Conversation
|
In the commit, it would be nice to explicit why we want to remove it :) |
|
Done |
0f3f94f to
bca3500
Compare
|
The issue is somewhere in the delta: The basic fields differ in |
c39828a to
bee63dc
Compare
|
The remaining issues originate from briansmith/ring#1167 (comment) and will be mitigated once |
9518a7e to
6777c63
Compare
|
|
2d6e57e to
6ed6bee
Compare
| .map(|f| { | ||
| f.flatten() | ||
| .filter(|f| f.path().extension().map_or(false, |ext| ext == "bc")) | ||
| .filter(|f| f.path().extension().is_some_and(|ext| ext == "bc")) |
There was a problem hiding this comment.
What about migrating OpenSSL-unrelated changes to the dedicated PR?
I don't think that changes breaks CI, but this split will minify change set, that is related to failure.
|
I cannot reproduce |
238343b to
40f3eac
Compare
|
I can occassionally repro the issue locally |
91efbbf to
c8811ad
Compare
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #2325 +/- ##
==========================================
- Coverage 71.42% 67.07% -4.35%
==========================================
Files 65 64 -1
Lines 36360 35230 -1130
==========================================
- Hits 25970 23632 -2338
- Misses 10390 11598 +1208 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
- Bump rouille from 3.5 => 3.6.2 rouille v3.6.2 fixed a bug: `rouille::Server::new_ssl` is now exposed when only `rustls` is enabled. - Disable default features of `reqwest` which pulls in openssl - Remove `openssl` pulled in `[dev-dependencies]` - Bump reqwest from 0.11.17 => 0.11.18 Signed-off-by: Jiahao XU <[email protected]>
Signed-off-by: Jiahao XU <[email protected]>
Use CRLF on windows and `\n` on Linux. Also fix formatting of `Cargo.toml` Signed-off-by: Jiahao XU <[email protected]>
Signed-off-by: Jiahao XU <[email protected]>
…ns do not contain sha1 support by default
Uses `ring >= 0.7.0` which contains a fix for win on aarch64
It will never work with `picky`, the `openssl` generated certs were invalid in the first place.
Simplifies CI
c8811ad to
70fac0a
Compare
Continuation of #1742
OpenSSL is a hinderance of both building and distribution, and has been superseeded by rustls and boringssl as safer and alternatives with sufficient subsets for sccache. We hance should not rely on a dependency when there are easier in alternatives.
Particularly difficult use cases when linking against OpenSSL: