Merge ~paelzer/ubuntu/+source/ruby2.5:merge-disco-2.5.3-3ubuntu1 into ubuntu/+source/ruby2.5:debian/sid

Proposed by Christian Ehrhardt
Status: Merged
Approved by: Christian Ehrhardt
Approved revision: a97fbb451720ec444c2dfb40662cbad115d6617e
Merge reported by: Christian Ehrhardt
Merged at revision: a97fbb451720ec444c2dfb40662cbad115d6617e
Proposed branch: ~paelzer/ubuntu/+source/ruby2.5:merge-disco-2.5.3-3ubuntu1
Merge into: ubuntu/+source/ruby2.5:debian/sid
Diff against target: 394 lines (+328/-1)
7 files modified
debian/changelog (+81/-0)
debian/control (+2/-1)
debian/patches/0001-openssl-buffering.rb-no-RS-when-output.patch (+42/-0)
debian/patches/0006-Workaround-for-old-LibreSSL.patch (+27/-0)
debian/patches/1dfc377ae3b174b043d3f0ed36de57b0296b34d0.patch (+157/-0)
debian/patches/rubygems-2388.patch (+15/-0)
debian/patches/series (+4/-0)
Reviewer Review Type Date Requested Status
Dimitri John Ledkov (community) Approve
Matthias Klose Pending
Canonical Server Pending
Canonical Server packageset reviewers Pending
git-ubuntu developers Pending
Review via email: mp+360068@code.launchpad.net
To post a comment you must log in.
Revision history for this message
Christian Ehrhardt (paelzer) wrote :

Extra tags to ease review:
 * [new tag] lp1806694/deconstruct/2.5.1-6ubuntu3 -> lp1806694/deconstruct/2.5.1-6ubuntu3
 * [new tag] lp1806694/logical/2.5.1-6ubuntu3 -> lp1806694/logical/2.5.1-6ubuntu3
 * [new tag] lp1806694/new/debian -> lp1806694/new/debian
 * [new tag] lp1806694/old/debian -> lp1806694/old/debian
 * [new tag] lp1806694/old/ubuntu -> lp1806694/old/ubuntu
 * [new tag] lp1806694/reconstruct/2.5.1-6ubuntu3 -> lp1806694/reconstruct/2.5.1-6ubuntu3

Test builds in PPA https://launchpad.net/~ci-train-ppa-service/+archive/ubuntu/3552

Tests to be scheduled from Bileto once build is completed

Revision history for this message
Christian Ehrhardt (paelzer) wrote :

Note: there was a bunch of old Delta that was formerly undocumented, but I split it out in the deconstruct&logical tags.
When rebasing some of them (of course not all or none) were already upstream - so I modified them accordingly to drop them post merge. That way it was much more transparent what was removed (and why).

Revision history for this message
Dimitri John Ledkov (xnox) wrote :

LGTM.

review: Approve
Revision history for this message
Christian Ehrhardt (paelzer) wrote :

Test results: https://bileto.ubuntu.com/excuses/3552/disco.html

Still many running, will look into test failures (puma seems broken) tomorrow.

Revision history for this message
Christian Ehrhardt (paelzer) wrote :

Test issues with:
- puma (all)
  Has a bad test history, but also is only in -proposed.
  Needs trigger with proposed enabled, then retries and if it continues to fail like in the past
  it will need a force-badtest if three is no new regression)

- ruby-hamlit (all)
  covered ubuntu-release:35:force-badtest ruby-hamlit/2.8.8-1

- ruby-prof (amd64)
  "rake failed to run ..."
  Has a history of failing that way in 2/10 recent tests, rerun the test to be good

- ruby-rjb (x86)
  But here broke on "W: Unable to locate package ruby-rjb"
  => exists only in proposed, needs trigger with proposed enabled and then retries for the 50%
     flaky test

TL;DR: Tests look mostly good and those which failed seem handle-able.

@xnox - thanks for the review!

Revision history for this message
Christian Ehrhardt (paelzer) wrote :

Tag pushed so the next one doing a merge can use the split history.
Uploaded to disco and awaiting the expected test fallout in -proposed.

Uploading to ubuntu (via ftp to upload.ubuntu.com):
  Uploading ruby2.5_2.5.3-3ubuntu1.dsc: done.
  Uploading ruby2.5_2.5.3.orig.tar.xz: done.
  Uploading ruby2.5_2.5.3-3ubuntu1.debian.tar.xz: done.
  Uploading ruby2.5_2.5.3-3ubuntu1_source.buildinfo: done.
  Uploading ruby2.5_2.5.3-3ubuntu1_source.changes: done.
Successfully uploaded packages.

Preview Diff

[H/L] Next/Prev Comment, [J/K] Next/Prev File, [N/P] Next/Prev Hunk
1diff --git a/debian/changelog b/debian/changelog
2index 7b20f12..cab2b90 100644
3--- a/debian/changelog
4+++ b/debian/changelog
5@@ -1,3 +1,29 @@
6+ruby2.5 (2.5.3-3ubuntu1) disco; urgency=medium
7+
8+ * Merge with Debian unstable (LP: #1806694). Remaining changes:
9+ - d/p/1dfc377ae3b174b043d3f0ed36de57b0296b34d0.patch: Cherrypick
10+ upstream commit to fix session resumption with TLS 1.3.
11+ - d/p/rubygems-2388.patch: Allow either Fetcher or OpenSSL exceptions
12+ when using invalid cert in rubygems testcase.
13+ - various backports for better openssl support (formerly undocumented in
14+ changelog)
15+ + d/p/0001-openssl-buffering.rb-no-RS-when-output.patch
16+ + d/p/0006-Workaround-for-old-LibreSSL.patch
17+ * Dropped changes
18+ - various backports for better openssl support (formerly undocumented in
19+ changelog, but upstream now)
20+ + d/p/0002-no-ID-cache-in-Init-functions.patch
21+ + d/p/0003-search-winsock-libraries-explicitly.patch
22+ + d/p/0004-openssl-search-winsock.patch
23+ + d/p/0007-openssl_missing.h-constified.patch
24+ + d/p/0008-reduce-LibreSSL-warnings.patch
25+ + d/p/0009-openssl-sync-with-upstream-repository.patch
26+ - SECURITY UPDATE: Name equality check CVE-2018-16395 (in upstream)
27+ - SECURITY UPDATE: Tainted flags not propagted CVE-2018-16396 (in upstream)
28+ - 0012-test-time-tzdata-2018f.patch: Adjust tz tests for new tzdata.
29+
30+ -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Tue, 04 Dec 2018 15:40:55 +0100
31+
32 ruby2.5 (2.5.3-3) unstable; urgency=medium
33
34 * arm64: also skip TestBugReporter#test_bug_reporter_add, which also fails~
35@@ -44,6 +70,35 @@ ruby2.5 (2.5.3-1) unstable; urgency=medium
36
37 -- Antonio Terceiro <terceiro@debian.org> Sat, 24 Nov 2018 12:38:59 -0200
38
39+ruby2.5 (2.5.1-6ubuntu3) disco; urgency=medium
40+
41+ * SECURITY UPDATE: Name equality check
42+ - debian/patches/CVE-2018-16395.patch: fix in
43+ ext/openssl/ossl_x509name.c.
44+ - CVE-2018-16395
45+ * SECURITY UPDATE: Tainted flags not propagted
46+ - debian/patches/CVE-2018-16396.patch: fix in
47+ pack.c, test/ruby/test_pack.rb.
48+ - CVE-2018-16396
49+
50+ -- Leonidas S. Barbosa <leo.barbosa@canonical.com> Tue, 20 Nov 2018 10:30:19 -0300
51+
52+ruby2.5 (2.5.1-6ubuntu2) disco; urgency=medium
53+
54+ * 0012-test-time-tzdata-2018f.patch: Adjust tz tests for new tzdata.
55+
56+ -- Adam Conrad <adconrad@ubuntu.com> Sun, 04 Nov 2018 15:38:57 -0700
57+
58+ruby2.5 (2.5.1-6ubuntu1) disco; urgency=medium
59+
60+ * Merge with Debian; remaining changes:
61+ - Allow either Fetcher or OpenSSL exceptions when using invalid cert in
62+ rubygems testcase.
63+ - Cherrypick upstream commit to fix session resumption with TLS 1.3.
64+ - Cherrypick upstream commit to bump the test key size for OpenSSL 1.1.1.
65+
66+ -- Matthias Klose <doko@ubuntu.com> Sun, 04 Nov 2018 09:39:53 +0100
67+
68 ruby2.5 (2.5.1-6) unstable; urgency=medium
69
70 * Fix build with openssl 1.1.1 (Closes: #907790)
71@@ -63,6 +118,32 @@ ruby2.5 (2.5.1-6) unstable; urgency=medium
72
73 -- Antonio Terceiro <terceiro@debian.org> Sat, 06 Oct 2018 14:15:02 -0300
74
75+ruby2.5 (2.5.1-5ubuntu4) cosmic; urgency=high
76+
77+ * No change rebuild against openssl 1.1.1 with TLS1.3 support.
78+
79+ -- Dimitri John Ledkov <xnox@ubuntu.com> Tue, 25 Sep 2018 11:36:36 +0100
80+
81+ruby2.5 (2.5.1-5ubuntu3) cosmic; urgency=medium
82+
83+ * Allow either Fetcher or OpenSSL exceptions when using invalid cert in
84+ rubygems testcase.
85+
86+ -- Dimitri John Ledkov <xnox@ubuntu.com> Mon, 24 Sep 2018 12:10:21 +0100
87+
88+ruby2.5 (2.5.1-5ubuntu2) cosmic; urgency=medium
89+
90+ * Cherrypick upstream commits to sync ruby-openssl extension to 2.1.1.
91+
92+ -- Dimitri John Ledkov <xnox@ubuntu.com> Mon, 24 Sep 2018 10:49:54 +0100
93+
94+ruby2.5 (2.5.1-5ubuntu1) cosmic; urgency=medium
95+
96+ * Cherrypick upstream commit to fix session resumption with TLS 1.3.
97+ * Cherrypick upstream commit to bump the test key size for OpenSSL 1.1.1.
98+
99+ -- Dimitri John Ledkov <xnox@ubuntu.com> Sun, 23 Sep 2018 19:42:19 +0100
100+
101 ruby2.5 (2.5.1-5) unstable; urgency=medium
102
103 * Fix spelling error in patch description
104diff --git a/debian/control b/debian/control
105index 9398c85..2d1e35a 100644
106--- a/debian/control
107+++ b/debian/control
108@@ -1,7 +1,8 @@
109 Source: ruby2.5
110 Section: ruby
111 Priority: optional
112-Maintainer: Debian Ruby Team <pkg-ruby-extras-maintainers@lists.alioth.debian.org>
113+Maintainer: Ubuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
114+XSBC-Original-Maintainer: Debian Ruby Team <pkg-ruby-extras-maintainers@lists.alioth.debian.org>
115 Uploaders: Antonio Terceiro <terceiro@debian.org>,
116 Chris Hofstaedtler <zeha@debian.org>
117 Build-Depends: bison,
118diff --git a/debian/patches/0001-openssl-buffering.rb-no-RS-when-output.patch b/debian/patches/0001-openssl-buffering.rb-no-RS-when-output.patch
119new file mode 100644
120index 0000000..f7b0d8e
121--- /dev/null
122+++ b/debian/patches/0001-openssl-buffering.rb-no-RS-when-output.patch
123@@ -0,0 +1,42 @@
124+From 07decad25f969908f7b2cc97208548605e35c5db Mon Sep 17 00:00:00 2001
125+From: nobu <nobu@b2dd03c8-39d4-4d8f-98ff-823fe69b080e>
126+Date: Thu, 25 Jan 2018 11:21:47 +0000
127+Subject: [PATCH 1/9] openssl/buffering.rb: no RS when output
128+
129+* ext/openssl/lib/openssl/buffering.rb (do_write, puts): output
130+ methods should not be affected by the input record separator.
131+
132+git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@62038 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
133+---
134+ ext/openssl/lib/openssl/buffering.rb | 8 +++-----
135+ 1 file changed, 3 insertions(+), 5 deletions(-)
136+
137+diff --git a/ext/openssl/lib/openssl/buffering.rb b/ext/openssl/lib/openssl/buffering.rb
138+index 935f61f0ef..1f2b2a7e44 100644
139+--- a/ext/openssl/lib/openssl/buffering.rb
140++++ b/ext/openssl/lib/openssl/buffering.rb
141+@@ -316,8 +316,8 @@ def do_write(s)
142+ @wbuffer << s
143+ @wbuffer.force_encoding(Encoding::BINARY)
144+ @sync ||= false
145+- if @sync or @wbuffer.size > BLOCK_SIZE or idx = @wbuffer.rindex($/)
146+- remain = idx ? idx + $/.size : @wbuffer.length
147++ if @sync or @wbuffer.size > BLOCK_SIZE or idx = @wbuffer.rindex("\n")
148++ remain = idx ? idx + 1 : @wbuffer.size
149+ nwritten = 0
150+ while remain > 0
151+ str = @wbuffer[nwritten,remain]
152+@@ -409,9 +409,7 @@ def puts(*args)
153+ end
154+ args.each{|arg|
155+ s << arg.to_s
156+- if $/ && /\n\z/ !~ s
157+- s << "\n"
158+- end
159++ s.sub!(/(?<!\n)\z/, "\n")
160+ }
161+ do_write(s)
162+ nil
163+--
164+2.17.1
165+
166diff --git a/debian/patches/0006-Workaround-for-old-LibreSSL.patch b/debian/patches/0006-Workaround-for-old-LibreSSL.patch
167new file mode 100644
168index 0000000..c160ebb
169--- /dev/null
170+++ b/debian/patches/0006-Workaround-for-old-LibreSSL.patch
171@@ -0,0 +1,27 @@
172+From 162adb82d1fc1abb3ca0ba86d450709b3bd7e321 Mon Sep 17 00:00:00 2001
173+From: nobu <nobu@b2dd03c8-39d4-4d8f-98ff-823fe69b080e>
174+Date: Wed, 30 May 2018 09:13:21 +0000
175+Subject: [PATCH 6/9] Workaround for old LibreSSL
176+
177+git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@63526 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
178+---
179+ ext/openssl/openssl_missing.h | 3 +++
180+ 1 file changed, 3 insertions(+)
181+
182+diff --git a/ext/openssl/openssl_missing.h b/ext/openssl/openssl_missing.h
183+index debd25adea..da3248a7c8 100644
184+--- a/ext/openssl/openssl_missing.h
185++++ b/ext/openssl/openssl_missing.h
186+@@ -27,6 +27,9 @@ int ossl_EC_curve_nist2nid(const char *);
187+
188+ #if !defined(HAVE_X509_STORE_CTX_GET0_STORE)
189+ # define X509_STORE_CTX_get0_store(x) ((x)->ctx)
190++#elif defined(LIBRESSL_VERSION_NUMBER) && LIBRESSL_VERSION_NUMBER < 0x2070000fL
191++/* old LibreSSL provides this function but lacks the declaration */
192++X509_STORE *X509_STORE_CTX_get0_store(X509_STORE_CTX *xs);
193+ #endif
194+
195+ #if !defined(HAVE_SSL_IS_SERVER)
196+--
197+2.17.1
198+
199diff --git a/debian/patches/1dfc377ae3b174b043d3f0ed36de57b0296b34d0.patch b/debian/patches/1dfc377ae3b174b043d3f0ed36de57b0296b34d0.patch
200new file mode 100644
201index 0000000..707dbd7
202--- /dev/null
203+++ b/debian/patches/1dfc377ae3b174b043d3f0ed36de57b0296b34d0.patch
204@@ -0,0 +1,157 @@
205+From 1dfc377ae3b174b043d3f0ed36de57b0296b34d0 Mon Sep 17 00:00:00 2001
206+From: rhe <rhe@b2dd03c8-39d4-4d8f-98ff-823fe69b080e>
207+Date: Wed, 8 Aug 2018 14:13:55 +0000
208+Subject: [PATCH] net/http, net/ftp: fix session resumption with TLS 1.3
209+
210+When TLS 1.3 is in use, the session ticket may not have been sent yet
211+even though a handshake has finished. Also, the ticket could change if
212+multiple session ticket messages are sent by the server. Use
213+SSLContext#session_new_cb instead of calling SSLSocket#session
214+immediately after a handshake. This way also works with earlier protocol
215+versions.
216+
217+git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@64234 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
218+---
219+ lib/net/ftp.rb | 5 ++++-
220+ lib/net/http.rb | 7 +++++--
221+ test/net/http/test_https.rb | 35 ++++++++++-------------------------
222+ 3 files changed, 19 insertions(+), 28 deletions(-)
223+
224+diff --git a/lib/net/ftp.rb b/lib/net/ftp.rb
225+index c3ee47ef4d36..9902f9dc657a 100644
226+--- a/lib/net/ftp.rb
227++++ b/lib/net/ftp.rb
228+@@ -230,6 +230,10 @@ def initialize(host = nil, user_or_options = {}, passwd = nil, acct = nil)
229+ if defined?(VerifyCallbackProc)
230+ @ssl_context.verify_callback = VerifyCallbackProc
231+ end
232++ @ssl_context.session_cache_mode =
233++ OpenSSL::SSL::SSLContext::SESSION_CACHE_CLIENT |
234++ OpenSSL::SSL::SSLContext::SESSION_CACHE_NO_INTERNAL_STORE
235++ @ssl_context.session_new_cb = proc {|sock, sess| @ssl_session = sess }
236+ @ssl_session = nil
237+ if options[:private_data_connection].nil?
238+ @private_data_connection = true
239+@@ -349,7 +353,6 @@ def start_tls_session(sock)
240+ if @ssl_context.verify_mode != VERIFY_NONE
241+ ssl_sock.post_connection_check(@host)
242+ end
243+- @ssl_session = ssl_sock.session
244+ return ssl_sock
245+ end
246+ private :start_tls_session
247+diff --git a/lib/net/http.rb b/lib/net/http.rb
248+index 281b15cedff0..683a884f5dbe 100644
249+--- a/lib/net/http.rb
250++++ b/lib/net/http.rb
251+@@ -983,6 +983,10 @@ def connect
252+ end
253+ @ssl_context = OpenSSL::SSL::SSLContext.new
254+ @ssl_context.set_params(ssl_parameters)
255++ @ssl_context.session_cache_mode =
256++ OpenSSL::SSL::SSLContext::SESSION_CACHE_CLIENT |
257++ OpenSSL::SSL::SSLContext::SESSION_CACHE_NO_INTERNAL_STORE
258++ @ssl_context.session_new_cb = proc {|sock, sess| @ssl_session = sess }
259+ D "starting SSL for #{conn_address}:#{conn_port}..."
260+ s = OpenSSL::SSL::SSLSocket.new(s, @ssl_context)
261+ s.sync_close = true
262+@@ -990,13 +994,12 @@ def connect
263+ s.hostname = @address if s.respond_to? :hostname=
264+ if @ssl_session and
265+ Process.clock_gettime(Process::CLOCK_REALTIME) < @ssl_session.time.to_f + @ssl_session.timeout
266+- s.session = @ssl_session if @ssl_session
267++ s.session = @ssl_session
268+ end
269+ ssl_socket_connect(s, @open_timeout)
270+ if @ssl_context.verify_mode != OpenSSL::SSL::VERIFY_NONE
271+ s.post_connection_check(@address)
272+ end
273+- @ssl_session = s.session
274+ D "SSL established"
275+ end
276+ @socket = BufferedIO.new(s, read_timeout: @read_timeout,
277+diff --git a/test/net/http/test_https.rb b/test/net/http/test_https.rb
278+index 8004d5c5f29f..a5182a1fe9db 100644
279+--- a/test/net/http/test_https.rb
280++++ b/test/net/http/test_https.rb
281+@@ -71,20 +71,11 @@ def test_session_reuse
282+ http.get("/")
283+ http.finish
284+
285+- http.start
286+- http.get("/")
287+- http.finish # three times due to possible bug in OpenSSL 0.9.8
288+-
289+- sid = http.instance_variable_get(:@ssl_session).id
290+-
291+ http.start
292+ http.get("/")
293+
294+ socket = http.instance_variable_get(:@socket).io
295+-
296+- assert socket.session_reused?
297+-
298+- assert_equal sid, http.instance_variable_get(:@ssl_session).id
299++ assert_equal true, socket.session_reused?
300+
301+ http.finish
302+ rescue SystemCallError
303+@@ -101,16 +92,12 @@ def test_session_reuse_but_expire
304+ http.get("/")
305+ http.finish
306+
307+- sid = http.instance_variable_get(:@ssl_session).id
308+-
309+ http.start
310+ http.get("/")
311+
312+ socket = http.instance_variable_get(:@socket).io
313+ assert_equal false, socket.session_reused?
314+
315+- assert_not_equal sid, http.instance_variable_get(:@ssl_session).id
316+-
317+ http.finish
318+ rescue SystemCallError
319+ skip $!
320+@@ -160,15 +147,16 @@ def test_certificate_verify_failure
321+ end
322+
323+ def test_identity_verify_failure
324++ # the certificate's subject has CN=localhost
325+ http = Net::HTTP.new("127.0.0.1", config("port"))
326+ http.use_ssl = true
327+- http.verify_callback = Proc.new do |preverify_ok, store_ctx|
328+- true
329+- end
330++ http.cert_store = TEST_STORE
331++ @log_tester = lambda {|_| }
332+ ex = assert_raise(OpenSSL::SSL::SSLError){
333+ http.request_get("/") {|res| }
334+ }
335+- assert_match(/hostname \"127.0.0.1\" does not match/, ex.message)
336++ re_msg = /certificate verify failed|hostname \"127.0.0.1\" does not match/
337++ assert_match(re_msg, ex.message)
338+ end
339+
340+ def test_timeout_during_SSL_handshake
341+@@ -193,16 +181,13 @@ def test_timeout_during_SSL_handshake
342+ end
343+
344+ def test_min_version
345+- http = Net::HTTP.new("127.0.0.1", config("port"))
346++ http = Net::HTTP.new("localhost", config("port"))
347+ http.use_ssl = true
348+ http.min_version = :TLS1
349+- http.verify_callback = Proc.new do |preverify_ok, store_ctx|
350+- true
351+- end
352+- ex = assert_raise(OpenSSL::SSL::SSLError){
353+- http.request_get("/") {|res| }
354++ http.cert_store = TEST_STORE
355++ http.request_get("/") {|res|
356++ assert_equal($test_net_http_data, res.body)
357+ }
358+- assert_match(/hostname \"127.0.0.1\" does not match/, ex.message)
359+ end
360+
361+ def test_max_version
362diff --git a/debian/patches/rubygems-2388.patch b/debian/patches/rubygems-2388.patch
363new file mode 100644
364index 0000000..26bf929
365--- /dev/null
366+++ b/debian/patches/rubygems-2388.patch
367@@ -0,0 +1,15 @@
368+Description: Allow either Fetcher or OpenSSL exceptions when using invalid cert in rubygems testcase.
369+Author: Dimitri John Ledkov <xnox@ubuntu.com>
370+Bug-Upstream: https://github.com/rubygems/rubygems/issues/2388
371+
372+--- ruby2.5-2.5.1.orig/test/rubygems/test_gem_remote_fetcher.rb
373++++ ruby2.5-2.5.1/test/rubygems/test_gem_remote_fetcher.rb
374+@@ -842,7 +842,7 @@ PeIQQkFng2VVot/WAQbv3ePqWq07g1BBcwIBAg==
375+ with_configured_fetcher(
376+ ":ssl_ca_cert: #{temp_ca_cert}\n" +
377+ ":ssl_client_cert: #{temp_client_cert}\n") do |fetcher|
378+- assert_raises Gem::RemoteFetcher::FetchError do
379++ assert_raises Gem::RemoteFetcher::FetchError, OpenSSL::SSL::SSLError do
380+ fetcher.fetch_path("https://localhost:#{ssl_server.config[:Port]}/yaml")
381+ end
382+ end
383diff --git a/debian/patches/series b/debian/patches/series
384index 7ca7914..7ef25fc 100644
385--- a/debian/patches/series
386+++ b/debian/patches/series
387@@ -9,3 +9,7 @@
388 0009-test-test_pair-fix-deadlock-in-test_connect_accept_n.patch
389 0010-test-use-larger-keys-for-SSL-tests.patch
390 0011-Update-for-tzdata-2018f.patch
391+1dfc377ae3b174b043d3f0ed36de57b0296b34d0.patch
392+0001-openssl-buffering.rb-no-RS-when-output.patch
393+0006-Workaround-for-old-LibreSSL.patch
394+rubygems-2388.patch

Subscribers

People subscribed via source and target branches