-
Notifications
You must be signed in to change notification settings - Fork 570
remove openssl dependency #2325
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
In the commit, it would be nice to explicit why we want to remove it :) |
Done |
0f3f94f
to
bca3500
Compare
The issue is somewhere in the delta:
The basic fields differ in |
c39828a
to
bee63dc
Compare
The remaining issues originate from briansmith/ring#1167 (comment) and will be mitigated once |
9518a7e
to
6777c63
Compare
|
2d6e57e
to
6ed6bee
Compare
src/compiler/c.rs
Outdated
@@ -286,7 +286,7 @@ where | |||
.ok() | |||
.map(|f| { | |||
f.flatten() | |||
.filter(|f| f.path().extension().map_or(false, |ext| ext == "bc")) | |||
.filter(|f| f.path().extension().is_some_and(|ext| ext == "bc")) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
What about migrating OpenSSL-unrelated changes to the dedicated PR?
I don't think that changes breaks CI, but this split will minify change set, that is related to failure.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Sure
I cannot reproduce |
238343b
to
40f3eac
Compare
I can occassionally repro the issue locally |
91efbbf
to
c8811ad
Compare
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #2325 +/- ##
==========================================
- Coverage 71.42% 67.07% -4.35%
==========================================
Files 65 64 -1
Lines 36360 35230 -1130
==========================================
- Hits 25970 23632 -2338
- Misses 10390 11598 +1208 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
- Bump rouille from 3.5 => 3.6.2 rouille v3.6.2 fixed a bug: `rouille::Server::new_ssl` is now exposed when only `rustls` is enabled. - Disable default features of `reqwest` which pulls in openssl - Remove `openssl` pulled in `[dev-dependencies]` - Bump reqwest from 0.11.17 => 0.11.18 Signed-off-by: Jiahao XU <[email protected]>
Signed-off-by: Jiahao XU <[email protected]>
Use CRLF on windows and `\n` on Linux. Also fix formatting of `Cargo.toml` Signed-off-by: Jiahao XU <[email protected]>
Signed-off-by: Jiahao XU <[email protected]>
…ns do not contain sha1 support by default
Uses `ring >= 0.7.0` which contains a fix for win on aarch64
It will never work with `picky`, the `openssl` generated certs were invalid in the first place.
Simplifies CI
c8811ad
to
70fac0a
Compare
Continuation of #1742
OpenSSL is a hinderance of both building and distribution, and has been superseeded by rustls and boringssl as safer and alternatives with sufficient subsets for sccache. We hance should not rely on a dependency when there are easier in alternatives.
Particularly difficult use cases when linking against OpenSSL: