This project is mirrored from https://github.com/libevent/libevent.git.
Pull mirroring updated .
- 14 Aug, 2022 1 commit
-
-
Azat Khuzhin authored
Fixes: c198b0ce ("test: fix util/getaddrinfo for netbsd") Fixes: #1316
-
- 13 Aug, 2022 6 commits
-
-
Azat Khuzhin authored
In it's current form, libevent requires multiple struct evhttp objects to be created in order to enable listening on sockets with more than one type of encryption. This change allows specifying per-socket how the associated bufferevents should be created. Thus, it becomes possible to have multiple listening sockets with different encryption parameters using only one evttp.
-
Azat Khuzhin authored
Fixes: #1316
-
Borys Smejda authored
Deleted usage of CMake feature 'file(REAL_PATH' which is available from version 3.19 with an old 'get_filename_component' so that older version of CMake can still be used to configure the project.
-
Leon M. George authored
Co-authored-by:
Azat Khuzhin <azat@libevent.org> v2: remove handling of HTTP_BIND_IPV6
-
Azat Khuzhin authored
-
Azat Khuzhin authored
-
- 08 Aug, 2022 4 commits
-
-
Dmitry Ilyin authored
There can be issues on 32-bit architectures to mmap 2+GiB file, and to make this portable between different version of glibc, mmap64 was prefered over _FILE_OFFSET_BITS
-
neil authored
-
neil authored
-
neil authored
ci/linux skip ci/macos skip ci/windows skip ci/mingw skip
-
- 07 Aug, 2022 3 commits
-
-
Haowei Hsu authored
-
Haowei Hsu authored
-
Dmitry Ilyin authored
-
- 12 Jul, 2022 5 commits
-
-
Azat Khuzhin authored
-
Azat Khuzhin authored
Right now it is possible for some tests to fail, because of lack of CPU time. And it is better to have green CI even if this will take longer.
-
Azat Khuzhin authored
* ci-tsan-recent: test: fix unused variable in rand test (catched by newer clang) ci: use ubuntu 22.04 with clang 11 for sanitizers build
-
Azat Khuzhin authored
-
Azat Khuzhin authored
There are periodically some heap-use-after-free reported in ratelim tests by TSan, which I cannot reproduce locally and even on CI it is flaky. Let's try to use recent clang, maybe it fixes some issues in sanitizers. Refs: #1206
-
- 11 Jul, 2022 6 commits
-
-
Azat Khuzhin authored
Fixes: #1304
-
Azat Khuzhin authored
-
Azat Khuzhin authored
-
Azat Khuzhin authored
-
Azat Khuzhin authored
-
Azat Khuzhin authored
Right now because we have separate workflows there is no one page with all the jobs, instead we have separate page for each workflow (linux, windows, ...) This is pretty inconvenient, so let's make it cleaner, and now we will have only two: - for pull requests - for upstream/master
-
- 10 Jul, 2022 13 commits
-
-
Azat Khuzhin authored
Previously evdns was using HOST_NAME_MAX, and define it to 255 *only* if it not set, however it does set on linux: $ egrep -r define.*HOST_NAME_MAX /usr/include/bits /usr/include/bits/local_lim.h:#define HOST_NAME_MAX 64 /usr/include/bits/posix1_lim.h:#define _POSIX_HOST_NAME_MAX 255 /usr/include/bits/confname.h:#define _SC_HOST_NAME_MAX _SC_HOST_NAME_MAX But 64 should be the limit of the host component, not for the whole hostname, as also noted by @ploxiln So use our own EVDNS_NAME_MAX const, which is set to 255. Fixes: #1280
-
Azat Khuzhin authored
Fixes: #1271 Follow-up for: 90bcf2d6
-
Azat Khuzhin authored
Refs: #1228
-
Azat Khuzhin authored
Since [1] github actions official support skipping workflows based on the message. [1]: https://github.blog/changelog/2021-02-08-github-actions-skip-pull-request-and-push-workflows-with-skip-ci/
-
Azat Khuzhin authored
Public CI workers has pretty high load, and sometimes you need to test only specific workflow, i.e. windows. So let's add ability to limit which workflow should be run.
-
Azat Khuzhin authored
* openssl-3: ci: use ubuntu 22.04 with OpenSSl 3.0 instead of building OpenSSL from sources ci: set LD_LIBRARY_PATH for openssl 3.0 build test: suppress warning for already defined SSL_get_peer_certificate autotools: print $OPENSSL_LIBS/$OPENSSL_INCS Suppress -Wunused-value for BIO_set_close() Use OPENSSL_VERSION_NUMBER over OPENSSL_VERSION_MAJOR (for compatibility) Attempt to add OpenSSL 3 to the Linux build matrix Initial OpenSSL 3.0 support
-
Azat Khuzhin authored
-
Azat Khuzhin authored
Fixes: /home/runner/work/libevent/libevent/build/test/.libs/regress: error while loading shared libraries: libssl.so.3: cannot open shared object file: No such file or directory
-
Azat Khuzhin authored
build report: [1/2] Building C object CMakeFiles/regress.dir/test/regress_mbedtls.c.o /src/le/libevent/test/regress_mbedtls.c:50: warning: "SSL_get_peer_certificate" redefined 50 | #define SSL_get_peer_certificate mbedtls_ssl_get_peer_cert | In file included from /src/le/libevent/test/regress.h:139, from /src/le/libevent/test/regress_mbedtls.c:35: /src/oss/openssl/include/openssl/ssl.h:1799: note: this is the location of the previous definition 1799 | # define SSL_get_peer_certificate SSL_get1_peer_certificate | [2/2] Linking C executable bin/regress But this should be cleaned up.
-
Azat Khuzhin authored
-
Azat Khuzhin authored
-
Azat Khuzhin authored
Since OpenSSL 3.0 there is new OPENSSL_VERSION_MAJOR, but previous releases does not have it. So let's use plain old OPENSSL_VERSION_NUMBER to avoid more preprocessor macros.
-
William Marlow authored
v2: fix echo messages v3: fix autotools build (wrong path to pkg config)
-
- 09 Jul, 2022 2 commits
-
-
William Marlow authored
* Don't use deprecated functions when building against OpenSSL 3.0. * Recognise that OpenSSL 3.0 can signal a dirty shutdown as a protocol. error in addition to the expected IO error produced by OpenSSL 1.1.1 * Update regress_mbedtls.c for compatibility with OpenSSL 3
-
Azat Khuzhin authored
* mbedtls-3: sample/ssl-client-mbedtls.c: fix for MbedTLS 3 sample/ssl-client-mbedtls.c: break the loop on EOF sample/ssl-client-mbedtls.c: fix printing response in readcb Initial Mbed-TLS 3 support to get the GitHub Actions working again Support build dir of the MbedTLS
-