at 10:46:24AM -0500, Justin Erenkrantz wrote: &

Bug#978353: serf: FTBFS: test_ssl_handshake fails with OpenSSL 1.1.1i

2020-12-27 Thread Justin Erenkrantz
Thanks. I expect that this might be due to the last change - erroring out on an expired self-signed root cert. Though I thought we didn’t check in a root cert for our test chain...could Debian’s packaging be including a cert for testing? I will try to take a look this week with Debian sid...I as

Bug#954698: serf: FTBFS: 1) test_ssltunnel_basic_auth_server_has_keepalive_off: test/test_context.c:2138: expected <0> but was <120199>

2020-04-02 Thread Justin Erenkrantz
On Thu, Apr 2, 2020 at 8:06 AM James McCoy wrote: > Just as an FYI, the OpenSSL changes have been partially reverted[1] > upstream for the 1.1.1f release. The change will be re-introduced in > 3.0, so using the ifdef, instead of OpenSSL version, was the prudent > choice. > Thanks for the update

Bug#954698: serf: FTBFS: 1) test_ssltunnel_basic_auth_server_has_keepalive_off: test/test_context.c:2138: expected <0> but was <120199>

2020-03-30 Thread Justin Erenkrantz
R_UNEXPECTED_EOF_WHILE_READING) { +*len = 0; +return APR_EOF; + } + /* Fallthrough */ default: *len = 0; serf__log(TEST_VERBOSE, __FILE__, On Sat, Mar 28, 2020 at 9:49 AM Justin Erenkrantz wrote: > Ok

Bug#954698: serf: FTBFS: 1) test_ssltunnel_basic_auth_server_has_keepalive_off: test/test_context.c:2138: expected <0> but was <120199>

2020-03-28 Thread Justin Erenkrantz
the libssl1.1-dbgsym package; then I was able to break on the ssl3_read_n call and see the callstack. On Fri, Mar 27, 2020 at 5:56 PM Lucas Nussbaum wrote: > Hi Justin, > > Most likely, this is due to the new openssl version in unstable. > > Lucas > > > On 27/03/20 at 17:15

Bug#954698: serf: FTBFS: 1) test_ssltunnel_basic_auth_server_has_keepalive_off: test/test_context.c:2138: expected <0> but was <120199>

2020-03-27 Thread Justin Erenkrantz
patches and work my way back towards upstream. Cheers. — justin On Fri, Mar 27, 2020 at 5:27 PM James McCoy wrote: > On Fri, Mar 27, 2020 at 05:15:24PM -0400, Justin Erenkrantz wrote: > > James, > > > > I finally got a Debian sid environment up. However, I'm seeing a &g

Bug#954698: serf: FTBFS: 1) test_ssltunnel_basic_auth_server_has_keepalive_off: test/test_context.c:2138: expected <0> but was <120199>

2020-03-27 Thread Justin Erenkrantz
seeing something different than you (or the builder) are...I'll also try to pull in your patch set against vanilla 1.3.x to see if I can match the reported error. Cheers. -- justin On Wed, Mar 25, 2020 at 8:17 PM James McCoy wrote: > On Wed, Mar 25, 2020 at 08:57:14AM -0400, Justin

Bug#954698: serf: FTBFS: 1) test_ssltunnel_basic_auth_server_has_keepalive_off: test/test_context.c:2138: expected <0> but was <120199>

2020-03-25 Thread Justin Erenkrantz
James, Thanks for the bug report. For reference, the upstream OpenSSL commit looks to be: https://github.com/openssl/openssl/commit/d924dbf4ae127c68463bcbece04b6e06abc58928 I strongly suspect that the patch on our side (against 1.3.x) is something akin to below. I'm having trouble getting a te

Bug#372179: AC_CANONICAL_SYSTEM overwrites $@

2006-06-19 Thread Justin Erenkrantz
On 6/19/06, Tollef Fog Heen <[EMAIL PROTECTED]> wrote: * Ralf Wildenhues | Hello Justin, Tollef, | | * Justin Erenkrantz wrote on Sun, Jun 18, 2006 at 11:40:12PM CEST: | > On 6/18/06, Tollef Fog Heen <[EMAIL PROTECTED]> wrote: | > >Currently, if configure is passed --sbindi

Bug#372179: AC_CANONICAL_SYSTEM overwrites $@

2006-06-18 Thread Justin Erenkrantz
On 6/18/06, Tollef Fog Heen <[EMAIL PROTECTED]> wrote: Currently, if configure is passed --sbindir=, it just overrides $sbindir without flagging that at all. If it, in addition to changing $sbindir, it'd set ac_param_sbindir either to 1 to show that sbindir is derviced from a command line argume

Bug#372179: AC_CANONICAL_SYSTEM overwrites $@

2006-06-16 Thread Justin Erenkrantz
On 6/15/06, Paul Eggert <[EMAIL PROTECTED]> wrote: Tollef Fog Heen <[EMAIL PROTECTED]> writes: > Apart from the «ewww» factor, why can't it do its work in a subshell > and echo back the parameters to be set and those get eval-ed by > configure? Yes, something like that might work, given that yo