Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(auxiliary/nginx) set off_t to 64bit per nginx config #32

Merged
merged 1 commit into from
Sep 28, 2021

Conversation

fffonion
Copy link
Owner

Fix #16

@fffonion fffonion merged commit 8c209fa into master Sep 28, 2021
@fffonion fffonion deleted the fix/armv7 branch September 28, 2021 08:19
bungle added a commit to Kong/kong that referenced this pull request Nov 5, 2021
### Summary

#### [0.8.1] - 2021-11-05
##### bug fixes
- **ssl_ctx:** fix typo when getting SSL_CTX from request [7b9e90f](fffonion/lua-resty-openssl@7b9e90f)

##### features
- **ctx:** add ctx module to provide OSSL_LIB_CTX context [65750bf](fffonion/lua-resty-openssl@65750bf)

#### [0.8.0] - 2021-10-29
##### bug fixes
- **\*:** move EVP_* definition into seperate files [e0c3d61](fffonion/lua-resty-openssl@e0c3d61)
- **auxiliary/nginx:** set off_t to 64bit per nginx config ([#32](fffonion/lua-resty-openssl#32)) [8c209fa](fffonion/lua-resty-openssl@8c209fa)
- **pkey:** allow sign/verify without md_alg for EdDSA on BoringSSL [ab83fd4](fffonion/lua-resty-openssl@ab83fd4)
- **x509:** compatibility for BoringSSL 1.1.0 (fips-20190808) [84244af](fffonion/lua-resty-openssl@84244af)

##### features
- **evp:** add geneirc function to get and set params [c724e1d](fffonion/lua-resty-openssl@c724e1d)
- **kdf:** add new API with EVP_KDF interfaces [2336ae3](fffonion/lua-resty-openssl@2336ae3)
- **mac:** add EVP_MAC [0625be9](fffonion/lua-resty-openssl@0625be9)
- **openssl:** add function list mac and kdf algorithms and set properties for EVP algorithm fetches [0ed8316](fffonion/lua-resty-openssl@0ed8316)
- **openssl:** support FIPS in OpenSSL 3.0 [beb3ad3](fffonion/lua-resty-openssl@beb3ad3)
- **param:** add new function to use OSSL_PARAM [5ffbbcc](fffonion/lua-resty-openssl@5ffbbcc)
- **provider:** cipher, digest, kdf, pkey and x509 can now fetch by provider and has new get_provider_name function [52938ca](fffonion/lua-resty-openssl@52938ca)
bungle added a commit to Kong/kong that referenced this pull request Nov 5, 2021
### Summary

#### [0.8.1] - 2021-11-05
##### bug fixes
- **ssl_ctx:** fix typo when getting SSL_CTX from request [7b9e90f](fffonion/lua-resty-openssl@7b9e90f)

##### features
- **ctx:** add ctx module to provide OSSL_LIB_CTX context [65750bf](fffonion/lua-resty-openssl@65750bf)

#### [0.8.0] - 2021-10-29
##### bug fixes
- **\*:** move EVP_* definition into seperate files [e0c3d61](fffonion/lua-resty-openssl@e0c3d61)
- **auxiliary/nginx:** set off_t to 64bit per nginx config ([#32](fffonion/lua-resty-openssl#32)) [8c209fa](fffonion/lua-resty-openssl@8c209fa)
- **pkey:** allow sign/verify without md_alg for EdDSA on BoringSSL [ab83fd4](fffonion/lua-resty-openssl@ab83fd4)
- **x509:** compatibility for BoringSSL 1.1.0 (fips-20190808) [84244af](fffonion/lua-resty-openssl@84244af)

##### features
- **evp:** add geneirc function to get and set params [c724e1d](fffonion/lua-resty-openssl@c724e1d)
- **kdf:** add new API with EVP_KDF interfaces [2336ae3](fffonion/lua-resty-openssl@2336ae3)
- **mac:** add EVP_MAC [0625be9](fffonion/lua-resty-openssl@0625be9)
- **openssl:** add function list mac and kdf algorithms and set properties for EVP algorithm fetches [0ed8316](fffonion/lua-resty-openssl@0ed8316)
- **openssl:** support FIPS in OpenSSL 3.0 [beb3ad3](fffonion/lua-resty-openssl@beb3ad3)
- **param:** add new function to use OSSL_PARAM [5ffbbcc](fffonion/lua-resty-openssl@5ffbbcc)
- **provider:** cipher, digest, kdf, pkey and x509 can now fetch by provider and has new get_provider_name function [52938ca](fffonion/lua-resty-openssl@52938ca)
fffonion pushed a commit that referenced this pull request May 28, 2024
In some cases, a challenge may be already validated by ACME (possibly due to another bug or Pebble checking our implementation against RFC). That would fail with the message Cannot update challenge with status valid, only status pending.

This PR fixes that. We should only process challenge (register, then signal) when its state is pending. Also, we should continue certificate order process there is a valid challenge already while no other challenges were registered.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

"u.peer.connection.ssl is nil" after a successful sslhandshake on ARMv7
1 participant