You can enable github actions on your fork (by default actions are disabled)
It should start several builds including libressl and boringssl On Tue, Dec 1, 2020, 1:14 AM Marcoen Hirschberg <marc...@gmail.com> wrote: > Good point, I just tried with boringssl and compilation failed. Thanks for > pointing that out. > > On Mon, Nov 30, 2020 at 8:28 PM Илья Шипицин <chipits...@gmail.com> wrote: > >> will it run on LibreSSL, BoringSSL ? >> >> вт, 1 дек. 2020 г. в 00:26, PR Bot <haproxy-pr-bot-no-re...@ltri.eu>: >> >>> Dear list! >>> >>> Author: Marcoen Hirschberg <marc...@gmail.com> >>> Number of patches: 3 >>> >>> This is an automated relay of the Github pull request: >>> Skip unsupported ciphers for ecdsa cert >>> >>> Patch title(s): >>> MINOR: ssl: variable renames for clarity >>> MINOR: ssl: skip unknown client cipher >>> BUG/MINOR: ssl: only choose ECDSA cert if server and client have >>> common ECDSA ciphers >>> >>> Link: >>> https://github.com/haproxy/haproxy/pull/983 >>> >>> Edit locally: >>> wget https://github.com/haproxy/haproxy/pull/983.patch && vi >>> 983.patch >>> >>> Apply locally: >>> curl https://github.com/haproxy/haproxy/pull/983.patch | git am - >>> >>> Description: >>> >>> >>> Instructions: >>> This github pull request will be closed automatically; patch should be >>> reviewed on the haproxy mailing list (haproxy@formilux.org). >>> Everyone is >>> invited to comment, even the patch's author. Please keep the author >>> and >>> list CCed in replies. Please note that in absence of any response this >>> pull request will be lost. >>> >>>