Re: I've broken something

2023-03-23 Thread Hal Murray via devel


> I am reasonably sure about it. Jammy comes from [1] which come after looking
> at ./dockerfiles/ubuntu-latest to get ubuntu:latest 

Thanks.


> Seriously though, docker works great for this, and you don't need to glass
> wipe a machine. 

But I don't know anything about docker and I do know how to install Ubuntu.

Is there a getting started HOWTO for docker?


-- 
These are my opinions.  I hate spam.



___
devel mailing list
devel@ntpsec.org
https://lists.ntpsec.org/mailman/listinfo/devel


Re: I've broken something

2023-03-23 Thread James Browning via devel
> On 03/23/2023 4:55 PM PDT Hal Murray  wrote:
>  
> James Browning said:
> >> Where/how do I get ubuntu-latest?
> > I would suggest `docker push registry.gitlab.com/na280/ntpsec`, but it seems
> > that it rarely is acceptable, or go to the Ubuntu website and download 
> > Jammy.
> 
> Are you sure about Jammy?  Where did that come from?

I am reasonably sure about it. Jammy
comes from [1] which come after looking at
./dockerfiles/ubuntu-latest to get ubuntu:latest

> I found a download page for Ubuntu 22.04.2 LTS (Jammy Jellyfish)
> But 22.04 is almost a year old which doesn't match my expectations for 
> "latest".
> It is the latest for their LTS.
> 
> I have 22.10 (Kinetic Kudu)
> It works.
> 
> I have 20.04.6 LTS (Focal Fossa), but that's running on a Raspberry Pi rather 
> than a PC.
> It works.
> 
> I guess I'll settup Jammy on a PC.

[1] hub.docker.com/_/ubuntu

Seriously though, docker works great for this,
and you don't need to glass wipe a machine.
___
devel mailing list
devel@ntpsec.org
https://lists.ntpsec.org/mailman/listinfo/devel


Re: I've broken something

2023-03-23 Thread Hal Murray via devel


James Browning said:
>> Where/how do I get ubuntu-latest?
> I would suggest `docker push registry.gitlab.com/na280/ntpsec`, but it seems
> that it rarely is acceptable, or go to the Ubuntu website and download Jammy.

Are you sure about Jammy?  Where did that come from?

I found a download page for Ubuntu 22.04.2 LTS (Jammy Jellyfish)
But 22.04 is almost a year old which doesn't match my expectations for 
"latest".
It is the latest for their LTS.

I have 22.10 (Kinetic Kudu)
It works.

I have 20.04.6 LTS (Focal Fossa), but that's running on a Raspberry Pi rather 
than a PC.
It works.

I guess I'll settup Jammy on a PC.


-- 
These are my opinions.  I hate spam.



___
devel mailing list
devel@ntpsec.org
https://lists.ntpsec.org/mailman/listinfo/devel


Re: I've broken something

2023-03-23 Thread James Browning via devel
> On 03/23/2023 12:46 AM PDT Hal Murray via devel  wrote:
> 
> 
> The pipeline fails on:
> Name: ubuntu-latest-basic
> Name: ubuntu-latest-refclocks
> Name: macos-basic
> Name: macos-refclocks
> 
> All 4 get the same clump of errors:
> 
:::snip:::
> 
> This code area isn't wonderful. It leaves a lot of stuff in global variables
> so it can decrypt stuff it just encrypted. The code works on all my test
> cases.
> 
> Anybody know what version of OpenSSL macos or ubuntu-latest are using? There
> was a new version released recently: 3.0 => 3.1, I think. None of the other
> distros I test with are using 3.1 yet.

ubuntu-latest runs 3.0.2 [1], and my Ubuntu box with 3.0.8 passes.

> Where/how do I get ubuntu-latest?

I would suggest `docker push registry.gitlab.com/na280/ntpsec`,
but it seems that it rarely is acceptable, or go to the Ubuntu
website and download Jammy.

> We should patch the configure stuff to print out the version of OpenSSL that
> it finds.

I have a branch that does that badly. [2]

[1] https://gitlab.com/na280/ntpsec/-/jobs/3987240899

[2] https://gitlab.com/na280/ntpsec/-/commits/tlscheck
___
devel mailing list
devel@ntpsec.org
https://lists.ntpsec.org/mailman/listinfo/devel


I've broken something

2023-03-23 Thread Hal Murray via devel


The pipeline fails on:
  Name: ubuntu-latest-basic
  Name: ubuntu-latest-refclocks
  Name: macos-basic
  Name: macos-refclocks

All 4 get the same clump of errors:

TEST(macencrypt, CMAC_Encrypt)../../tests/libntp/macencrypt.c:109::FAIL: 
Expected TRUE Was FALSE
TEST(macencrypt, CMAC_Encrypt)../../tests/libntp/macencrypt.c:109::FAIL: 
Expected TRUE Was FALSE
TEST(macencrypt, DecryptValidCMAC)../../tests/libntp/macencrypt.c:133::FAIL: 
Expected TRUE Was FALSE
TEST(macencrypt, DecryptInvalidCMAC) PASS
TEST(macencrypt, IPv4AddressToRefId) PASS
TEST(macencrypt, IPv6AddressToRefId) PASS
TEST(macencrypt, null_trunc) PASS
TEST(macencrypt, CMAC_TestVectors)../../tests/libntp/macencrypt.c:297::FAIL: 
Memory Mismatch. Byte 0 Expected 0x07 Was 0xE5

This code area isn't wonderful.  It leaves a lot of stuff in global variables 
so it can decrypt stuff it just encrypted.  The code works on all my test 
cases.

Anybody know what version of OpenSSL macos or ubuntu-latest are using?  There 
was a new version released recently: 3.0 => 3.1, I think.  None of the other 
distros I test with are using 3.1 yet.

Where/how do I get ubuntu-latest?



We should patch the configure stuff to print out the version of OpenSSL that 
it finds.


-- 
These are my opinions.  I hate spam.



___
devel mailing list
devel@ntpsec.org
https://lists.ntpsec.org/mailman/listinfo/devel