From patchwork Mon Sep 12 01:07:45 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Arne Schwabe X-Patchwork-Id: 2752 Return-Path: Delivered-To: patchwork@openvpn.net Delivered-To: patchwork@openvpn.net Received: from director8.mail.ord1d.rsapps.net ([172.30.191.6]) by backend30.mail.ord1d.rsapps.net with LMTP id OPqaGS4TH2MIOwAAIUCqbw (envelope-from ) for ; Mon, 12 Sep 2022 07:08:30 -0400 Received: from proxy18.mail.ord1d.rsapps.net ([172.30.191.6]) by director8.mail.ord1d.rsapps.net with LMTP id 0FVXGS4TH2MHPAAAfY0hYg (envelope-from ) for ; Mon, 12 Sep 2022 07:08:30 -0400 Received: from smtp13.gate.ord1c ([172.30.191.6]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) by proxy18.mail.ord1d.rsapps.net with LMTPS id WATWGC4TH2MkQwAATCaURg (envelope-from ) for ; Mon, 12 Sep 2022 07:08:30 -0400 X-Spam-Threshold: 95 X-Spam-Score: 0 X-Spam-Flag: NO X-Virus-Scanned: OK X-Orig-To: openvpnslackdevel@openvpn.net X-Originating-Ip: [216.105.38.7] Authentication-Results: smtp13.gate.ord1c.rsapps.net; iprev=pass policy.iprev="216.105.38.7"; spf=pass smtp.mailfrom="openvpn-devel-bounces@lists.sourceforge.net" smtp.helo="lists.sourceforge.net"; dkim=fail (signature verification failed) header.d=sourceforge.net; dkim=fail (signature verification failed) header.d=sf.net; dmarc=none (p=nil; dis=none) header.from=rfc2549.org X-Suspicious-Flag: YES X-Classification-ID: 3b15391a-328b-11ed-845a-bc305bf03494-1-1 Received: from [216.105.38.7] ([216.105.38.7:57262] helo=lists.sourceforge.net) by smtp13.gate.ord1c.rsapps.net (envelope-from ) (ecelerity 4.2.38.62370 r(:)) with ESMTPS (cipher=DHE-RSA-AES256-GCM-SHA384) id C7/81-22490-D231F136; Mon, 12 Sep 2022 07:08:29 -0400 Received: from [127.0.0.1] (helo=sfs-ml-1.v29.lw.sourceforge.com) by sfs-ml-1.v29.lw.sourceforge.com with esmtp (Exim 4.95) (envelope-from ) id 1oXhIB-0005yv-AA; Mon, 12 Sep 2022 11:07:55 +0000 Received: from [172.30.20.202] (helo=mx.sourceforge.net) by sfs-ml-1.v29.lw.sourceforge.com with esmtps (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.95) (envelope-from ) id 1oXhI9-0005yb-HP for openvpn-devel@lists.sourceforge.net; Mon, 12 Sep 2022 11:07:53 +0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=sourceforge.net; s=x; h=Content-Transfer-Encoding:MIME-Version:Message-Id: Date:Subject:To:From:Sender:Reply-To:Cc:Content-Type:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:In-Reply-To:References:List-Id:List-Help:List-Unsubscribe: List-Subscribe:List-Post:List-Owner:List-Archive; bh=zWWIUSlh4sGs2bC4KHZ56NfgdELf2ibwxEOuO0Y8dfg=; b=BnI2RAXqfDbJfgtJhwbz6rJMFT K7EIxZGYF8eW90hqjGuA6wON8B1ijsisMS338O6NHGQL1yMnfffKAJTgy7GoDbOWu4iCYg3aHxSbq QxTueWJbXu6ggKIbkB40bkFaXwbEa4wIxkHUpZujaNnOpfzu2zIiLtpMmDqC1vno7gQU=; DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=sf.net; s=x ; h=Content-Transfer-Encoding:MIME-Version:Message-Id:Date:Subject:To:From: Sender:Reply-To:Cc:Content-Type:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To: References:List-Id:List-Help:List-Unsubscribe:List-Subscribe:List-Post: List-Owner:List-Archive; bh=zWWIUSlh4sGs2bC4KHZ56NfgdELf2ibwxEOuO0Y8dfg=; b=K ILyCJjlKYhpIe2NLTKIwj4wwF0uZ2PrdtQgSBB3kPqHKD0vnQtF6LkN+vKfRXnqd9xEhx1GTlhrLP 742qk/0sWFK3Cr6YsLNIZK55hV5c7bUAvLyd4H4auLmhvZ7URnrVhqJa2FoJGs/mZ2FdGR1k4aiW1 cdyPR7CqYzXsaWhk=; Received: from mail.blinkt.de ([192.26.174.232]) by sfi-mx-1.v28.lw.sourceforge.com with esmtps (TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.95) id 1oXhI8-005nLu-Ix for openvpn-devel@lists.sourceforge.net; Mon, 12 Sep 2022 11:07:53 +0000 Received: from kamera.blinkt.de ([2001:638:502:390:20c:29ff:fec8:535c]) by mail.blinkt.de with smtp (Exim 4.95 (FreeBSD)) (envelope-from ) id 1oXhI1-000EED-8J for openvpn-devel@lists.sourceforge.net; Mon, 12 Sep 2022 13:07:45 +0200 Received: (nullmailer pid 2332561 invoked by uid 10006); Mon, 12 Sep 2022 11:07:45 -0000 From: Arne Schwabe To: openvpn-devel@lists.sourceforge.net Date: Mon, 12 Sep 2022 13:07:45 +0200 Message-Id: <20220912110745.2332513-1-arne@rfc2549.org> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 X-Spam-Report: Spam detection software, running on the system "util-spamd-2.v13.lw.sourceforge.com", has NOT identified this incoming email as spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see the administrator of that system for details. Content preview: This builds wolfSSL as part of the github actions with gcc and clang+asan and will allow us to see how well wolfSSL is maintaining the support in OpenVPN. Signed-off-by: Arne Schwabe --- .github/workflows/build.yaml | 69 ++++++++++++++++++++++++++++++++++++ 1 file changed, 69 insertions(+) Content analysis details: (0.2 points, 6.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- 0.0 SPF_NONE SPF: sender does not publish an SPF Record 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record 0.2 HEADER_FROM_DIFFERENT_DOMAINS From and EnvelopeFrom 2nd level mail domains are different -0.0 T_SCC_BODY_TEXT_LINE No description available. X-Headers-End: 1oXhI8-005nLu-Ix Subject: [Openvpn-devel] [PATCH] Add wolfSSL to github actions X-BeenThere: openvpn-devel@lists.sourceforge.net X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: openvpn-devel-bounces@lists.sourceforge.net X-getmail-retrieved-from-mailbox: Inbox This builds wolfSSL as part of the github actions with gcc and clang+asan and will allow us to see how well wolfSSL is maintaining the support in OpenVPN. Signed-off-by: Arne Schwabe --- .github/workflows/build.yaml | 69 ++++++++++++++++++++++++++++++++++++ 1 file changed, 69 insertions(+) diff --git a/.github/workflows/build.yaml b/.github/workflows/build.yaml index f34f6a266..2feb7e671 100644 --- a/.github/workflows/build.yaml +++ b/.github/workflows/build.yaml @@ -34,6 +34,75 @@ jobs: - name: Set job status run: test ! -s uncrustify-changes.patch working-directory: openvpn + wolfssl: + strategy: + fail-fast: false + matrix: + os: [ubuntu-20.04] + ssllib: [wolfssl] + build: [normal, asan ] + include: + - build: asan + cflags: "-fsanitize=address -fno-optimize-sibling-calls -fsanitize-address-use-after-scope -fno-omit-frame-pointer -g -O1" + ldflags: -fsanitize=address + cc: clang + - build: normal + cflags: "-O2 -g" + ldflags: "" + configureflags: "" + cc: gcc + + name: "${{matrix.cc}} ${{matrix.build}} - ${{matrix.os}} - ${{matrix.ssllib}}" + runs-on: ${{matrix.os}} + env: + CFLAGS: ${{ matrix.cflags }} + LDFLAGS: ${{ matrix.ldflags }} + CC: ${{matrix.cc}} + + steps: + - name: Install dependencies + run: sudo apt update && sudo apt install -y build-essential liblzo2-dev libpam0g-dev liblz4-dev linux-libc-dev man2html clang libcmocka-dev python3-docutils libtool automake autoconf libmbedtls-dev pkg-config libcap-ng-dev + + - name: Cache dependencies + id: cache + uses: actions/cache@v3 + with: + path: '/opt/wolfssl' + key: ${{ matrix.build }}-wolfSSL + - name: "wolfSSL: checkout" + if: steps.cache.outputs.cache-hit != 'true' + uses: actions/checkout@v3 + with: + path: wolfssl + repository: wolfSSL/wolfssl + - name: "wolfSSL: autoconf" + if: steps.cache.outputs.cache-hit != 'true' + run: autoreconf -fvi + working-directory: wolfssl + - name: "wolfSSL: configure" + if: steps.cache.outputs.cache-hit != 'true' + run: ./configure --enable-openvpn --prefix=/opt/wolfssl + working-directory: wolfssl + - name: "wolfSSL: make all" + if: steps.cache.outputs.cache-hit != 'true' + run: make -j3 + working-directory: wolfssl + - name: "wolfSSL: make install" + if: steps.cache.outputs.cache-hit != 'true' + run: sudo make install + working-directory: wolfssl + - name: "ldconfig" + run: sudo ldconfig + - name: Checkout OpenVPN + uses: actions/checkout@v3 + - name: autoconf + run: autoreconf -fvi + - name: configure ${{matrix.configureflag}} + run: PKG_CONFIG_PATH=/opt/wolfssl/lib/pkgconfig ./configure --with-crypto-library=${{matrix.ssllib}} --enable-werror + - name: make all + run: make -j3 + - name: make check + run: make check mingw: strategy: