aboutsummaryrefslogtreecommitdiffstats
path: root/main/nginx/lua-nginx-module~fix-libressl.patch
diff options
context:
space:
mode:
authorJakub Jirutka <jakub@jirutka.cz>2017-04-27 00:21:50 +0200
committerJakub Jirutka <jakub@jirutka.cz>2017-04-28 00:45:03 +0200
commit5115c24f94eab7d3be8ad11e59c82494c05ce3a2 (patch)
treef46e80df73a4f93eb731f1b47978814dee5dbb1f /main/nginx/lua-nginx-module~fix-libressl.patch
parentfda86691c22f67327a08e3b68ae3ead7fc1b6f9c (diff)
downloadaports-5115c24f94eab7d3be8ad11e59c82494c05ce3a2.tar.bz2
aports-5115c24f94eab7d3be8ad11e59c82494c05ce3a2.tar.xz
main/nginx: upgrade to 1.12.0
Upgraded modules: * lua-nginx-module to 0.10.8 * nchan to 1.1.4 * nginx-rtmp-module to 1.1.11
Diffstat (limited to 'main/nginx/lua-nginx-module~fix-libressl.patch')
-rw-r--r--main/nginx/lua-nginx-module~fix-libressl.patch26
1 files changed, 26 insertions, 0 deletions
diff --git a/main/nginx/lua-nginx-module~fix-libressl.patch b/main/nginx/lua-nginx-module~fix-libressl.patch
new file mode 100644
index 0000000000..21a73c1050
--- /dev/null
+++ b/main/nginx/lua-nginx-module~fix-libressl.patch
@@ -0,0 +1,26 @@
+From 7206c8f6fe10136e458d4b3c7ae2b696bd4c8983 Mon Sep 17 00:00:00 2001
+From: Alessandro Ghedini <alessandro@cloudflare.com>
+Date: Thu, 12 May 2016 13:17:52 +0100
+Subject: [PATCH 3/6] bugfix: ssl: do not set tlsext_status_expected flag
+
+In OpenSSL 1.1.0 the SSL struct was made opaque, and setting this
+flag manually is not required anyway since OpenSSL already does that
+automatically when ngx_http_lua_ssl_empty_status_callback() returns
+"OK" (which is always), and an OCSP response has been set.
+
+Upstream-Issue: https://github.com/openresty/lua-nginx-module/pull/761
+---
+ src/ngx_http_lua_ssl_ocsp.c | 1 -
+ 1 file changed, 1 deletion(-)
+
+diff --git a/src/ngx_http_lua_ssl_ocsp.c b/src/ngx_http_lua_ssl_ocsp.c
+index 3904aa8..31b4f24 100644
+--- a/src/ngx_http_lua_ssl_ocsp.c
++++ b/src/ngx_http_lua_ssl_ocsp.c
+@@ -490,7 +490,6 @@ ngx_http_lua_ffi_ssl_set_ocsp_status_resp(ngx_http_request_t *r,
+
+ dd("set ocsp resp: resp_len=%d", (int) resp_len);
+ (void) SSL_set_tlsext_status_ocsp_resp(ssl_conn, p, resp_len);
+- ssl_conn->tlsext_status_expected = 1;
+
+ return NGX_OK;