Merge ~paelzer/ubuntu/+source/ruby2.5:merge-disco-2.5.3-3ubuntu1 into ubuntu/+source/ruby2.5:debian/sid

Proposed by Christian Ehrhardt
Status: Merged
Approved by: Christian Ehrhardt
Approved revision: a97fbb451720ec444c2dfb40662cbad115d6617e
Merge reported by: Christian Ehrhardt
Merged at revision: a97fbb451720ec444c2dfb40662cbad115d6617e
Proposed branch: ~paelzer/ubuntu/+source/ruby2.5:merge-disco-2.5.3-3ubuntu1
Merge into: ubuntu/+source/ruby2.5:debian/sid
Diff against target: 394 lines (+328/-1)
7 files modified
debian/changelog (+81/-0)
debian/control (+2/-1)
debian/patches/0001-openssl-buffering.rb-no-RS-when-output.patch (+42/-0)
debian/patches/0006-Workaround-for-old-LibreSSL.patch (+27/-0)
debian/patches/1dfc377ae3b174b043d3f0ed36de57b0296b34d0.patch (+157/-0)
debian/patches/rubygems-2388.patch (+15/-0)
debian/patches/series (+4/-0)
Reviewer Review Type Date Requested Status
Dimitri John Ledkov (community) Approve
Matthias Klose Pending
Canonical Server Pending
Canonical Server packageset reviewers Pending
git-ubuntu developers Pending
Review via email: mp+360068@code.launchpad.net
To post a comment you must log in.
Revision history for this message
Christian Ehrhardt (paelzer) wrote :

Extra tags to ease review:
 * [new tag] lp1806694/deconstruct/2.5.1-6ubuntu3 -> lp1806694/deconstruct/2.5.1-6ubuntu3
 * [new tag] lp1806694/logical/2.5.1-6ubuntu3 -> lp1806694/logical/2.5.1-6ubuntu3
 * [new tag] lp1806694/new/debian -> lp1806694/new/debian
 * [new tag] lp1806694/old/debian -> lp1806694/old/debian
 * [new tag] lp1806694/old/ubuntu -> lp1806694/old/ubuntu
 * [new tag] lp1806694/reconstruct/2.5.1-6ubuntu3 -> lp1806694/reconstruct/2.5.1-6ubuntu3

Test builds in PPA https://launchpad.net/~ci-train-ppa-service/+archive/ubuntu/3552

Tests to be scheduled from Bileto once build is completed

Revision history for this message
Christian Ehrhardt (paelzer) wrote :

Note: there was a bunch of old Delta that was formerly undocumented, but I split it out in the deconstruct&logical tags.
When rebasing some of them (of course not all or none) were already upstream - so I modified them accordingly to drop them post merge. That way it was much more transparent what was removed (and why).

Revision history for this message
Dimitri John Ledkov (xnox) wrote :

LGTM.

review: Approve
Revision history for this message
Christian Ehrhardt (paelzer) wrote :

Test results: https://bileto.ubuntu.com/excuses/3552/disco.html

Still many running, will look into test failures (puma seems broken) tomorrow.

Revision history for this message
Christian Ehrhardt (paelzer) wrote :

Test issues with:
- puma (all)
  Has a bad test history, but also is only in -proposed.
  Needs trigger with proposed enabled, then retries and if it continues to fail like in the past
  it will need a force-badtest if three is no new regression)

- ruby-hamlit (all)
  covered ubuntu-release:35:force-badtest ruby-hamlit/2.8.8-1

- ruby-prof (amd64)
  "rake failed to run ..."
  Has a history of failing that way in 2/10 recent tests, rerun the test to be good

- ruby-rjb (x86)
  But here broke on "W: Unable to locate package ruby-rjb"
  => exists only in proposed, needs trigger with proposed enabled and then retries for the 50%
     flaky test

TL;DR: Tests look mostly good and those which failed seem handle-able.

@xnox - thanks for the review!

Revision history for this message
Christian Ehrhardt (paelzer) wrote :

Tag pushed so the next one doing a merge can use the split history.
Uploaded to disco and awaiting the expected test fallout in -proposed.

Uploading to ubuntu (via ftp to upload.ubuntu.com):
  Uploading ruby2.5_2.5.3-3ubuntu1.dsc: done.
  Uploading ruby2.5_2.5.3.orig.tar.xz: done.
  Uploading ruby2.5_2.5.3-3ubuntu1.debian.tar.xz: done.
  Uploading ruby2.5_2.5.3-3ubuntu1_source.buildinfo: done.
  Uploading ruby2.5_2.5.3-3ubuntu1_source.changes: done.
Successfully uploaded packages.

Preview Diff

[H/L] Next/Prev Comment, [J/K] Next/Prev File, [N/P] Next/Prev Hunk
diff --git a/debian/changelog b/debian/changelog
index 7b20f12..cab2b90 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,29 @@
1ruby2.5 (2.5.3-3ubuntu1) disco; urgency=medium
2
3 * Merge with Debian unstable (LP: #1806694). Remaining changes:
4 - d/p/1dfc377ae3b174b043d3f0ed36de57b0296b34d0.patch: Cherrypick
5 upstream commit to fix session resumption with TLS 1.3.
6 - d/p/rubygems-2388.patch: Allow either Fetcher or OpenSSL exceptions
7 when using invalid cert in rubygems testcase.
8 - various backports for better openssl support (formerly undocumented in
9 changelog)
10 + d/p/0001-openssl-buffering.rb-no-RS-when-output.patch
11 + d/p/0006-Workaround-for-old-LibreSSL.patch
12 * Dropped changes
13 - various backports for better openssl support (formerly undocumented in
14 changelog, but upstream now)
15 + d/p/0002-no-ID-cache-in-Init-functions.patch
16 + d/p/0003-search-winsock-libraries-explicitly.patch
17 + d/p/0004-openssl-search-winsock.patch
18 + d/p/0007-openssl_missing.h-constified.patch
19 + d/p/0008-reduce-LibreSSL-warnings.patch
20 + d/p/0009-openssl-sync-with-upstream-repository.patch
21 - SECURITY UPDATE: Name equality check CVE-2018-16395 (in upstream)
22 - SECURITY UPDATE: Tainted flags not propagted CVE-2018-16396 (in upstream)
23 - 0012-test-time-tzdata-2018f.patch: Adjust tz tests for new tzdata.
24
25 -- Christian Ehrhardt <christian.ehrhardt@canonical.com> Tue, 04 Dec 2018 15:40:55 +0100
26
1ruby2.5 (2.5.3-3) unstable; urgency=medium27ruby2.5 (2.5.3-3) unstable; urgency=medium
228
3 * arm64: also skip TestBugReporter#test_bug_reporter_add, which also fails~29 * arm64: also skip TestBugReporter#test_bug_reporter_add, which also fails~
@@ -44,6 +70,35 @@ ruby2.5 (2.5.3-1) unstable; urgency=medium
4470
45 -- Antonio Terceiro <terceiro@debian.org> Sat, 24 Nov 2018 12:38:59 -020071 -- Antonio Terceiro <terceiro@debian.org> Sat, 24 Nov 2018 12:38:59 -0200
4672
73ruby2.5 (2.5.1-6ubuntu3) disco; urgency=medium
74
75 * SECURITY UPDATE: Name equality check
76 - debian/patches/CVE-2018-16395.patch: fix in
77 ext/openssl/ossl_x509name.c.
78 - CVE-2018-16395
79 * SECURITY UPDATE: Tainted flags not propagted
80 - debian/patches/CVE-2018-16396.patch: fix in
81 pack.c, test/ruby/test_pack.rb.
82 - CVE-2018-16396
83
84 -- Leonidas S. Barbosa <leo.barbosa@canonical.com> Tue, 20 Nov 2018 10:30:19 -0300
85
86ruby2.5 (2.5.1-6ubuntu2) disco; urgency=medium
87
88 * 0012-test-time-tzdata-2018f.patch: Adjust tz tests for new tzdata.
89
90 -- Adam Conrad <adconrad@ubuntu.com> Sun, 04 Nov 2018 15:38:57 -0700
91
92ruby2.5 (2.5.1-6ubuntu1) disco; urgency=medium
93
94 * Merge with Debian; remaining changes:
95 - Allow either Fetcher or OpenSSL exceptions when using invalid cert in
96 rubygems testcase.
97 - Cherrypick upstream commit to fix session resumption with TLS 1.3.
98 - Cherrypick upstream commit to bump the test key size for OpenSSL 1.1.1.
99
100 -- Matthias Klose <doko@ubuntu.com> Sun, 04 Nov 2018 09:39:53 +0100
101
47ruby2.5 (2.5.1-6) unstable; urgency=medium102ruby2.5 (2.5.1-6) unstable; urgency=medium
48103
49 * Fix build with openssl 1.1.1 (Closes: #907790)104 * Fix build with openssl 1.1.1 (Closes: #907790)
@@ -63,6 +118,32 @@ ruby2.5 (2.5.1-6) unstable; urgency=medium
63118
64 -- Antonio Terceiro <terceiro@debian.org> Sat, 06 Oct 2018 14:15:02 -0300119 -- Antonio Terceiro <terceiro@debian.org> Sat, 06 Oct 2018 14:15:02 -0300
65120
121ruby2.5 (2.5.1-5ubuntu4) cosmic; urgency=high
122
123 * No change rebuild against openssl 1.1.1 with TLS1.3 support.
124
125 -- Dimitri John Ledkov <xnox@ubuntu.com> Tue, 25 Sep 2018 11:36:36 +0100
126
127ruby2.5 (2.5.1-5ubuntu3) cosmic; urgency=medium
128
129 * Allow either Fetcher or OpenSSL exceptions when using invalid cert in
130 rubygems testcase.
131
132 -- Dimitri John Ledkov <xnox@ubuntu.com> Mon, 24 Sep 2018 12:10:21 +0100
133
134ruby2.5 (2.5.1-5ubuntu2) cosmic; urgency=medium
135
136 * Cherrypick upstream commits to sync ruby-openssl extension to 2.1.1.
137
138 -- Dimitri John Ledkov <xnox@ubuntu.com> Mon, 24 Sep 2018 10:49:54 +0100
139
140ruby2.5 (2.5.1-5ubuntu1) cosmic; urgency=medium
141
142 * Cherrypick upstream commit to fix session resumption with TLS 1.3.
143 * Cherrypick upstream commit to bump the test key size for OpenSSL 1.1.1.
144
145 -- Dimitri John Ledkov <xnox@ubuntu.com> Sun, 23 Sep 2018 19:42:19 +0100
146
66ruby2.5 (2.5.1-5) unstable; urgency=medium147ruby2.5 (2.5.1-5) unstable; urgency=medium
67148
68 * Fix spelling error in patch description149 * Fix spelling error in patch description
diff --git a/debian/control b/debian/control
index 9398c85..2d1e35a 100644
--- a/debian/control
+++ b/debian/control
@@ -1,7 +1,8 @@
1Source: ruby2.51Source: ruby2.5
2Section: ruby2Section: ruby
3Priority: optional3Priority: optional
4Maintainer: Debian Ruby Team <pkg-ruby-extras-maintainers@lists.alioth.debian.org>4Maintainer: Ubuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
5XSBC-Original-Maintainer: Debian Ruby Team <pkg-ruby-extras-maintainers@lists.alioth.debian.org>
5Uploaders: Antonio Terceiro <terceiro@debian.org>,6Uploaders: Antonio Terceiro <terceiro@debian.org>,
6 Chris Hofstaedtler <zeha@debian.org>7 Chris Hofstaedtler <zeha@debian.org>
7Build-Depends: bison,8Build-Depends: bison,
diff --git a/debian/patches/0001-openssl-buffering.rb-no-RS-when-output.patch b/debian/patches/0001-openssl-buffering.rb-no-RS-when-output.patch
8new file mode 1006449new file mode 100644
index 0000000..f7b0d8e
--- /dev/null
+++ b/debian/patches/0001-openssl-buffering.rb-no-RS-when-output.patch
@@ -0,0 +1,42 @@
1From 07decad25f969908f7b2cc97208548605e35c5db Mon Sep 17 00:00:00 2001
2From: nobu <nobu@b2dd03c8-39d4-4d8f-98ff-823fe69b080e>
3Date: Thu, 25 Jan 2018 11:21:47 +0000
4Subject: [PATCH 1/9] openssl/buffering.rb: no RS when output
5
6* ext/openssl/lib/openssl/buffering.rb (do_write, puts): output
7 methods should not be affected by the input record separator.
8
9git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@62038 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
10---
11 ext/openssl/lib/openssl/buffering.rb | 8 +++-----
12 1 file changed, 3 insertions(+), 5 deletions(-)
13
14diff --git a/ext/openssl/lib/openssl/buffering.rb b/ext/openssl/lib/openssl/buffering.rb
15index 935f61f0ef..1f2b2a7e44 100644
16--- a/ext/openssl/lib/openssl/buffering.rb
17+++ b/ext/openssl/lib/openssl/buffering.rb
18@@ -316,8 +316,8 @@ def do_write(s)
19 @wbuffer << s
20 @wbuffer.force_encoding(Encoding::BINARY)
21 @sync ||= false
22- if @sync or @wbuffer.size > BLOCK_SIZE or idx = @wbuffer.rindex($/)
23- remain = idx ? idx + $/.size : @wbuffer.length
24+ if @sync or @wbuffer.size > BLOCK_SIZE or idx = @wbuffer.rindex("\n")
25+ remain = idx ? idx + 1 : @wbuffer.size
26 nwritten = 0
27 while remain > 0
28 str = @wbuffer[nwritten,remain]
29@@ -409,9 +409,7 @@ def puts(*args)
30 end
31 args.each{|arg|
32 s << arg.to_s
33- if $/ && /\n\z/ !~ s
34- s << "\n"
35- end
36+ s.sub!(/(?<!\n)\z/, "\n")
37 }
38 do_write(s)
39 nil
40--
412.17.1
42
diff --git a/debian/patches/0006-Workaround-for-old-LibreSSL.patch b/debian/patches/0006-Workaround-for-old-LibreSSL.patch
0new file mode 10064443new file mode 100644
index 0000000..c160ebb
--- /dev/null
+++ b/debian/patches/0006-Workaround-for-old-LibreSSL.patch
@@ -0,0 +1,27 @@
1From 162adb82d1fc1abb3ca0ba86d450709b3bd7e321 Mon Sep 17 00:00:00 2001
2From: nobu <nobu@b2dd03c8-39d4-4d8f-98ff-823fe69b080e>
3Date: Wed, 30 May 2018 09:13:21 +0000
4Subject: [PATCH 6/9] Workaround for old LibreSSL
5
6git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@63526 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
7---
8 ext/openssl/openssl_missing.h | 3 +++
9 1 file changed, 3 insertions(+)
10
11diff --git a/ext/openssl/openssl_missing.h b/ext/openssl/openssl_missing.h
12index debd25adea..da3248a7c8 100644
13--- a/ext/openssl/openssl_missing.h
14+++ b/ext/openssl/openssl_missing.h
15@@ -27,6 +27,9 @@ int ossl_EC_curve_nist2nid(const char *);
16
17 #if !defined(HAVE_X509_STORE_CTX_GET0_STORE)
18 # define X509_STORE_CTX_get0_store(x) ((x)->ctx)
19+#elif defined(LIBRESSL_VERSION_NUMBER) && LIBRESSL_VERSION_NUMBER < 0x2070000fL
20+/* old LibreSSL provides this function but lacks the declaration */
21+X509_STORE *X509_STORE_CTX_get0_store(X509_STORE_CTX *xs);
22 #endif
23
24 #if !defined(HAVE_SSL_IS_SERVER)
25--
262.17.1
27
diff --git a/debian/patches/1dfc377ae3b174b043d3f0ed36de57b0296b34d0.patch b/debian/patches/1dfc377ae3b174b043d3f0ed36de57b0296b34d0.patch
0new file mode 10064428new file mode 100644
index 0000000..707dbd7
--- /dev/null
+++ b/debian/patches/1dfc377ae3b174b043d3f0ed36de57b0296b34d0.patch
@@ -0,0 +1,157 @@
1From 1dfc377ae3b174b043d3f0ed36de57b0296b34d0 Mon Sep 17 00:00:00 2001
2From: rhe <rhe@b2dd03c8-39d4-4d8f-98ff-823fe69b080e>
3Date: Wed, 8 Aug 2018 14:13:55 +0000
4Subject: [PATCH] net/http, net/ftp: fix session resumption with TLS 1.3
5
6When TLS 1.3 is in use, the session ticket may not have been sent yet
7even though a handshake has finished. Also, the ticket could change if
8multiple session ticket messages are sent by the server. Use
9SSLContext#session_new_cb instead of calling SSLSocket#session
10immediately after a handshake. This way also works with earlier protocol
11versions.
12
13git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@64234 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
14---
15 lib/net/ftp.rb | 5 ++++-
16 lib/net/http.rb | 7 +++++--
17 test/net/http/test_https.rb | 35 ++++++++++-------------------------
18 3 files changed, 19 insertions(+), 28 deletions(-)
19
20diff --git a/lib/net/ftp.rb b/lib/net/ftp.rb
21index c3ee47ef4d36..9902f9dc657a 100644
22--- a/lib/net/ftp.rb
23+++ b/lib/net/ftp.rb
24@@ -230,6 +230,10 @@ def initialize(host = nil, user_or_options = {}, passwd = nil, acct = nil)
25 if defined?(VerifyCallbackProc)
26 @ssl_context.verify_callback = VerifyCallbackProc
27 end
28+ @ssl_context.session_cache_mode =
29+ OpenSSL::SSL::SSLContext::SESSION_CACHE_CLIENT |
30+ OpenSSL::SSL::SSLContext::SESSION_CACHE_NO_INTERNAL_STORE
31+ @ssl_context.session_new_cb = proc {|sock, sess| @ssl_session = sess }
32 @ssl_session = nil
33 if options[:private_data_connection].nil?
34 @private_data_connection = true
35@@ -349,7 +353,6 @@ def start_tls_session(sock)
36 if @ssl_context.verify_mode != VERIFY_NONE
37 ssl_sock.post_connection_check(@host)
38 end
39- @ssl_session = ssl_sock.session
40 return ssl_sock
41 end
42 private :start_tls_session
43diff --git a/lib/net/http.rb b/lib/net/http.rb
44index 281b15cedff0..683a884f5dbe 100644
45--- a/lib/net/http.rb
46+++ b/lib/net/http.rb
47@@ -983,6 +983,10 @@ def connect
48 end
49 @ssl_context = OpenSSL::SSL::SSLContext.new
50 @ssl_context.set_params(ssl_parameters)
51+ @ssl_context.session_cache_mode =
52+ OpenSSL::SSL::SSLContext::SESSION_CACHE_CLIENT |
53+ OpenSSL::SSL::SSLContext::SESSION_CACHE_NO_INTERNAL_STORE
54+ @ssl_context.session_new_cb = proc {|sock, sess| @ssl_session = sess }
55 D "starting SSL for #{conn_address}:#{conn_port}..."
56 s = OpenSSL::SSL::SSLSocket.new(s, @ssl_context)
57 s.sync_close = true
58@@ -990,13 +994,12 @@ def connect
59 s.hostname = @address if s.respond_to? :hostname=
60 if @ssl_session and
61 Process.clock_gettime(Process::CLOCK_REALTIME) < @ssl_session.time.to_f + @ssl_session.timeout
62- s.session = @ssl_session if @ssl_session
63+ s.session = @ssl_session
64 end
65 ssl_socket_connect(s, @open_timeout)
66 if @ssl_context.verify_mode != OpenSSL::SSL::VERIFY_NONE
67 s.post_connection_check(@address)
68 end
69- @ssl_session = s.session
70 D "SSL established"
71 end
72 @socket = BufferedIO.new(s, read_timeout: @read_timeout,
73diff --git a/test/net/http/test_https.rb b/test/net/http/test_https.rb
74index 8004d5c5f29f..a5182a1fe9db 100644
75--- a/test/net/http/test_https.rb
76+++ b/test/net/http/test_https.rb
77@@ -71,20 +71,11 @@ def test_session_reuse
78 http.get("/")
79 http.finish
80
81- http.start
82- http.get("/")
83- http.finish # three times due to possible bug in OpenSSL 0.9.8
84-
85- sid = http.instance_variable_get(:@ssl_session).id
86-
87 http.start
88 http.get("/")
89
90 socket = http.instance_variable_get(:@socket).io
91-
92- assert socket.session_reused?
93-
94- assert_equal sid, http.instance_variable_get(:@ssl_session).id
95+ assert_equal true, socket.session_reused?
96
97 http.finish
98 rescue SystemCallError
99@@ -101,16 +92,12 @@ def test_session_reuse_but_expire
100 http.get("/")
101 http.finish
102
103- sid = http.instance_variable_get(:@ssl_session).id
104-
105 http.start
106 http.get("/")
107
108 socket = http.instance_variable_get(:@socket).io
109 assert_equal false, socket.session_reused?
110
111- assert_not_equal sid, http.instance_variable_get(:@ssl_session).id
112-
113 http.finish
114 rescue SystemCallError
115 skip $!
116@@ -160,15 +147,16 @@ def test_certificate_verify_failure
117 end
118
119 def test_identity_verify_failure
120+ # the certificate's subject has CN=localhost
121 http = Net::HTTP.new("127.0.0.1", config("port"))
122 http.use_ssl = true
123- http.verify_callback = Proc.new do |preverify_ok, store_ctx|
124- true
125- end
126+ http.cert_store = TEST_STORE
127+ @log_tester = lambda {|_| }
128 ex = assert_raise(OpenSSL::SSL::SSLError){
129 http.request_get("/") {|res| }
130 }
131- assert_match(/hostname \"127.0.0.1\" does not match/, ex.message)
132+ re_msg = /certificate verify failed|hostname \"127.0.0.1\" does not match/
133+ assert_match(re_msg, ex.message)
134 end
135
136 def test_timeout_during_SSL_handshake
137@@ -193,16 +181,13 @@ def test_timeout_during_SSL_handshake
138 end
139
140 def test_min_version
141- http = Net::HTTP.new("127.0.0.1", config("port"))
142+ http = Net::HTTP.new("localhost", config("port"))
143 http.use_ssl = true
144 http.min_version = :TLS1
145- http.verify_callback = Proc.new do |preverify_ok, store_ctx|
146- true
147- end
148- ex = assert_raise(OpenSSL::SSL::SSLError){
149- http.request_get("/") {|res| }
150+ http.cert_store = TEST_STORE
151+ http.request_get("/") {|res|
152+ assert_equal($test_net_http_data, res.body)
153 }
154- assert_match(/hostname \"127.0.0.1\" does not match/, ex.message)
155 end
156
157 def test_max_version
diff --git a/debian/patches/rubygems-2388.patch b/debian/patches/rubygems-2388.patch
0new file mode 100644158new file mode 100644
index 0000000..26bf929
--- /dev/null
+++ b/debian/patches/rubygems-2388.patch
@@ -0,0 +1,15 @@
1Description: Allow either Fetcher or OpenSSL exceptions when using invalid cert in rubygems testcase.
2Author: Dimitri John Ledkov <xnox@ubuntu.com>
3Bug-Upstream: https://github.com/rubygems/rubygems/issues/2388
4
5--- ruby2.5-2.5.1.orig/test/rubygems/test_gem_remote_fetcher.rb
6+++ ruby2.5-2.5.1/test/rubygems/test_gem_remote_fetcher.rb
7@@ -842,7 +842,7 @@ PeIQQkFng2VVot/WAQbv3ePqWq07g1BBcwIBAg==
8 with_configured_fetcher(
9 ":ssl_ca_cert: #{temp_ca_cert}\n" +
10 ":ssl_client_cert: #{temp_client_cert}\n") do |fetcher|
11- assert_raises Gem::RemoteFetcher::FetchError do
12+ assert_raises Gem::RemoteFetcher::FetchError, OpenSSL::SSL::SSLError do
13 fetcher.fetch_path("https://localhost:#{ssl_server.config[:Port]}/yaml")
14 end
15 end
diff --git a/debian/patches/series b/debian/patches/series
index 7ca7914..7ef25fc 100644
--- a/debian/patches/series
+++ b/debian/patches/series
@@ -9,3 +9,7 @@
90009-test-test_pair-fix-deadlock-in-test_connect_accept_n.patch90009-test-test_pair-fix-deadlock-in-test_connect_accept_n.patch
100010-test-use-larger-keys-for-SSL-tests.patch100010-test-use-larger-keys-for-SSL-tests.patch
110011-Update-for-tzdata-2018f.patch110011-Update-for-tzdata-2018f.patch
121dfc377ae3b174b043d3f0ed36de57b0296b34d0.patch
130001-openssl-buffering.rb-no-RS-when-output.patch
140006-Workaround-for-old-LibreSSL.patch
15rubygems-2388.patch

Subscribers

People subscribed via source and target branches