Re: [PR] Support OpenSSL3 providers / cert store URLs [serf]

2025-06-21 Thread via GitHub
minfrin commented on code in PR #8: URL: https://github.com/apache/serf/pull/8#discussion_r2160234074 ## buckets/ssl_buckets.c: ## @@ -1567,14 +1626,214 @@ static int ssl_need_client_cert(SSL *ssl, X509 **cert, EVP_PKEY **pkey) return 1; } +#if defined(SERF_HAVE

Re: [PR] CMake GitHub workflow imporovements [serf]

2025-06-21 Thread via GitHub
dsahlberg-apache-org commented on code in PR #6: URL: https://github.com/apache/serf/pull/6#discussion_r2160236466 ## .github/workflows/windows-cmake.yml: ## @@ -44,21 +44,29 @@ jobs: - uses: actions/checkout@v3 + - name: Prepare Environment (Windows) +if

Re: [PR] Remove MD5 CRL from SSL tests [serf]

2025-06-21 Thread via GitHub
dsahlberg-apache-org commented on code in PR #7: URL: https://github.com/apache/serf/pull/7#discussion_r2160121836 ## buckets/ssl_buckets.c: ## @@ -890,6 +890,10 @@ validate_server_certificate(int cert_valid, X509_STORE_CTX *store_ctx) case X509_V_ERR_UNABLE_TO_GET

Re: [PR] CMake GitHub workflow imporovements [serf]

2025-06-21 Thread Branko Čibej
On 22. 6. 25 02:11, brainy (via GitHub) wrote: brainy commented on PR #6: URL:https://github.com/apache/serf/pull/6#issuecomment-2993831947 > (GitHub merge completely destroyed the branch for some reason, and I didn't initially noticed that. So commits are a bit messed up. Sorry :-S)

Re: [PR] CMake GitHub workflow imporovements [serf]

2025-06-21 Thread via GitHub
brainy commented on PR #6: URL: https://github.com/apache/serf/pull/6#issuecomment-2993831947 > (GitHub merge completely destroyed the branch for some reason, and I didn't initially noticed that. So commits are a bit messed up. Sorry :-S) I propose to close this pull request and go ba

Re: [PR] CMake GitHub workflow imporovements [serf]

2025-06-21 Thread via GitHub
brainy commented on PR #6: URL: https://github.com/apache/serf/pull/6#issuecomment-2993831073 > I think this was discussed on the list. I can't really judge the implications of one over the other. It was mentioned onlist where @rinrab had some arguments in favour of moving to Ninja. >

Re: [PR] CMake GitHub workflow imporovements [serf]

2025-06-21 Thread via GitHub
chemodax commented on code in PR #6: URL: https://github.com/apache/serf/pull/6#discussion_r2160171234 ## .github/workflows/windows-cmake.yml: ## @@ -44,21 +44,29 @@ jobs: - uses: actions/checkout@v3 + - name: Prepare Environment (Windows) +if: runner.os

Re: [PR] CMake GitHub workflow imporovements [serf]

2025-06-21 Thread via GitHub
rinrab commented on PR #6: URL: https://github.com/apache/serf/pull/6#issuecomment-2993798759 (GitHub merge completely destroyed the branch for some reason, and I didn't initially noticed that. So commits are a bit messed up. Sorry :-S) -- This is an automated message from the Apache Git

Re: [PR] CMake GitHub workflow imporovements [serf]

2025-06-21 Thread via GitHub
rinrab commented on PR #6: URL: https://github.com/apache/serf/pull/6#issuecomment-2993797979 @chemodax The main reason why I decided to use Ninja **Multi-Config** is because before VC.Net generator was used to build both (debug and release) versions. So, when using Ninja Multi-Config we be

Re: [PR] cmake imporovements [serf]

2025-06-21 Thread via GitHub
rinrab commented on PR #6: URL: https://github.com/apache/serf/pull/6#issuecomment-2993620179 @dsahlberg-apache-org, this PR also contains Ninja usage in the github workflow which wasn't committed yet. -- This is an automated message from the Apache Git Service. To respond to the message,

Re: [PR] CMake GitHub workflow imporovements [serf]

2025-06-21 Thread via GitHub
chemodax commented on PR #6: URL: https://github.com/apache/serf/pull/6#issuecomment-2993718011 I would like to suggest use Ninja (not multi-config generator) for Windows build: 1. It's fast. 2. It's default. 3. This is how vcpkg and other typical consumer will use Serf. Just

Re: [PR] Remove MD5 CRL from SSL tests [serf]

2025-06-21 Thread via GitHub
chemodax commented on code in PR #7: URL: https://github.com/apache/serf/pull/7#discussion_r2160116439 ## serf_bucket_types.h: ## @@ -583,6 +583,8 @@ serf_bucket_t *serf_bucket_limit_create( #define SERF_SSL_OCSP_RESPONDER_ERROR 0x0200 #define SERF_SSL_OCSP_RESPONDER

Re: [PR] CMake GitHub workflow imporovements [serf]

2025-06-21 Thread via GitHub
dsahlberg-apache-org commented on PR #6: URL: https://github.com/apache/serf/pull/6#issuecomment-2993636263 I think this was discussed on the list. I can't really judge the implications of one over the other. It was mentioned onlist where @rinrab had some arguments in favour of moving to Ni

Re: Strange bit of code in Serf hpack_buckets.c

2025-06-21 Thread Daniel Sahlberg
Den fre 20 juni 2025 kl 08:12 skrev Branko Čibej : > Hi Bert, > > I've been going through the Serf code on trunk, trying to fix compiler > warnings, and found something that I don't understand and don't want to > just "fix" and possibly introduce a bug. I'm asking for your help, as > you're the au

Re: [PR] Remove MD5 CRL from SSL tests [serf]

2025-06-21 Thread via GitHub
dsahlberg-apache-org commented on PR #7: URL: https://github.com/apache/serf/pull/7#issuecomment-2993630397 @brainy Are you happy with the new SERF_SSL_SIGNATURE_FAILURE error code? I intend to commit this in two more batches: - SERF_SSL_SIGNATURE_FAILURE, basically buckets/ssl_buck

Re: [PR] cmake imporovements [serf]

2025-06-21 Thread via GitHub
dsahlberg-apache-org commented on PR #6: URL: https://github.com/apache/serf/pull/6#issuecomment-2993617465 @rinrab, are you happy with r1926240:1926243, ie: should we close this PR? -- This is an automated message from the Apache Git Service. To respond to the message, please log on to G

Re: [PR] Support OpenSSL3 providers / cert store URLs [serf]

2025-06-21 Thread via GitHub
brainy commented on code in PR #8: URL: https://github.com/apache/serf/pull/8#discussion_r2160046553 ## buckets/ssl_buckets.c: ## @@ -1567,14 +1626,214 @@ static int ssl_need_client_cert(SSL *ssl, X509 **cert, EVP_PKEY **pkey) return 1; } +#if defined(SERF_HAVE_

svn commit: r1926623 - /serf/trunk/test/certs/create_certs.py

2025-06-21 Thread dsahlberg
Author: dsahlberg Date: Sat Jun 21 13:29:19 2025 New Revision: 1926623 URL: http://svn.apache.org/viewvc?rev=1926623&view=rev Log: Make script compatible with Py3. * test/certs/create_certs.py (create_key): decode string when writing to file (create_pkcs12): write file in binary mode (creat

Re: [PR] Remove MD5 CRL from SSL tests [serf]

2025-06-21 Thread via GitHub
dsahlberg-apache-org commented on PR #7: URL: https://github.com/apache/serf/pull/7#issuecomment-2993586060 I've committed the py3 changes in r1926623. However, as Brane has already written, it would be good to update it to python-cryptography. In particular I had problems with crypto.PKC

svn commit: r1926610 - /serf/trunk/.github/workflows/linux-old-scons.yml

2025-06-21 Thread brane
Author: brane Date: Sat Jun 21 06:09:56 2025 New Revision: 1926610 URL: http://svn.apache.org/viewvc?rev=1926610&view=rev Log: * .github/workflows/linux-old-scons.yml: Add temporary debugging steps. Modified: serf/trunk/.github/workflows/linux-old-scons.yml Modified: serf/trunk/.github/workf

svn commit: r1926622 - /serf/trunk/.github/workflows/linux-old-scons.yml

2025-06-21 Thread brane
Author: brane Date: Sat Jun 21 12:20:39 2025 New Revision: 1926622 URL: http://svn.apache.org/viewvc?rev=1926622&view=rev Log: Use a newer version of SCons in the linux-old-scons workflow. We need it to support -isystem in env.ParseConfig() for GSSAPI. * .github/workflows/linux-old-scons.yml: Use

Re: [PR] Support OpenSSL3 providers / cert store URLs [serf]

2025-06-21 Thread Graham Leggett
On 20 Jun 2025, at 21:49, Branko Čibej wrote: > Misunderstanding here. It's clearly possible to do this without exposing the > URIs in the public API, and it's what we should do. I agree it's unlikely > that a user would want to, e.g., request certs from the macOS Keychain > instead of the Win

svn commit: r1926615 - /serf/trunk/test/certs/create_certs.py

2025-06-21 Thread dsahlberg
Author: dsahlberg Date: Sat Jun 21 09:31:09 2025 New Revision: 1926615 URL: http://svn.apache.org/viewvc?rev=1926615&view=rev Log: Remove inconsistent trailing witespace. No functional change. * test/certs/create_certs.py (*): As above Modified: serf/trunk/test/certs/create_certs.py Modif

Re: [PR] Support OpenSSL3 providers / cert store URLs [serf]

2025-06-21 Thread Graham Leggett
On 20 Jun 2025, at 20:43, Ivan Zhakov wrote: > I didn't look at the patch yet, but I have general concern: serf doesn't > depend on OpenSSL. E.g. it may use Crypto API on Windows in future. So I > think we should avoid exposing OpenSSL in public serf API. Is it possible > to abstract URI somehow?