From bfdb6fbe329ba1c7c7fd2e93e09355332372d1b2867552dcd1b2901bfcfb56af Mon Sep 17 00:00:00 2001 From: Dirk Mueller Date: Mon, 14 Jul 2025 09:46:06 +0000 Subject: [PATCH] - Update to version 0.21.0 * Support s2n security policy for TLS 1.2 and FIPS by @sfod in (#739) OBS-URL: https://build.opensuse.org/package/show/devel:libraries:c_c++/aws-c-io?expand=0&rev=94 --- .gitattributes | 23 + .gitignore | 1 + aci_add-so-version.patch | 11 + aci_fix-cmake-modules-path.patch | 42 ++ aws-c-io.changes | 740 +++++++++++++++++++++++++++++++ aws-c-io.spec | 98 ++++ v0.14.12.tar.gz | 3 + v0.14.13.tar.gz | 3 + v0.14.15.tar.gz | 3 + v0.14.16.tar.gz | 3 + v0.14.18.tar.gz | 3 + v0.14.9.tar.gz | 3 + v0.15.1.tar.gz | 3 + v0.15.2.tar.gz | 3 + v0.15.3.tar.gz | 3 + v0.15.4.tar.gz | 3 + v0.15.5.tar.gz | 3 + v0.16.0.tar.gz | 3 + v0.18.1.tar.gz | 3 + v0.19.0.tar.gz | 3 + v0.19.1.tar.gz | 3 + v0.20.1.tar.gz | 3 + v0.21.0.tar.gz | 3 + 23 files changed, 966 insertions(+) create mode 100644 .gitattributes create mode 100644 .gitignore create mode 100644 aci_add-so-version.patch create mode 100644 aci_fix-cmake-modules-path.patch create mode 100644 aws-c-io.changes create mode 100644 aws-c-io.spec create mode 100644 v0.14.12.tar.gz create mode 100644 v0.14.13.tar.gz create mode 100644 v0.14.15.tar.gz create mode 100644 v0.14.16.tar.gz create mode 100644 v0.14.18.tar.gz create mode 100644 v0.14.9.tar.gz create mode 100644 v0.15.1.tar.gz create mode 100644 v0.15.2.tar.gz create mode 100644 v0.15.3.tar.gz create mode 100644 v0.15.4.tar.gz create mode 100644 v0.15.5.tar.gz create mode 100644 v0.16.0.tar.gz create mode 100644 v0.18.1.tar.gz create mode 100644 v0.19.0.tar.gz create mode 100644 v0.19.1.tar.gz create mode 100644 v0.20.1.tar.gz create mode 100644 v0.21.0.tar.gz diff --git a/.gitattributes b/.gitattributes new file mode 100644 index 0000000..9b03811 --- /dev/null +++ b/.gitattributes @@ -0,0 +1,23 @@ +## Default LFS +*.7z filter=lfs diff=lfs merge=lfs -text +*.bsp filter=lfs diff=lfs merge=lfs -text +*.bz2 filter=lfs diff=lfs merge=lfs -text +*.gem filter=lfs diff=lfs merge=lfs -text +*.gz filter=lfs diff=lfs merge=lfs -text +*.jar filter=lfs diff=lfs merge=lfs -text +*.lz filter=lfs diff=lfs merge=lfs -text +*.lzma filter=lfs diff=lfs merge=lfs -text +*.obscpio filter=lfs diff=lfs merge=lfs -text +*.oxt filter=lfs diff=lfs merge=lfs -text +*.pdf filter=lfs diff=lfs merge=lfs -text +*.png filter=lfs diff=lfs merge=lfs -text +*.rpm filter=lfs diff=lfs merge=lfs -text +*.tbz filter=lfs diff=lfs merge=lfs -text +*.tbz2 filter=lfs diff=lfs merge=lfs -text +*.tgz filter=lfs diff=lfs merge=lfs -text +*.ttf filter=lfs diff=lfs merge=lfs -text +*.txz filter=lfs diff=lfs merge=lfs -text +*.whl filter=lfs diff=lfs merge=lfs -text +*.xz filter=lfs diff=lfs merge=lfs -text +*.zip filter=lfs diff=lfs merge=lfs -text +*.zst filter=lfs diff=lfs merge=lfs -text diff --git a/.gitignore b/.gitignore new file mode 100644 index 0000000..57affb6 --- /dev/null +++ b/.gitignore @@ -0,0 +1 @@ +.osc diff --git a/aci_add-so-version.patch b/aci_add-so-version.patch new file mode 100644 index 0000000..ef71957 --- /dev/null +++ b/aci_add-so-version.patch @@ -0,0 +1,11 @@ +diff -Nru aws-c-io-0.15.4.orig/CMakeLists.txt aws-c-io-0.15.4/CMakeLists.txt +--- aws-c-io-0.15.4.orig/CMakeLists.txt 2025-01-28 23:10:24.000000000 +0000 ++++ aws-c-io-0.15.4/CMakeLists.txt 2025-01-30 11:57:19.446194584 +0000 +@@ -176,6 +176,7 @@ + + # We are not ABI stable yet + set_target_properties(${PROJECT_NAME} PROPERTIES VERSION 1.0.0) ++set_target_properties(${CMAKE_PROJECT_NAME} PROPERTIES SOVERSION 0unstable) + + if (NOT EVENT_LOOP_DEFINES) + message(FATAL_ERROR "Event Loop is not setup on the platform.") diff --git a/aci_fix-cmake-modules-path.patch b/aci_fix-cmake-modules-path.patch new file mode 100644 index 0000000..76a5180 --- /dev/null +++ b/aci_fix-cmake-modules-path.patch @@ -0,0 +1,42 @@ +diff -Nru aws-c-io-0.7.0.orig/CMakeLists.txt aws-c-io-0.7.0/CMakeLists.txt +--- aws-c-io-0.7.0.orig/CMakeLists.txt 2020-11-20 01:33:59.000000000 +0100 ++++ aws-c-io-0.7.0/CMakeLists.txt 2020-11-24 12:38:44.025900582 +0100 +@@ -14,18 +14,8 @@ + file(TO_CMAKE_PATH "${CMAKE_INSTALL_PREFIX}" CMAKE_INSTALL_PREFIX) + endif() + +- +-if (UNIX AND NOT APPLE) +- include(GNUInstallDirs) +-elseif(NOT DEFINED CMAKE_INSTALL_LIBDIR) +- set(CMAKE_INSTALL_LIBDIR "lib") +-endif() +- +-# This is required in order to append /lib/cmake to each element in CMAKE_PREFIX_PATH +-set(AWS_MODULE_DIR "/${CMAKE_INSTALL_LIBDIR}/cmake") +-string(REPLACE ";" "${AWS_MODULE_DIR};" AWS_MODULE_PATH "${CMAKE_PREFIX_PATH}${AWS_MODULE_DIR}") +-# Append that generated list to the module search path +-list(APPEND CMAKE_MODULE_PATH ${AWS_MODULE_PATH}) ++find_package(aws-c-common REQUIRED) ++set(CMAKE_MODULE_PATH ${aws-c-common_DIR}) + + include(AwsCFlags) + include(AwsCheckHeaders) +@@ -217,7 +207,7 @@ + endif() + + install(EXPORT "${PROJECT_NAME}-targets" +- DESTINATION "${LIBRARY_DIRECTORY}/${PROJECT_NAME}/cmake/${TARGET_DIR}" ++ DESTINATION "${LIB_INSTALL_DIR}/cmake/${CMAKE_PROJECT_NAME}/${TARGET_DIR}/" + NAMESPACE AWS:: + COMPONENT Development) + +@@ -226,7 +216,7 @@ + @ONLY) + + install(FILES "${CMAKE_CURRENT_BINARY_DIR}/${PROJECT_NAME}-config.cmake" +- DESTINATION "${LIBRARY_DIRECTORY}/${PROJECT_NAME}/cmake/" ++ DESTINATION "${LIB_INSTALL_DIR}/cmake/${CMAKE_PROJECT_NAME}" + COMPONENT Development) + + if (NOT CMAKE_CROSSCOMPILING) diff --git a/aws-c-io.changes b/aws-c-io.changes new file mode 100644 index 0000000..9723c0c --- /dev/null +++ b/aws-c-io.changes @@ -0,0 +1,740 @@ +------------------------------------------------------------------- +Fri Jul 11 10:47:41 UTC 2025 - John Paul Adrian Glaubitz + +- Update to version 0.21.0 + * Support s2n security policy for TLS 1.2 and FIPS by @sfod in (#739) + +------------------------------------------------------------------- +Wed Jun 18 12:47:57 UTC 2025 - John Paul Adrian Glaubitz + +- Update to version 0.20.1 + * Remove Windows 2019 and add Windows 2025 with MSVC-17 + by @TingDaoK in (#737) + * Fix casing on Windows header files by @giordano in (#736) +- from version 0.20.0 + * Enabling TLS 1.3 on Windows by @sfod in (#732) + * Fix warning Wdefault-const-init-unsafe by @xiazhvera in (#734) + * Fix pem validation by @DmitriyMusatkin in (#735) + +------------------------------------------------------------------- +Tue May 27 06:48:24 UTC 2025 - John Paul Adrian Glaubitz + +- Update to version 0.19.1 + * Fix casing on Windows header files by @waahm7 in (#730) + * Acquire/Release Event Loop by @xiazhvera in (#725) + * Remove clang-3 from CI by @sbSteveK in (#731) + * Fix warnings in iOS Cross Compile CI by @waahm7 in (#733) + +------------------------------------------------------------------- +Tue May 6 13:19:42 UTC 2025 - John Paul Adrian Glaubitz + +- Update to version 0.19.0 + * Make exports consistent by @DmitriyMusatkin in (#720) + * Improve docs for aws_future by @graebm in (#724) + * Task type_log logging by @sbSteveK in (#726) + * AWS_IO_TLS_CIPHER_PREF_PQ_TLSv1_0_2021_05 is not + supported now by @TingDaoK in (#727) + +------------------------------------------------------------------- +Tue Apr 15 10:31:28 UTC 2025 - John Paul Adrian Glaubitz + +- Update to verson 0.18.1 + * Correct public key naming in pem utils by @DmitriyMusatkin in (#721) + * Revert error code ordering by @sbSteveK in (#723) + +------------------------------------------------------------------- +Wed Apr 2 15:06:11 UTC 2025 - John Paul Adrian Glaubitz + +- Update to version 0.18.0 + * Grand Dispatch Queue, Apple Network Connection, Apple SecItem + by @sbSteveK in (#661) + * Remove unused variables in aws_host_resolver by @graebm in (#719) +- from version 0.17.0 + * Add back kqueue support on iOS by @xiazhvera in (#716) + * Fix IP address being labelled "bad" for too long by @graebm in (#718) + +------------------------------------------------------------------- +Thu Feb 27 12:32:50 UTC 2025 - John Paul Adrian Glaubitz + +- Update to version 0.16.0 + * TLS 1.3 win update by @bretambrose in (#676) + * Fix Windows server-side for TLS 1.3 by @sfod in (#710) + +------------------------------------------------------------------- +Wed Feb 19 11:49:42 UTC 2025 - John Paul Adrian Glaubitz + +- Update to version 0.15.5 + * Add PQ_DEFAULT enum to aws_tls_cipher_pref by @alexw91 in (#707) + +------------------------------------------------------------------- +Thu Jan 30 11:58:50 UTC 2025 - John Paul Adrian Glaubitz + +- Update to version 0.15.4 + * Switch CI to use roles by @DmitriyMusatkin in (#698) + * Fix CI for GCC-13 on Ubuntu-18 by @waahm7 in (#700) + * fix typo in log message by @graebm in (#702) + * Event Loop & Socket Type Multi-Support by @xiazhvera in (#692) + * A bunch of CMake fixes by @graebm in (#701) +- Drop aci_fix-cmake-modules-path.patch, fixed upstream +- Refresh aci_add-so-version.patch + +------------------------------------------------------------------- +Thu Nov 14 12:30:11 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.15.3 + * Event loop public api by @bretambrose in (#691) + * Add ML-KEM Support by @alexw91 in (#693) + * Update checksum based on previous PR changes by @bretambrose in (#695) + * Add an option to disable retries by @waahm7 in (#694) + +------------------------------------------------------------------- +Tue Nov 12 12:44:09 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.15.2 + * Add cxx support by @subdiox in (#689) + +------------------------------------------------------------------- +Thu Nov 7 17:39:11 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.15.1 + * chore: Modified bug issue template to add checkbox to + report potential regression. by @ashishdhingra in (#671) + * Fix s2n cleanup by @DmitriyMusatkin in #687 +- from version 0.15.0 + * Update CMake to 3.9 by @waahm7 in (#686) +- from version 0.14.20 + * Handle PKCS#8 private keys in Windows by @sfod in (#683) + * Add network interface name validation api by @waahm7 in (#675) +- from version 0.14.19 + * Clarify socket options logging by @sbSteveK in (#681) + * Use s2n_cleanup_thread() and path by @TingDaoK in (#682) + +------------------------------------------------------------------- +Wed Aug 7 13:41:28 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.14.18 + * Unique port between test_socket_with_bind_to_interface + and test_tcp_socket_communication by @waahm7 in (#667) +- from version 0.14.17 + * Make port more random for test_socket_with_bind_to_interface + test by @waahm7 in (#666) + +------------------------------------------------------------------- +Fri Aug 2 10:50:07 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.14.16 + * Use const pointers in secure_channel_tls_handler.c by @teo-tsirpanis in (#664) + +------------------------------------------------------------------- +Wed Jul 31 09:05:34 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.14.15 + * Fix undefined type enum aws_tls_handler_state in source/windows/ + secure_channel_tls_handler.c when building on Windows + by @brechtsanders in (#663) +- from version 0.14.14 + * Update MacOS CI by @waahm7 in (#658) + * Remove uv headers from CMakeLists.txt by @sbSteveK in (#660) + * TLS deliver buffer data during shutdown by @TingDaoK in (#650) + +------------------------------------------------------------------- +Fri Jul 26 11:25:57 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.14.13 + * Fix import of inttype (#656) + +------------------------------------------------------------------- +Mon Jul 15 10:53:10 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.14.12 + * Mark the network interface API internal by @waahm7 in (#654) +- from version 0.14.11 + * Fix FreeBSD CI to install default python packages + by @TingDaoK in (#653) + * Socket option for binding to a network interface by name + by @waahm7 in (#647) + +------------------------------------------------------------------- +Thu Jul 11 10:09:51 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.14.10 + * clang-format 18 by @graebm in (#644) + * Fix Freebsd CI by @waahm7 in (#648) + * Fix memory leaks in Windows TLS code + by @graebm in #652 + +------------------------------------------------------------------- +Wed Jun 5 08:50:30 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.14.9 + * Fix tests that require a valid cert to use add_net_test_case + by @waahm7 in (#637) + * Fix signed/unsigned bug with aws_future_wait() timeout value + by @graebm in (#638) + * Adds Host Resolver IPv6 variations test by @waahm7 in (#639) + * Fix bug where last few bytes on socket go unread + by @graebm in (#642) + +------------------------------------------------------------------- +Mon May 13 09:16:50 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.14.8 + * Remove setenv by @DmitriyMusatkin in (#634) + * aws_tls_connection_options_copy comment update following + #eaa583a or #475 by @SergeyRyabinin in (#482) + * Update Expired Certs by @waahm7 in (#636) + +------------------------------------------------------------------- +Fri Apr 5 08:37:19 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.14.7 + * Skip rsa8192.badssl.com test to fix CI by @waahm7 in (#635) + +------------------------------------------------------------------- +Fri Mar 22 09:27:50 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.14.6 + * Remove aws_tls_handler_write by @jmklix in (#628) + * CI job for FreeBSD by @knightjoel in (#630) + * Update docs to clarify aws_io_message Cleanup Rules by @waahm7 in (#633) + * Fix sizeof channel negotiation task by @quinnj in (#631) +- from version 0.14.5 + * chore(CI): CI job for OpenBSD by @knightjoel in (#625) + * Fix Memory leak caused by redefinition by @xiazhvera in (#626) + * Test for duplicate key import by @TingDaoK in (#627) + +------------------------------------------------------------------- +Tue Feb 20 11:14:33 UTC 2024 - Dominique Leuenberger + +- Use %autosetup macro. Allows to eliminate the usage of deprecated + %patchN. + +------------------------------------------------------------------- +Mon Feb 19 14:42:56 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.14.4 + * Fix a bunch of places we forget to aws_raise_error() by @graebm in (#622) + * Consistently use lowercase for Windows libraries by @giordano in (#603) + * Use Public Domain PKCS#11 headers, to avoid OASIS license by @graebm in (#623) + +------------------------------------------------------------------- +Wed Feb 7 11:53:10 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.14.3 + * Fix NULL config clean-up by @waahm7 in (#620) + +------------------------------------------------------------------- +Fri Jan 26 11:44:47 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.14.2 + * Cache the Error Before Any Side Effects by @waahm7 in (#619) + +------------------------------------------------------------------- +Tue Jan 16 09:02:56 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.14.1 + * Surface proper PKCS11 error by @sbSteveK in (#617) + * Always run channel setup callback on pinned event + loop if one exists by @bretambrose in (#618) + +------------------------------------------------------------------- +Wed Jan 3 14:28:33 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.14.0 + * Change `port` from uint16_t to uint32_t to support VSOCK by @graebm in (#613) + +------------------------------------------------------------------- +Mon Dec 4 09:02:50 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.13.36 + * Remove null check for aws_pkcs11_lib_login_user + by @xiazhvera in (#611) + * Use 500 ms rather than 25 ms for the exponential + backoff defaults by @JonathanHenson in (#612) + +------------------------------------------------------------------- +Tue Oct 17 10:18:10 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.13.35 + * Handle CRLF for windows by @xiazhvera in (#608) +- from version 0.13.34 + * Fix assert statement by @graebm in (#607) +- from version 0.13.33 + * Log as warning for socket connect and client bootstrap by @TingDaoK in (#594) + * Added workflow for handling answerable discussions by @yasminetalby in (#592) + * Intel Vtune Markers for EventLoop and InputStream Read by @waahm7 in (#596) + * Fix compiling error by @TingDaoK in (#600) + * Read me update by @yasminetalby in (#604) + * Refactor pem by @DmitriyMusatkin in (#605) + * Add format unknown by @DmitriyMusatkin in (#606) + +------------------------------------------------------------------- +Tue Aug 15 10:49:30 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.13.32 + * Fix permissions for stale issue bot by @jmklix in (#590) + * Fix S2N blocked issue by @waahm7 in (#589) +- from version 0.13.31 + * Fix: release alpn string before set for + tls_ctx_options by @xiazhvera in (#588) + +------------------------------------------------------------------- +Tue Jul 25 08:29:45 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.13.30 + * Maximum Backoff Implementation by @waahm7 in (#587) + +------------------------------------------------------------------- +Mon Jul 17 10:15:09 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.13.29 + * Change S2N security policy for 0-RTT in TLS 1.3 by @graebm in (#585) + +------------------------------------------------------------------- +Mon Jul 10 10:00:18 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.13.28 + * Support read-only file stream by @TingDaoK in (#582) + +------------------------------------------------------------------- +Mon Jul 3 12:44:06 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.13.27 + * Cleanup aws-lc thread locals in event loop threads by @bretambrose in (#581) + +------------------------------------------------------------------- +Sat Jun 10 02:44:10 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.13.26 + * Fix compiler warning by @TingDaoK in (#579) +- from version 0.13.25 + * Stream-tester can report how much data was read by @graebm in (#578) + * Fix build issues with stream-tester files by @graebm in (#580) + +------------------------------------------------------------------- +Wed Jun 7 11:12:49 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.13.24 + * aws_future functions no longer inline by @graebm in (#577) + +------------------------------------------------------------------- +Mon Jun 5 10:52:36 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.13.23 + * Use UUID for socket endpoints by @TwistedTwigleg in (#570) + * Update time to ancient by @jmklix in (#571) + * aws_future by @graebm in (#572) + * aws_async_input_stream by @graebm in (#573) + * aws_future keeps channel alive until callback fires by @graebm in (#574) + * Tests for aws_async_input_stream by @graebm in (#575) + +------------------------------------------------------------------- +Tue May 16 09:59:33 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version to 0.13.22 + * Add github templates and bots by @jmklix in (#564) + * Update builder version to fix aws-lc build on manylinux1 by @TingDaoK in (#566) + * Relax the default_pki_path_exists test. by @graebm in (#568) + * Fix warnings in public headers by @waahm7 in (#569) + +------------------------------------------------------------------- +Wed Apr 19 12:20:04 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.13.21 + * Raise error message if macOS key import failed by @xiazhvera in (#558) + * Get socket from handler by @TingDaoK in (#560) + * Fix DNS starvation case by @bretambrose in (#562) +- from version 0.13.20 + * doc: Fix typo in readme by @codingspirit in (#554) + * Skip PKCS#11 setup when tests are disabled by @graebm in (#557) + * DNS Ping Proposal by @bretambrose in (#559) + +------------------------------------------------------------------- +Mon Mar 13 09:41:41 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.13.19 + * Teach c-io where to find the PKI trust store + on OpenBSD by @knightjoel in (#553) + +------------------------------------------------------------------- +Wed Mar 1 10:29:01 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.13.18 + * Change #if _MSC_VER to #ifdef _MSC_VER by @jmklix in (#551) + +------------------------------------------------------------------- +Wed Feb 22 09:35:02 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.13.17 + * Fix HostResolver Callback by @waahm7 in (#523) +- from version 0.13.16 + * Use const in record_connection_failure by @waahm7 in (#550) + * Purge address cache by @waahm7 in (#546) + +------------------------------------------------------------------- +Mon Feb 6 14:08:59 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.13.15 + * Fix possible crash when host resolver returns + two addresses. by @TingDaoK in (#543) + * Fix build on OpenBSD by @knightjoel in (#545) + * Fix: Generate random callback by @waahm7 in (#542) + +------------------------------------------------------------------- +Wed Jan 18 13:18:07 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.13.14 + * Errno usage pass by @bretambrose in (#541) +- from version 0.13.13 + * Conditional fix for supporting glibc 3.0 by @sdavtaker in (#537) + * Use macros consistently by @DmitriyMusatkin in (#538) + * Fix macro usage by @DmitriyMusatkin in (#539) + * Stop checking errno after failed aws_fopen() by @graebm in (#540) + +------------------------------------------------------------------- +Wed Jan 4 13:11:36 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.13.12 + * Handle connection reset error code for posix + socket by @JonathanHenson in (#532) + * Fix bug with increment read window by @graebm in (#535) + +------------------------------------------------------------------- +Tue Nov 22 12:06:52 UTC 2022 - John Paul Adrian Glaubitz + +- Update to version 0.13.11 + * Add new SeekFailed, GetLengthFailed, GetLengthUnsupported, + and SeekUnsupported Errors by @waahm7 in (#530) + +------------------------------------------------------------------- +Wed Nov 16 15:18:55 UTC 2022 - John Paul Adrian Glaubitz + +- Update to version 0.13.10 + * Fix the crash from log by @TingDaoK in (#529) + * Create setter for TLS Cipher Preference by @alexw91 in (#531) + +------------------------------------------------------------------- +Fri Nov 11 13:16:45 UTC 2022 - John Paul Adrian Glaubitz + +- Update to version 0.13.9 + * Update CI to fix downstream build by @waahm7 in (#525) +- from version 0.13.8 + * Fix C++ One Definition Rules (ODR) Violations by @graebm in (#528) +- from version 0.13.7 + * OSX ECC key support by @xiazhvera in (#524) + * Fix aws_import_ecc_key_into_keychain debug by @waahm7 in (#526) + * sprintf() -> snprintf() by @graebm in (#527) + * Set thread names to help debugging by @graebm in (#519) + +------------------------------------------------------------------- +Tue Nov 1 12:44:12 UTC 2022 - John Paul Adrian Glaubitz + +- Update to version 0.13.6 + * Use const in aws_host_resolver_new_default by @waahm7 in (#522) + +------------------------------------------------------------------- +Mon Oct 17 10:37:04 UTC 2022 - John Paul Adrian Glaubitz + +- Update to version 0.13.5 + * Add AppVerifier by @TwistedTwigleg in (#516) + * Always set s_s2n_initialized_externally value by @waahm7 in (#517) + * migrate uri helpers from aws-c-io by @DmitriyMusatkin in (#518) + * Adds missing const by @waahm7 in (#520) +- from version 0.13.4 + * Fixes a missing include that may cause build failures depending + on linux distribution by @bretambrose in (#514) + * Fixes an event loop group clean up failure issue when process + is exiting by @waahm7 in (#515) + +------------------------------------------------------------------- +Fri Sep 2 09:36:09 UTC 2022 - John Paul Adrian Glaubitz + +- Update to version 0.13.3 + * Fix for heap access violation by @TwistedTwigleg in (#513) +- from version 0.13.2 + * Fallback for target load by @TingDaoK in (#511) +- from version 0.13.1 + * Clang windows by @bretambrose in (#504) + * ALPN availability check function now properly checks + for Windows 8.1 and above by @HolyZsiraf in (#502) + * VerifyVersionInfo doesn't behave like you'd expect + by @bretambrose in (#505) + * Tolerate s2n_init() being called before aws_io_library_init() + by @graebm in (#508) + +------------------------------------------------------------------- +Mon Aug 8 09:24:58 UTC 2022 - John Paul Adrian Glaubitz + +- Update to version 0.13.0 + * Custom TLS key operation support + + Add asserts to aws_retry_strategy refcounts. by @graebm in (#500) + + Custom TLS key operation support by @TwistedTwigleg in (#501) +- from version 0.12.0 + * Remove support for legacy PQ Key Exchange Algorithms + + Explicit warnings/error when default CA certificates + not found by @graebm in (#498) + + Remove support for legacy PQ Key Exchange Algorithms + by @alexw91 in (#497) + +------------------------------------------------------------------- +Mon Jul 11 13:25:36 UTC 2022 - John Paul Adrian Glaubitz + +- Update to version 0.11.2 + * Adds a channel task scheduling API that always uses the cross-thread + task queue. This API guarantees serialized order-of-submission is + order-of-execution. The default API does not guarantee this because + tasks submitted on the event loop thread may jump ahead of tasks + already in the cross-thread queue. +- from version 0.11.1 + * Fix error codes reported by windows sockets. by @graebm in (#489) + * New: aws_socket_get_bound_address() by @graebm in (#491) + +------------------------------------------------------------------- +Thu Apr 28 13:52:40 UTC 2022 - John Paul Adrian Glaubitz + +- Update to version 0.11.0 + * Input Stream API change by @TingDaoK in (#444) + * Changed Input Stream API to be refcounted +- from version 0.10.22 + * Ensure that library init/cleanup can be called + multiple times by @graebm in (#461) +- from version 0.10.21 + * Added ECC support for PKCS11 by @JamieHunter in (#479) + +------------------------------------------------------------------- +Thu Mar 17 08:16:10 UTC 2022 - John Paul Adrian Glaubitz + +- Update to version 0.10.20 + * Deprecate macOS keychain path function + * Improve errors when searching windows cert store +- from version 0.10.19 + * Fix possible memory leak in aws_tls_connection_options_copy. + + Now the aws_tls_connection_options_copy function will clean up the + options and release memory before copy into it. Please make sure + the copy destination option is initialized/zero out before call + the function. +- from version 0.10.18 + * Fix Certificate Chains for Windows + * aws_pkcs11_lib_behavior validation and spelling + * Fix aws-crt-swift by moving PKCS#11 headers + +------------------------------------------------------------------- +Fri Jan 7 10:38:39 UTC 2022 - John Paul Adrian Glaubitz + +- Update to version 0.10.17 + * Event loop pinning + TLS updates + + Support for channel creation with event loop pinning + + Additional TLS tests + + SCH_USE_STRONG_CRYPTO enabled by default on Windows + (monitor for potential breakage) + +------------------------------------------------------------------- +Tue Jan 4 14:52:52 UTC 2022 - John Paul Adrian Glaubitz + +- Update to version 0.10.16 + * Remove platform ifdefs from tls_channel_handler.h + + This fixes iOS builds +- from version 0.10.15 + * BUGFIX: Fix crash when crash when s2n connection + class fails to be created + +------------------------------------------------------------------- +Thu Dec 9 12:14:19 UTC 2021 - John Paul Adrian Glaubitz + +- Update to version 0.10.14 + * Remove Windows.h from header + + Removed Windows.h from public header + + Improved error reporting when getaddrinfo() fail + + Set default cpu_id on thread_options + + Better use of const in aws_tls_ctx_pkcs11_options +- from version 0.10.13 + * Support PKCS#11 for mutual TLS on Unix platforms + + Support PKCS#11 for mutual TLS on Unix platforms (#451) +- from version 0.10.12 + * Path API updates + + Moved aws_path_exist checks over to the safe variant. (#448) +- from version 0.10.11 + * Updated S2N PQ Crypto cipher preference list + + Add Round 3 Cipher Pref List to Allowlist (#447) +- from version 0.10.10 + * Removed file utils, moved to common + + Replace tls double channel (#441) + - Remove test first + - Add codebuild job spec that will run downstream integration + tests (aws-c-http) that exercise double tls + - Add channel API to read from initial handler +- Rename devel package to "devel" +- Switch BuildRequires to use cmake() and pkgconfig() macros + +------------------------------------------------------------------- +Mon Oct 11 07:47:07 UTC 2021 - John Paul Adrian Glaubitz + +- Update to version 0.10.9 + + TLS 1.3 Support + * Linux support for tls1.3 and switch to CRT-specific tls + configurations when using s2n + * Refactor pipe signal suppression to avoid logging spurious errors +- from version 0.10.8 + + Use ephemeral credentials for TLS on Windows + * Update secure channel configuration to use credentials in an ephemeral manner +- from version 0.10.7 + + Fix CA override functions + * This fixes the issue where "override_default_trust_store" functions did + not actually override the system trust store on Linux and Apple platforms. + +------------------------------------------------------------------- +Wed Jul 7 11:30:20 UTC 2021 - John Paul Adrian Glaubitz + +- Update to version 0.10.6 + + Managed thread handle release + * Updates the managed thread system to properly release Windows thread + handles. Requires an associated change in aws-c-common as well. + +------------------------------------------------------------------- +Mon Jun 21 12:07:26 UTC 2021 - John Paul Adrian Glaubitz + +- Update to version 0.10.5 + + Fix SNI check when custom root-CA used on Apple devices. + * Validate hostname on Mac when custom root-CA is used. (#396) +- from version 0.10.4 + + Revert Windows CRL checks on root CA override + * On Windows only, reverts the cached CRL check when validating a server + certificate chain using a root CA override. This check was added as part + of a larger change performing SNI validation with a root CA override (#385). + The SNI check remains in place. The CRL check was breaking tls connections + for multiple customers and appears to be subject to properties of the host + beyond the CRT's control. +- from version 0.10.3 + + Inconsistent trust store override behavior logged + * Added warning statement when trust store override is used (#394) + +------------------------------------------------------------------- +Thu Jun 10 11:03:51 UTC 2021 - John Paul Adrian Glaubitz + +- Update to version 0.10.2 + + iOS fix + * Removed call to sanitize pems on iOS (#391) +- from version 0.10.1 + + Fix Windows verify_peer = false issue in client mode + * Previously on Windows, we were not properly translating "verify_peer = false" + into a secure channel configuration that would actually skip peer verification + in client mode. We were always verifying the certificate no matter what the + setting's value. +- from version 0.10.0 + + All uses of aws_off_t replaced with int64_t + * CHANGE: All uses of aws_off_t replaced with int64_t. aws_off_t used to be 32 or + 64 bits, depending on a project's compiler flags. This was leading to bugs when + projects had different flags. Now in64_t is used instead. Beginning in aws-c-common + v0.6.0, aws_off_t is simply a typedef for int64_t, so hopefully this change is painless + for consumers. +- from version 0.9.14 + + Windows warnings + * Fix some Windows compile warnings that are not currently being caught by local CI and + only showing up in the publishing pipeline +- from version 0.9.13 + + Improve SNI validation, socket read error checking + * On Windows, properly do SNI and server cert chain verification when the + root CA has been overridden + * On Posix systems, check socket read error before making any potential log + calls which could overwrite the error info via internal sys calls + +------------------------------------------------------------------- +Fri May 14 12:05:24 UTC 2021 - John Paul Adrian Glaubitz + +- Update to version 0.9.12 + + TLS Context Initialization fix + * Fixes an issue where TLS context initialization could fail on + Linux due to passing in buffers that weren't properly zero- + terminated at their final length +- from version 0.9.11 + + Path URI Encoding Bugfix + * Fix for some characters not being correctly URI-encoded in the path + URI encode function. +- from version 0.9.10 + + Bugfix for shutdown race condition + * Fix for shutdown crash when peer hangs up immediately + following first non-TLS write (#379) + * Fixed ownership semantics in SecureTransport read_message +- from version 0.9.9 + + Support non-ascii file path + * Use aws_fopen to support non-ASCII file path for file stream + +------------------------------------------------------------------- +Mon Apr 26 10:36:48 UTC 2021 - John Paul Adrian Glaubitz + +- Update to version 0.9.8 + + Mac TLS API update + * Small update to Mac TLS keychain API signature +- from version 0.9.7 + + Fixing bug with aws_input_stream_new_from_file + * Changing fopen flags used by aws_input_stream_new_from_file to r+b + instead of r, which fixes a Windows issue where the stream may terminate + early due to an EOF character. +- from version 0.9.6 + + Windows ECC platform synchronization + * (Windows only) Synchronizes ECC import logic with the compilation/cmake + switch that links NCrypt in aws-c-cal +- from version 0.9.5 + + Mac Keychain and Windows ECC certs + * Hardened Windows certificate import process + * Added support for importing ECC certs/keys in Windows + * Added support for overriding the keychain on Macintosh +- from version 0.9.4 + + PEM comments support + * Support comments in PEM file. +- from version 0.9.3 + + Platform compiler fixes and TLS shutdown delay + * Misc compiler fixes on Windows + * Improve Mac foundation library integration + * honor s2n's tls shutdown delay on linux when applicable + * ASAN CI integration and resulting fixes +- from version 0.9.2 + + Support for bring your own crypto TLS implementation on Unix platforms + * Added support for bring your own crypto via the cmake -DBYO_CRYPTO flag +- from version 0.9.1 + + Removed dependency on lib crypto in aws-c-cal/s2n + * Updated builder version of s2n to latest release (#361) + * Updated to builder v0.8.4 + * Fixed build-deps to avoid compile issues from aws-lc +- from version 0.9.0 + + New managed thread API + * Convert to new managed thread system for threads that cannot be + reliably explicitly joined + +------------------------------------------------------------------- +Mon Feb 15 11:21:16 UTC 2021 - John Paul Adrian Glaubitz + +- Update to version 0.8.3 + + Socket write callbacks are always async + * Socket write callbacks are always async. Fixes bugs + in websocket an MQTT when writing large payloads. +- from version 0.8.2 + + Nested TLS support + * Fix per-platform TLS channel handler issues for channels + using nested TLS +- from version 0.8.1 + + Win32 fix + * Fix the build issue on Win32 targets + +------------------------------------------------------------------- +Fri Jan 8 12:04:21 UTC 2021 - John Paul Adrian Glaubitz + +- Update to version 0.8.0 + + NUMA-aware event-loops + + Host resolver improvements + + Best of two event-loop load balancing + + Windows build fix for iocp event loop (#346) + +------------------------------------------------------------------- +Wed Dec 16 11:30:42 UTC 2020 - John Paul Adrian Glaubitz + +- Update to version 0.7.1 + + Host resolver creation update + * Modifies the default host resolver creation function to take an options struct + +------------------------------------------------------------------- +Thu Nov 26 15:50:49 UTC 2020 - John Paul Adrian Glaubitz + +- Initial build + + Version 0.7.0 +- add ci_fix-cmake-modules-path.patch, aci_add-so-version.patch diff --git a/aws-c-io.spec b/aws-c-io.spec new file mode 100644 index 0000000..ab98038 --- /dev/null +++ b/aws-c-io.spec @@ -0,0 +1,98 @@ +# +# spec file for package aws-c-io +# +# Copyright (c) 2024 SUSE LLC +# +# All modifications and additions to the file contributed by third parties +# remain the property of their copyright owners, unless otherwise agreed +# upon. The license for this file, and modifications and additions to the +# file, is the same license as for the pristine package itself (unless the +# license for the pristine package is not an Open Source License, in which +# case the license is the MIT License). An "Open Source License" is a +# license that conforms to the Open Source Definition (Version 1.9) +# published by the Open Source Initiative. + +# Please submit bugfixes or comments via https://bugs.opensuse.org/ +# + + +%bcond_with test + +%define library_version 1.0.0 +%define library_soversion 0unstable +Name: aws-c-io +Version: 0.21.0 +Release: 0 +Summary: I/O and TLS package AWS SDK for C +License: Apache-2.0 +Group: Development/Libraries/C and C++ +URL: https://github.com/awslabs/aws-c-io +Source0: https://github.com/awslabs/%{name}/archive/v%{version}.tar.gz +Patch0: aci_add-so-version.patch +BuildRequires: cmake +BuildRequires: fdupes +BuildRequires: ninja +BuildRequires: cmake(aws-c-cal) +BuildRequires: cmake(aws-c-common) +BuildRequires: cmake(s2n) +BuildRequires: pkgconfig(libssl) + +%description +This is a module for the AWS SDK for C. It handles all I/O +and TLS work for application protocols. + +%package -n lib%{name}%{library_soversion} +Summary: Shared library files for aws-c-io library +Group: Development/Libraries/C and C++ + +%description -n lib%{name}%{library_soversion} +This is a module for the AWS SDK for C. It handles all I/O +and TLS work for application protocols. + +This package contains the dynamically linked library. + +%package devel +Summary: Development files for aws-c-io library +Group: Development/Libraries/C and C++ +Requires: lib%{name}%{library_soversion} = %{version} + +%description devel +This is a module for the AWS SDK for C. It handles all I/O +and TLS work for application protocols. + +This package contains the development files. + +%prep +%autosetup -p1 + +%build +%define __builder ninja +%cmake \ + -DCMAKE_BUILD_TYPE=Release +%make_jobs + +# Testsuite requires internet connection, so it won't work +%check +%if %{with test} +export LD_LIBRARY_PATH=%{_builddir}/%{name}-%{version}/build +%ctest +%endif + +%install +%cmake_install + +%post -n lib%{name}%{library_soversion} -p /sbin/ldconfig +%postun -n lib%{name}%{library_soversion} -p /sbin/ldconfig + +%files -n lib%{name}%{library_soversion} +%doc README.md +%license LICENSE +%{_libdir}/*.so.%{library_soversion} +%{_libdir}/*.so.%{library_version} + +%files devel +%{_libdir}/cmake/%{name}/ +%{_libdir}/*.so +%{_includedir}/* + +%changelog diff --git a/v0.14.12.tar.gz b/v0.14.12.tar.gz new file mode 100644 index 0000000..9d81a5e --- /dev/null +++ b/v0.14.12.tar.gz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:0e2adb66455bdaf0b280750f6eff4189db8ffbb452a2ff057e155b70045cadf6 +size 675271 diff --git a/v0.14.13.tar.gz b/v0.14.13.tar.gz new file mode 100644 index 0000000..30f5e89 --- /dev/null +++ b/v0.14.13.tar.gz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:1c228b1ed327e3a8518b89702ac0d93265cf50788038091e187c697cace7fa5a +size 675279 diff --git a/v0.14.15.tar.gz b/v0.14.15.tar.gz new file mode 100644 index 0000000..b93b35f --- /dev/null +++ b/v0.14.15.tar.gz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:701b8945c0c3fe5083e7989e69a0d9fa74a80fb2ff727605ed9452f5a5fb030f +size 679061 diff --git a/v0.14.16.tar.gz b/v0.14.16.tar.gz new file mode 100644 index 0000000..b38e371 --- /dev/null +++ b/v0.14.16.tar.gz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:bf78ab5dbeeaec2f55cb035e18c49ce8ba4e2ea7519e8b94e18ccd8851e39f4d +size 679062 diff --git a/v0.14.18.tar.gz b/v0.14.18.tar.gz new file mode 100644 index 0000000..7bccad4 --- /dev/null +++ b/v0.14.18.tar.gz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:44e9dee181ed7d867d1cc2944f4b4669259b569fc56bdd6dd4c7c30440fc4bf8 +size 679051 diff --git a/v0.14.9.tar.gz b/v0.14.9.tar.gz new file mode 100644 index 0000000..e60a3b4 --- /dev/null +++ b/v0.14.9.tar.gz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:3a3b7236f70209ac12b5bafa7dd81b75cc68b691a0aa0686d6d3b7e4bbe5fbc9 +size 672964 diff --git a/v0.15.1.tar.gz b/v0.15.1.tar.gz new file mode 100644 index 0000000..ecbabc5 --- /dev/null +++ b/v0.15.1.tar.gz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:70f119b44f2758fc482872141cb712122f1c3c82fea16d203b7286a98c139a71 +size 679955 diff --git a/v0.15.2.tar.gz b/v0.15.2.tar.gz new file mode 100644 index 0000000..82061cc --- /dev/null +++ b/v0.15.2.tar.gz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:3fab086364bc48997ff6f5809825603f0b88cc892382ce21f5d66ce8996c95ef +size 679998 diff --git a/v0.15.3.tar.gz b/v0.15.3.tar.gz new file mode 100644 index 0000000..fb00b89 --- /dev/null +++ b/v0.15.3.tar.gz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:d8cb4d7d3ec4fb27cbce158d6823a1f2f5d868e116f1d6703db2ab8159343c3f +size 681849 diff --git a/v0.15.4.tar.gz b/v0.15.4.tar.gz new file mode 100644 index 0000000..465c00c --- /dev/null +++ b/v0.15.4.tar.gz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:e5202033b09df61ffb2a57284a04735ac013296decc107de1c4abd1ce7d5cfda +size 687131 diff --git a/v0.15.5.tar.gz b/v0.15.5.tar.gz new file mode 100644 index 0000000..6f46ab0 --- /dev/null +++ b/v0.15.5.tar.gz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:0ebf91f9d0be8b4d342fa13d85be5da97de532ed75955fb518b17c111abec8ab +size 687237 diff --git a/v0.16.0.tar.gz b/v0.16.0.tar.gz new file mode 100644 index 0000000..53bcb7b --- /dev/null +++ b/v0.16.0.tar.gz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:e6ba5cd9b58cfbc26a6ad376a25766147aae5fd7e44c8b228255814f8fae5730 +size 699468 diff --git a/v0.18.1.tar.gz b/v0.18.1.tar.gz new file mode 100644 index 0000000..79c5326 --- /dev/null +++ b/v0.18.1.tar.gz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:65d275bbde1a1d287cdcde62164dc015b9613a5525fe688e972111d8a3b568fb +size 735338 diff --git a/v0.19.0.tar.gz b/v0.19.0.tar.gz new file mode 100644 index 0000000..ff7a4f3 --- /dev/null +++ b/v0.19.0.tar.gz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:356733a0d66f13a3f33fca709a693049615ec908ed3737b99d2f138055ebcbaa +size 735611 diff --git a/v0.19.1.tar.gz b/v0.19.1.tar.gz new file mode 100644 index 0000000..f804881 --- /dev/null +++ b/v0.19.1.tar.gz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:f2fea0c066924f7fe3c2b1c7b2fa9be640f5b16a6514854226330e63a1faacd0 +size 736276 diff --git a/v0.20.1.tar.gz b/v0.20.1.tar.gz new file mode 100644 index 0000000..266c33b --- /dev/null +++ b/v0.20.1.tar.gz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:8e2abf56e20f87383c44af6818235a12f54051b40c98870f44b2d5d05be08641 +size 749024 diff --git a/v0.21.0.tar.gz b/v0.21.0.tar.gz new file mode 100644 index 0000000..3faee7a --- /dev/null +++ b/v0.21.0.tar.gz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:31232dd35995c9d5d535f3cf5ce7d561d680285a0e2a16318d4f0d4512b907c4 +size 749192