- 02 Mar, 2019 1 commit
-
-
Aaron Green authored
This CL updates the roller scripts to incorporate two major changes to the Fuchsia project: 1. Jiri manifests have been moved to an internal integration repo. 2. The "stem", including zircon and garnet has been made monorepo. The result of both of these changes is that roll_boringssl.go script can no longer update manifests, and thus no longer needs to make commits automatically (which was previously error-prone). Updating the internal manifests is now a manual step. A 'check-integration' script is added to make it simple, and the README.fuchsia has been updated with current instructions. Change-Id: I906ce9da89758a2e05887da54cd96dd7078a8c44
-
- 17 Oct, 2018 1 commit
-
-
Aaron Green authored
This CL removes the checks for customized files. It's the other half of https://fuchsia-review.googlesource.com/c/zircon/+/205023. Change-Id: I41bd88a115fb52b4e35ca3ca01bff1bcad2cb03c Tests: Rolled boringssl
-
- 02 Aug, 2018 1 commit
-
-
Joshua Liebow-Feeser authored
SEC-88 Test: Manually tested: - new roll_boringssl.go - compiled/tested rust/boringssl-sys - compiled //garnet/public/rust/crates/mundane-crypto, which depends on these bindings Change-Id: I2804a88d19e7755ff43e17ca75e4180e73417158
-
- 23 May, 2018 1 commit
-
-
Aaron Green authored
Change-Id: Idb682397009edd2e9c2ee3f9495f884ab1a303ab
-
- 26 Apr, 2018 1 commit
-
-
Joshua Liebow-Feeser authored
Change-Id: Icbfe523cd7591b0941be5fb412104d543a1dcaee
-
- 17 Apr, 2018 1 commit
-
-
Aaron Green authored
Change-Id: I25669d94bf4e6b3ba49db915c1fc2242f57ca8bd
-
- 14 Apr, 2018 1 commit
-
-
Aaron Green authored
This CL updates roll_boringssl.go to make use of the changes to //zircon/third_party/ulib/uboringssl to match this repo. It also now delays making commits until all changes are successful. ZX-1991 #comment Fuchsia side support Change-Id: Ie6cd654fa7fc8cc0afbf3917f243d3d2f261c113
-
- 16 Mar, 2018 1 commit
-
-
Aaron Green authored
This CL refactors and extends the capabilities of roll_boringssl.go, making it a flexible way to reset the related repositories to JIRI_HEAD, run jiri update, update the upstream BoringSSL source, regenerate the GN build files, update the Mozilla certificate bundle, update Zircon's uboringssl subset, update the garnet manifest, and submit all of these changes as a topic. Change-Id: I69fc4c2110b4d960a9b522d5ee0f60c45cdd0c4d
-
- 22 Nov, 2017 1 commit
-
-
Aaron Green authored
See SEC-28: Currently Fuchsia is getting its root certs via Dart. With this CL, the certificates instead are rolled alongside BoringSSL and included in the image from this repository. Change-Id: I2c2152de5420505c0800a080fcf93237614c223e
-
- 16 Nov, 2017 1 commit
-
-
Aaron Green authored
This is the first buildable commit for the new BoringSSL tree. Originally, Fuchsia forked BoringSSL to modify it to support the OS. Over time, these small modifcations have been upstreamed, allowing BoringSSL to become a pure mirror of upstream, with build files under //build using GN's secondary_source feature. Unfortunately, this doesn't work well with the "layer cake" model, as it the source and build files cannot be atomically updated. The solution is to use //third_party/boringssl as an extra layer with the build files and a jiri manifest that directly references upstream. This is much closer to Chromium's approach, and has more support in the src/util/ scripts. Change-Id: I3c5d932f9526b21df07eccfaddbc996fbb41c8db
-