commit 20565aed599f99ae574a39f7d74c36663e2a7de083f9efcd6c06eedcc7232ce9 Author: Dirk Mueller Date: Wed Feb 5 16:00:58 2025 +0000 - Update to version 0.15.4 * Switch CI to use roles by @DmitriyMusatkin in (#698) * Fix CI for GCC-13 on Ubuntu-18 by @waahm7 in (#700) * fix typo in log message by @graebm in (#702) * Event Loop & Socket Type Multi-Support by @xiazhvera in (#692) * A bunch of CMake fixes by @graebm in (#701) - Drop aci_fix-cmake-modules-path.patch, fixed upstream - Refresh aci_add-so-version.patch OBS-URL: https://build.opensuse.org/package/show/devel:libraries:c_c++/aws-c-io?expand=0&rev=78 diff --git a/.gitattributes b/.gitattributes new file mode 100644 index 0000000..9b03811 --- /dev/null +++ b/.gitattributes @@ -0,0 +1,23 @@ +## Default LFS +*.7z filter=lfs diff=lfs merge=lfs -text +*.bsp filter=lfs diff=lfs merge=lfs -text +*.bz2 filter=lfs diff=lfs merge=lfs -text +*.gem filter=lfs diff=lfs merge=lfs -text +*.gz filter=lfs diff=lfs merge=lfs -text +*.jar filter=lfs diff=lfs merge=lfs -text +*.lz filter=lfs diff=lfs merge=lfs -text +*.lzma filter=lfs diff=lfs merge=lfs -text +*.obscpio filter=lfs diff=lfs merge=lfs -text +*.oxt filter=lfs diff=lfs merge=lfs -text +*.pdf filter=lfs diff=lfs merge=lfs -text +*.png filter=lfs diff=lfs merge=lfs -text +*.rpm filter=lfs diff=lfs merge=lfs -text +*.tbz filter=lfs diff=lfs merge=lfs -text +*.tbz2 filter=lfs diff=lfs merge=lfs -text +*.tgz filter=lfs diff=lfs merge=lfs -text +*.ttf filter=lfs diff=lfs merge=lfs -text +*.txz filter=lfs diff=lfs merge=lfs -text +*.whl filter=lfs diff=lfs merge=lfs -text +*.xz filter=lfs diff=lfs merge=lfs -text +*.zip filter=lfs diff=lfs merge=lfs -text +*.zst filter=lfs diff=lfs merge=lfs -text diff --git a/.gitignore b/.gitignore new file mode 100644 index 0000000..57affb6 --- /dev/null +++ b/.gitignore @@ -0,0 +1 @@ +.osc diff --git a/aci_add-so-version.patch b/aci_add-so-version.patch new file mode 100644 index 0000000..ef71957 --- /dev/null +++ b/aci_add-so-version.patch @@ -0,0 +1,11 @@ +diff -Nru aws-c-io-0.15.4.orig/CMakeLists.txt aws-c-io-0.15.4/CMakeLists.txt +--- aws-c-io-0.15.4.orig/CMakeLists.txt 2025-01-28 23:10:24.000000000 +0000 ++++ aws-c-io-0.15.4/CMakeLists.txt 2025-01-30 11:57:19.446194584 +0000 +@@ -176,6 +176,7 @@ + + # We are not ABI stable yet + set_target_properties(${PROJECT_NAME} PROPERTIES VERSION 1.0.0) ++set_target_properties(${CMAKE_PROJECT_NAME} PROPERTIES SOVERSION 0unstable) + + if (NOT EVENT_LOOP_DEFINES) + message(FATAL_ERROR "Event Loop is not setup on the platform.") diff --git a/aci_fix-cmake-modules-path.patch b/aci_fix-cmake-modules-path.patch new file mode 100644 index 0000000..76a5180 --- /dev/null +++ b/aci_fix-cmake-modules-path.patch @@ -0,0 +1,42 @@ +diff -Nru aws-c-io-0.7.0.orig/CMakeLists.txt aws-c-io-0.7.0/CMakeLists.txt +--- aws-c-io-0.7.0.orig/CMakeLists.txt 2020-11-20 01:33:59.000000000 +0100 ++++ aws-c-io-0.7.0/CMakeLists.txt 2020-11-24 12:38:44.025900582 +0100 +@@ -14,18 +14,8 @@ + file(TO_CMAKE_PATH "${CMAKE_INSTALL_PREFIX}" CMAKE_INSTALL_PREFIX) + endif() + +- +-if (UNIX AND NOT APPLE) +- include(GNUInstallDirs) +-elseif(NOT DEFINED CMAKE_INSTALL_LIBDIR) +- set(CMAKE_INSTALL_LIBDIR "lib") +-endif() +- +-# This is required in order to append /lib/cmake to each element in CMAKE_PREFIX_PATH +-set(AWS_MODULE_DIR "/${CMAKE_INSTALL_LIBDIR}/cmake") +-string(REPLACE ";" "${AWS_MODULE_DIR};" AWS_MODULE_PATH "${CMAKE_PREFIX_PATH}${AWS_MODULE_DIR}") +-# Append that generated list to the module search path +-list(APPEND CMAKE_MODULE_PATH ${AWS_MODULE_PATH}) ++find_package(aws-c-common REQUIRED) ++set(CMAKE_MODULE_PATH ${aws-c-common_DIR}) + + include(AwsCFlags) + include(AwsCheckHeaders) +@@ -217,7 +207,7 @@ + endif() + + install(EXPORT "${PROJECT_NAME}-targets" +- DESTINATION "${LIBRARY_DIRECTORY}/${PROJECT_NAME}/cmake/${TARGET_DIR}" ++ DESTINATION "${LIB_INSTALL_DIR}/cmake/${CMAKE_PROJECT_NAME}/${TARGET_DIR}/" + NAMESPACE AWS:: + COMPONENT Development) + +@@ -226,7 +216,7 @@ + @ONLY) + + install(FILES "${CMAKE_CURRENT_BINARY_DIR}/${PROJECT_NAME}-config.cmake" +- DESTINATION "${LIBRARY_DIRECTORY}/${PROJECT_NAME}/cmake/" ++ DESTINATION "${LIB_INSTALL_DIR}/cmake/${CMAKE_PROJECT_NAME}" + COMPONENT Development) + + if (NOT CMAKE_CROSSCOMPILING) diff --git a/aws-c-io.changes b/aws-c-io.changes new file mode 100644 index 0000000..594c5d9 --- /dev/null +++ b/aws-c-io.changes @@ -0,0 +1,672 @@ +------------------------------------------------------------------- +Thu Jan 30 11:58:50 UTC 2025 - John Paul Adrian Glaubitz + +- Update to version 0.15.4 + * Switch CI to use roles by @DmitriyMusatkin in (#698) + * Fix CI for GCC-13 on Ubuntu-18 by @waahm7 in (#700) + * fix typo in log message by @graebm in (#702) + * Event Loop & Socket Type Multi-Support by @xiazhvera in (#692) + * A bunch of CMake fixes by @graebm in (#701) +- Drop aci_fix-cmake-modules-path.patch, fixed upstream +- Refresh aci_add-so-version.patch + +------------------------------------------------------------------- +Thu Nov 14 12:30:11 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.15.3 + * Event loop public api by @bretambrose in (#691) + * Add ML-KEM Support by @alexw91 in (#693) + * Update checksum based on previous PR changes by @bretambrose in (#695) + * Add an option to disable retries by @waahm7 in (#694) + +------------------------------------------------------------------- +Tue Nov 12 12:44:09 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.15.2 + * Add cxx support by @subdiox in (#689) + +------------------------------------------------------------------- +Thu Nov 7 17:39:11 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.15.1 + * chore: Modified bug issue template to add checkbox to + report potential regression. by @ashishdhingra in (#671) + * Fix s2n cleanup by @DmitriyMusatkin in #687 +- from version 0.15.0 + * Update CMake to 3.9 by @waahm7 in (#686) +- from version 0.14.20 + * Handle PKCS#8 private keys in Windows by @sfod in (#683) + * Add network interface name validation api by @waahm7 in (#675) +- from version 0.14.19 + * Clarify socket options logging by @sbSteveK in (#681) + * Use s2n_cleanup_thread() and path by @TingDaoK in (#682) + +------------------------------------------------------------------- +Wed Aug 7 13:41:28 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.14.18 + * Unique port between test_socket_with_bind_to_interface + and test_tcp_socket_communication by @waahm7 in (#667) +- from version 0.14.17 + * Make port more random for test_socket_with_bind_to_interface + test by @waahm7 in (#666) + +------------------------------------------------------------------- +Fri Aug 2 10:50:07 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.14.16 + * Use const pointers in secure_channel_tls_handler.c by @teo-tsirpanis in (#664) + +------------------------------------------------------------------- +Wed Jul 31 09:05:34 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.14.15 + * Fix undefined type enum aws_tls_handler_state in source/windows/ + secure_channel_tls_handler.c when building on Windows + by @brechtsanders in (#663) +- from version 0.14.14 + * Update MacOS CI by @waahm7 in (#658) + * Remove uv headers from CMakeLists.txt by @sbSteveK in (#660) + * TLS deliver buffer data during shutdown by @TingDaoK in (#650) + +------------------------------------------------------------------- +Fri Jul 26 11:25:57 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.14.13 + * Fix import of inttype (#656) + +------------------------------------------------------------------- +Mon Jul 15 10:53:10 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.14.12 + * Mark the network interface API internal by @waahm7 in (#654) +- from version 0.14.11 + * Fix FreeBSD CI to install default python packages + by @TingDaoK in (#653) + * Socket option for binding to a network interface by name + by @waahm7 in (#647) + +------------------------------------------------------------------- +Thu Jul 11 10:09:51 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.14.10 + * clang-format 18 by @graebm in (#644) + * Fix Freebsd CI by @waahm7 in (#648) + * Fix memory leaks in Windows TLS code + by @graebm in #652 + +------------------------------------------------------------------- +Wed Jun 5 08:50:30 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.14.9 + * Fix tests that require a valid cert to use add_net_test_case + by @waahm7 in (#637) + * Fix signed/unsigned bug with aws_future_wait() timeout value + by @graebm in (#638) + * Adds Host Resolver IPv6 variations test by @waahm7 in (#639) + * Fix bug where last few bytes on socket go unread + by @graebm in (#642) + +------------------------------------------------------------------- +Mon May 13 09:16:50 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.14.8 + * Remove setenv by @DmitriyMusatkin in (#634) + * aws_tls_connection_options_copy comment update following + #eaa583a or #475 by @SergeyRyabinin in (#482) + * Update Expired Certs by @waahm7 in (#636) + +------------------------------------------------------------------- +Fri Apr 5 08:37:19 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.14.7 + * Skip rsa8192.badssl.com test to fix CI by @waahm7 in (#635) + +------------------------------------------------------------------- +Fri Mar 22 09:27:50 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.14.6 + * Remove aws_tls_handler_write by @jmklix in (#628) + * CI job for FreeBSD by @knightjoel in (#630) + * Update docs to clarify aws_io_message Cleanup Rules by @waahm7 in (#633) + * Fix sizeof channel negotiation task by @quinnj in (#631) +- from version 0.14.5 + * chore(CI): CI job for OpenBSD by @knightjoel in (#625) + * Fix Memory leak caused by redefinition by @xiazhvera in (#626) + * Test for duplicate key import by @TingDaoK in (#627) + +------------------------------------------------------------------- +Tue Feb 20 11:14:33 UTC 2024 - Dominique Leuenberger + +- Use %autosetup macro. Allows to eliminate the usage of deprecated + %patchN. + +------------------------------------------------------------------- +Mon Feb 19 14:42:56 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.14.4 + * Fix a bunch of places we forget to aws_raise_error() by @graebm in (#622) + * Consistently use lowercase for Windows libraries by @giordano in (#603) + * Use Public Domain PKCS#11 headers, to avoid OASIS license by @graebm in (#623) + +------------------------------------------------------------------- +Wed Feb 7 11:53:10 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.14.3 + * Fix NULL config clean-up by @waahm7 in (#620) + +------------------------------------------------------------------- +Fri Jan 26 11:44:47 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.14.2 + * Cache the Error Before Any Side Effects by @waahm7 in (#619) + +------------------------------------------------------------------- +Tue Jan 16 09:02:56 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.14.1 + * Surface proper PKCS11 error by @sbSteveK in (#617) + * Always run channel setup callback on pinned event + loop if one exists by @bretambrose in (#618) + +------------------------------------------------------------------- +Wed Jan 3 14:28:33 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.14.0 + * Change `port` from uint16_t to uint32_t to support VSOCK by @graebm in (#613) + +------------------------------------------------------------------- +Mon Dec 4 09:02:50 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.13.36 + * Remove null check for aws_pkcs11_lib_login_user + by @xiazhvera in (#611) + * Use 500 ms rather than 25 ms for the exponential + backoff defaults by @JonathanHenson in (#612) + +------------------------------------------------------------------- +Tue Oct 17 10:18:10 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.13.35 + * Handle CRLF for windows by @xiazhvera in (#608) +- from version 0.13.34 + * Fix assert statement by @graebm in (#607) +- from version 0.13.33 + * Log as warning for socket connect and client bootstrap by @TingDaoK in (#594) + * Added workflow for handling answerable discussions by @yasminetalby in (#592) + * Intel Vtune Markers for EventLoop and InputStream Read by @waahm7 in (#596) + * Fix compiling error by @TingDaoK in (#600) + * Read me update by @yasminetalby in (#604) + * Refactor pem by @DmitriyMusatkin in (#605) + * Add format unknown by @DmitriyMusatkin in (#606) + +------------------------------------------------------------------- +Tue Aug 15 10:49:30 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.13.32 + * Fix permissions for stale issue bot by @jmklix in (#590) + * Fix S2N blocked issue by @waahm7 in (#589) +- from version 0.13.31 + * Fix: release alpn string before set for + tls_ctx_options by @xiazhvera in (#588) + +------------------------------------------------------------------- +Tue Jul 25 08:29:45 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.13.30 + * Maximum Backoff Implementation by @waahm7 in (#587) + +------------------------------------------------------------------- +Mon Jul 17 10:15:09 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.13.29 + * Change S2N security policy for 0-RTT in TLS 1.3 by @graebm in (#585) + +------------------------------------------------------------------- +Mon Jul 10 10:00:18 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.13.28 + * Support read-only file stream by @TingDaoK in (#582) + +------------------------------------------------------------------- +Mon Jul 3 12:44:06 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.13.27 + * Cleanup aws-lc thread locals in event loop threads by @bretambrose in (#581) + +------------------------------------------------------------------- +Sat Jun 10 02:44:10 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.13.26 + * Fix compiler warning by @TingDaoK in (#579) +- from version 0.13.25 + * Stream-tester can report how much data was read by @graebm in (#578) + * Fix build issues with stream-tester files by @graebm in (#580) + +------------------------------------------------------------------- +Wed Jun 7 11:12:49 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.13.24 + * aws_future functions no longer inline by @graebm in (#577) + +------------------------------------------------------------------- +Mon Jun 5 10:52:36 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.13.23 + * Use UUID for socket endpoints by @TwistedTwigleg in (#570) + * Update time to ancient by @jmklix in (#571) + * aws_future by @graebm in (#572) + * aws_async_input_stream by @graebm in (#573) + * aws_future keeps channel alive until callback fires by @graebm in (#574) + * Tests for aws_async_input_stream by @graebm in (#575) + +------------------------------------------------------------------- +Tue May 16 09:59:33 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version to 0.13.22 + * Add github templates and bots by @jmklix in (#564) + * Update builder version to fix aws-lc build on manylinux1 by @TingDaoK in (#566) + * Relax the default_pki_path_exists test. by @graebm in (#568) + * Fix warnings in public headers by @waahm7 in (#569) + +------------------------------------------------------------------- +Wed Apr 19 12:20:04 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.13.21 + * Raise error message if macOS key import failed by @xiazhvera in (#558) + * Get socket from handler by @TingDaoK in (#560) + * Fix DNS starvation case by @bretambrose in (#562) +- from version 0.13.20 + * doc: Fix typo in readme by @codingspirit in (#554) + * Skip PKCS#11 setup when tests are disabled by @graebm in (#557) + * DNS Ping Proposal by @bretambrose in (#559) + +------------------------------------------------------------------- +Mon Mar 13 09:41:41 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.13.19 + * Teach c-io where to find the PKI trust store + on OpenBSD by @knightjoel in (#553) + +------------------------------------------------------------------- +Wed Mar 1 10:29:01 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.13.18 + * Change #if _MSC_VER to #ifdef _MSC_VER by @jmklix in (#551) + +------------------------------------------------------------------- +Wed Feb 22 09:35:02 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.13.17 + * Fix HostResolver Callback by @waahm7 in (#523) +- from version 0.13.16 + * Use const in record_connection_failure by @waahm7 in (#550) + * Purge address cache by @waahm7 in (#546) + +------------------------------------------------------------------- +Mon Feb 6 14:08:59 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.13.15 + * Fix possible crash when host resolver returns + two addresses. by @TingDaoK in (#543) + * Fix build on OpenBSD by @knightjoel in (#545) + * Fix: Generate random callback by @waahm7 in (#542) + +------------------------------------------------------------------- +Wed Jan 18 13:18:07 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.13.14 + * Errno usage pass by @bretambrose in (#541) +- from version 0.13.13 + * Conditional fix for supporting glibc 3.0 by @sdavtaker in (#537) + * Use macros consistently by @DmitriyMusatkin in (#538) + * Fix macro usage by @DmitriyMusatkin in (#539) + * Stop checking errno after failed aws_fopen() by @graebm in (#540) + +------------------------------------------------------------------- +Wed Jan 4 13:11:36 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.13.12 + * Handle connection reset error code for posix + socket by @JonathanHenson in (#532) + * Fix bug with increment read window by @graebm in (#535) + +------------------------------------------------------------------- +Tue Nov 22 12:06:52 UTC 2022 - John Paul Adrian Glaubitz + +- Update to version 0.13.11 + * Add new SeekFailed, GetLengthFailed, GetLengthUnsupported, + and SeekUnsupported Errors by @waahm7 in (#530) + +------------------------------------------------------------------- +Wed Nov 16 15:18:55 UTC 2022 - John Paul Adrian Glaubitz + +- Update to version 0.13.10 + * Fix the crash from log by @TingDaoK in (#529) + * Create setter for TLS Cipher Preference by @alexw91 in (#531) + +------------------------------------------------------------------- +Fri Nov 11 13:16:45 UTC 2022 - John Paul Adrian Glaubitz + +- Update to version 0.13.9 + * Update CI to fix downstream build by @waahm7 in (#525) +- from version 0.13.8 + * Fix C++ One Definition Rules (ODR) Violations by @graebm in (#528) +- from version 0.13.7 + * OSX ECC key support by @xiazhvera in (#524) + * Fix aws_import_ecc_key_into_keychain debug by @waahm7 in (#526) + * sprintf() -> snprintf() by @graebm in (#527) + * Set thread names to help debugging by @graebm in (#519) + +------------------------------------------------------------------- +Tue Nov 1 12:44:12 UTC 2022 - John Paul Adrian Glaubitz + +- Update to version 0.13.6 + * Use const in aws_host_resolver_new_default by @waahm7 in (#522) + +------------------------------------------------------------------- +Mon Oct 17 10:37:04 UTC 2022 - John Paul Adrian Glaubitz + +- Update to version 0.13.5 + * Add AppVerifier by @TwistedTwigleg in (#516) + * Always set s_s2n_initialized_externally value by @waahm7 in (#517) + * migrate uri helpers from aws-c-io by @DmitriyMusatkin in (#518) + * Adds missing const by @waahm7 in (#520) +- from version 0.13.4 + * Fixes a missing include that may cause build failures depending + on linux distribution by @bretambrose in (#514) + * Fixes an event loop group clean up failure issue when process + is exiting by @waahm7 in (#515) + +------------------------------------------------------------------- +Fri Sep 2 09:36:09 UTC 2022 - John Paul Adrian Glaubitz + +- Update to version 0.13.3 + * Fix for heap access violation by @TwistedTwigleg in (#513) +- from version 0.13.2 + * Fallback for target load by @TingDaoK in (#511) +- from version 0.13.1 + * Clang windows by @bretambrose in (#504) + * ALPN availability check function now properly checks + for Windows 8.1 and above by @HolyZsiraf in (#502) + * VerifyVersionInfo doesn't behave like you'd expect + by @bretambrose in (#505) + * Tolerate s2n_init() being called before aws_io_library_init() + by @graebm in (#508) + +------------------------------------------------------------------- +Mon Aug 8 09:24:58 UTC 2022 - John Paul Adrian Glaubitz + +- Update to version 0.13.0 + * Custom TLS key operation support + + Add asserts to aws_retry_strategy refcounts. by @graebm in (#500) + + Custom TLS key operation support by @TwistedTwigleg in (#501) +- from version 0.12.0 + * Remove support for legacy PQ Key Exchange Algorithms + + Explicit warnings/error when default CA certificates + not found by @graebm in (#498) + + Remove support for legacy PQ Key Exchange Algorithms + by @alexw91 in (#497) + +------------------------------------------------------------------- +Mon Jul 11 13:25:36 UTC 2022 - John Paul Adrian Glaubitz + +- Update to version 0.11.2 + * Adds a channel task scheduling API that always uses the cross-thread + task queue. This API guarantees serialized order-of-submission is + order-of-execution. The default API does not guarantee this because + tasks submitted on the event loop thread may jump ahead of tasks + already in the cross-thread queue. +- from version 0.11.1 + * Fix error codes reported by windows sockets. by @graebm in (#489) + * New: aws_socket_get_bound_address() by @graebm in (#491) + +------------------------------------------------------------------- +Thu Apr 28 13:52:40 UTC 2022 - John Paul Adrian Glaubitz + +- Update to version 0.11.0 + * Input Stream API change by @TingDaoK in (#444) + * Changed Input Stream API to be refcounted +- from version 0.10.22 + * Ensure that library init/cleanup can be called + multiple times by @graebm in (#461) +- from version 0.10.21 + * Added ECC support for PKCS11 by @JamieHunter in (#479) + +------------------------------------------------------------------- +Thu Mar 17 08:16:10 UTC 2022 - John Paul Adrian Glaubitz + +- Update to version 0.10.20 + * Deprecate macOS keychain path function + * Improve errors when searching windows cert store +- from version 0.10.19 + * Fix possible memory leak in aws_tls_connection_options_copy. + + Now the aws_tls_connection_options_copy function will clean up the + options and release memory before copy into it. Please make sure + the copy destination option is initialized/zero out before call + the function. +- from version 0.10.18 + * Fix Certificate Chains for Windows + * aws_pkcs11_lib_behavior validation and spelling + * Fix aws-crt-swift by moving PKCS#11 headers + +------------------------------------------------------------------- +Fri Jan 7 10:38:39 UTC 2022 - John Paul Adrian Glaubitz + +- Update to version 0.10.17 + * Event loop pinning + TLS updates + + Support for channel creation with event loop pinning + + Additional TLS tests + + SCH_USE_STRONG_CRYPTO enabled by default on Windows + (monitor for potential breakage) + +------------------------------------------------------------------- +Tue Jan 4 14:52:52 UTC 2022 - John Paul Adrian Glaubitz + +- Update to version 0.10.16 + * Remove platform ifdefs from tls_channel_handler.h + + This fixes iOS builds +- from version 0.10.15 + * BUGFIX: Fix crash when crash when s2n connection + class fails to be created + +------------------------------------------------------------------- +Thu Dec 9 12:14:19 UTC 2021 - John Paul Adrian Glaubitz + +- Update to version 0.10.14 + * Remove Windows.h from header + + Removed Windows.h from public header + + Improved error reporting when getaddrinfo() fail + + Set default cpu_id on thread_options + + Better use of const in aws_tls_ctx_pkcs11_options +- from version 0.10.13 + * Support PKCS#11 for mutual TLS on Unix platforms + + Support PKCS#11 for mutual TLS on Unix platforms (#451) +- from version 0.10.12 + * Path API updates + + Moved aws_path_exist checks over to the safe variant. (#448) +- from version 0.10.11 + * Updated S2N PQ Crypto cipher preference list + + Add Round 3 Cipher Pref List to Allowlist (#447) +- from version 0.10.10 + * Removed file utils, moved to common + + Replace tls double channel (#441) + - Remove test first + - Add codebuild job spec that will run downstream integration + tests (aws-c-http) that exercise double tls + - Add channel API to read from initial handler +- Rename devel package to "devel" +- Switch BuildRequires to use cmake() and pkgconfig() macros + +------------------------------------------------------------------- +Mon Oct 11 07:47:07 UTC 2021 - John Paul Adrian Glaubitz + +- Update to version 0.10.9 + + TLS 1.3 Support + * Linux support for tls1.3 and switch to CRT-specific tls + configurations when using s2n + * Refactor pipe signal suppression to avoid logging spurious errors +- from version 0.10.8 + + Use ephemeral credentials for TLS on Windows + * Update secure channel configuration to use credentials in an ephemeral manner +- from version 0.10.7 + + Fix CA override functions + * This fixes the issue where "override_default_trust_store" functions did + not actually override the system trust store on Linux and Apple platforms. + +------------------------------------------------------------------- +Wed Jul 7 11:30:20 UTC 2021 - John Paul Adrian Glaubitz + +- Update to version 0.10.6 + + Managed thread handle release + * Updates the managed thread system to properly release Windows thread + handles. Requires an associated change in aws-c-common as well. + +------------------------------------------------------------------- +Mon Jun 21 12:07:26 UTC 2021 - John Paul Adrian Glaubitz + +- Update to version 0.10.5 + + Fix SNI check when custom root-CA used on Apple devices. + * Validate hostname on Mac when custom root-CA is used. (#396) +- from version 0.10.4 + + Revert Windows CRL checks on root CA override + * On Windows only, reverts the cached CRL check when validating a server + certificate chain using a root CA override. This check was added as part + of a larger change performing SNI validation with a root CA override (#385). + The SNI check remains in place. The CRL check was breaking tls connections + for multiple customers and appears to be subject to properties of the host + beyond the CRT's control. +- from version 0.10.3 + + Inconsistent trust store override behavior logged + * Added warning statement when trust store override is used (#394) + +------------------------------------------------------------------- +Thu Jun 10 11:03:51 UTC 2021 - John Paul Adrian Glaubitz + +- Update to version 0.10.2 + + iOS fix + * Removed call to sanitize pems on iOS (#391) +- from version 0.10.1 + + Fix Windows verify_peer = false issue in client mode + * Previously on Windows, we were not properly translating "verify_peer = false" + into a secure channel configuration that would actually skip peer verification + in client mode. We were always verifying the certificate no matter what the + setting's value. +- from version 0.10.0 + + All uses of aws_off_t replaced with int64_t + * CHANGE: All uses of aws_off_t replaced with int64_t. aws_off_t used to be 32 or + 64 bits, depending on a project's compiler flags. This was leading to bugs when + projects had different flags. Now in64_t is used instead. Beginning in aws-c-common + v0.6.0, aws_off_t is simply a typedef for int64_t, so hopefully this change is painless + for consumers. +- from version 0.9.14 + + Windows warnings + * Fix some Windows compile warnings that are not currently being caught by local CI and + only showing up in the publishing pipeline +- from version 0.9.13 + + Improve SNI validation, socket read error checking + * On Windows, properly do SNI and server cert chain verification when the + root CA has been overridden + * On Posix systems, check socket read error before making any potential log + calls which could overwrite the error info via internal sys calls + +------------------------------------------------------------------- +Fri May 14 12:05:24 UTC 2021 - John Paul Adrian Glaubitz + +- Update to version 0.9.12 + + TLS Context Initialization fix + * Fixes an issue where TLS context initialization could fail on + Linux due to passing in buffers that weren't properly zero- + terminated at their final length +- from version 0.9.11 + + Path URI Encoding Bugfix + * Fix for some characters not being correctly URI-encoded in the path + URI encode function. +- from version 0.9.10 + + Bugfix for shutdown race condition + * Fix for shutdown crash when peer hangs up immediately + following first non-TLS write (#379) + * Fixed ownership semantics in SecureTransport read_message +- from version 0.9.9 + + Support non-ascii file path + * Use aws_fopen to support non-ASCII file path for file stream + +------------------------------------------------------------------- +Mon Apr 26 10:36:48 UTC 2021 - John Paul Adrian Glaubitz + +- Update to version 0.9.8 + + Mac TLS API update + * Small update to Mac TLS keychain API signature +- from version 0.9.7 + + Fixing bug with aws_input_stream_new_from_file + * Changing fopen flags used by aws_input_stream_new_from_file to r+b + instead of r, which fixes a Windows issue where the stream may terminate + early due to an EOF character. +- from version 0.9.6 + + Windows ECC platform synchronization + * (Windows only) Synchronizes ECC import logic with the compilation/cmake + switch that links NCrypt in aws-c-cal +- from version 0.9.5 + + Mac Keychain and Windows ECC certs + * Hardened Windows certificate import process + * Added support for importing ECC certs/keys in Windows + * Added support for overriding the keychain on Macintosh +- from version 0.9.4 + + PEM comments support + * Support comments in PEM file. +- from version 0.9.3 + + Platform compiler fixes and TLS shutdown delay + * Misc compiler fixes on Windows + * Improve Mac foundation library integration + * honor s2n's tls shutdown delay on linux when applicable + * ASAN CI integration and resulting fixes +- from version 0.9.2 + + Support for bring your own crypto TLS implementation on Unix platforms + * Added support for bring your own crypto via the cmake -DBYO_CRYPTO flag +- from version 0.9.1 + + Removed dependency on lib crypto in aws-c-cal/s2n + * Updated builder version of s2n to latest release (#361) + * Updated to builder v0.8.4 + * Fixed build-deps to avoid compile issues from aws-lc +- from version 0.9.0 + + New managed thread API + * Convert to new managed thread system for threads that cannot be + reliably explicitly joined + +------------------------------------------------------------------- +Mon Feb 15 11:21:16 UTC 2021 - John Paul Adrian Glaubitz + +- Update to version 0.8.3 + + Socket write callbacks are always async + * Socket write callbacks are always async. Fixes bugs + in websocket an MQTT when writing large payloads. +- from version 0.8.2 + + Nested TLS support + * Fix per-platform TLS channel handler issues for channels + using nested TLS +- from version 0.8.1 + + Win32 fix + * Fix the build issue on Win32 targets + +------------------------------------------------------------------- +Fri Jan 8 12:04:21 UTC 2021 - John Paul Adrian Glaubitz + +- Update to version 0.8.0 + + NUMA-aware event-loops + + Host resolver improvements + + Best of two event-loop load balancing + + Windows build fix for iocp event loop (#346) + +------------------------------------------------------------------- +Wed Dec 16 11:30:42 UTC 2020 - John Paul Adrian Glaubitz + +- Update to version 0.7.1 + + Host resolver creation update + * Modifies the default host resolver creation function to take an options struct + +------------------------------------------------------------------- +Thu Nov 26 15:50:49 UTC 2020 - John Paul Adrian Glaubitz + +- Initial build + + Version 0.7.0 +- add ci_fix-cmake-modules-path.patch, aci_add-so-version.patch diff --git a/aws-c-io.spec b/aws-c-io.spec new file mode 100644 index 0000000..9846be7 --- /dev/null +++ b/aws-c-io.spec @@ -0,0 +1,98 @@ +# +# spec file for package aws-c-io +# +# Copyright (c) 2024 SUSE LLC +# +# All modifications and additions to the file contributed by third parties +# remain the property of their copyright owners, unless otherwise agreed +# upon. The license for this file, and modifications and additions to the +# file, is the same license as for the pristine package itself (unless the +# license for the pristine package is not an Open Source License, in which +# case the license is the MIT License). An "Open Source License" is a +# license that conforms to the Open Source Definition (Version 1.9) +# published by the Open Source Initiative. + +# Please submit bugfixes or comments via https://bugs.opensuse.org/ +# + + +%bcond_with test + +%define library_version 1.0.0 +%define library_soversion 0unstable +Name: aws-c-io +Version: 0.15.4 +Release: 0 +Summary: I/O and TLS package AWS SDK for C +License: Apache-2.0 +Group: Development/Libraries/C and C++ +URL: https://github.com/awslabs/aws-c-io +Source0: https://github.com/awslabs/%{name}/archive/v%{version}.tar.gz +Patch0: aci_add-so-version.patch +BuildRequires: cmake +BuildRequires: fdupes +BuildRequires: ninja +BuildRequires: cmake(aws-c-cal) +BuildRequires: cmake(aws-c-common) +BuildRequires: cmake(s2n) +BuildRequires: pkgconfig(libssl) + +%description +This is a module for the AWS SDK for C. It handles all I/O +and TLS work for application protocols. + +%package -n lib%{name}%{library_soversion} +Summary: Shared library files for aws-c-io library +Group: Development/Libraries/C and C++ + +%description -n lib%{name}%{library_soversion} +This is a module for the AWS SDK for C. It handles all I/O +and TLS work for application protocols. + +This package contains the dynamically linked library. + +%package devel +Summary: Development files for aws-c-io library +Group: Development/Libraries/C and C++ +Requires: lib%{name}%{library_soversion} = %{version} + +%description devel +This is a module for the AWS SDK for C. It handles all I/O +and TLS work for application protocols. + +This package contains the development files. + +%prep +%autosetup -p1 + +%build +%define __builder ninja +%cmake \ + -DCMAKE_BUILD_TYPE=Release +%make_jobs + +# Testsuite requires internet connection, so it won't work +%check +%if %{with test} +export LD_LIBRARY_PATH=%{_builddir}/%{name}-%{version}/build +%ctest +%endif + +%install +%cmake_install + +%post -n lib%{name}%{library_soversion} -p /sbin/ldconfig +%postun -n lib%{name}%{library_soversion} -p /sbin/ldconfig + +%files -n lib%{name}%{library_soversion} +%doc README.md +%license LICENSE +%{_libdir}/*.so.%{library_soversion} +%{_libdir}/*.so.%{library_version} + +%files devel +%{_libdir}/cmake/%{name}/ +%{_libdir}/*.so +%{_includedir}/* + +%changelog diff --git a/v0.14.12.tar.gz b/v0.14.12.tar.gz new file mode 100644 index 0000000..9d81a5e --- /dev/null +++ b/v0.14.12.tar.gz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:0e2adb66455bdaf0b280750f6eff4189db8ffbb452a2ff057e155b70045cadf6 +size 675271 diff --git a/v0.14.13.tar.gz b/v0.14.13.tar.gz new file mode 100644 index 0000000..30f5e89 --- /dev/null +++ b/v0.14.13.tar.gz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:1c228b1ed327e3a8518b89702ac0d93265cf50788038091e187c697cace7fa5a +size 675279 diff --git a/v0.14.15.tar.gz b/v0.14.15.tar.gz new file mode 100644 index 0000000..b93b35f --- /dev/null +++ b/v0.14.15.tar.gz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:701b8945c0c3fe5083e7989e69a0d9fa74a80fb2ff727605ed9452f5a5fb030f +size 679061 diff --git a/v0.14.16.tar.gz b/v0.14.16.tar.gz new file mode 100644 index 0000000..b38e371 --- /dev/null +++ b/v0.14.16.tar.gz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:bf78ab5dbeeaec2f55cb035e18c49ce8ba4e2ea7519e8b94e18ccd8851e39f4d +size 679062 diff --git a/v0.14.18.tar.gz b/v0.14.18.tar.gz new file mode 100644 index 0000000..7bccad4 --- /dev/null +++ b/v0.14.18.tar.gz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:44e9dee181ed7d867d1cc2944f4b4669259b569fc56bdd6dd4c7c30440fc4bf8 +size 679051 diff --git a/v0.14.9.tar.gz b/v0.14.9.tar.gz new file mode 100644 index 0000000..e60a3b4 --- /dev/null +++ b/v0.14.9.tar.gz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:3a3b7236f70209ac12b5bafa7dd81b75cc68b691a0aa0686d6d3b7e4bbe5fbc9 +size 672964 diff --git a/v0.15.1.tar.gz b/v0.15.1.tar.gz new file mode 100644 index 0000000..ecbabc5 --- /dev/null +++ b/v0.15.1.tar.gz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:70f119b44f2758fc482872141cb712122f1c3c82fea16d203b7286a98c139a71 +size 679955 diff --git a/v0.15.2.tar.gz b/v0.15.2.tar.gz new file mode 100644 index 0000000..82061cc --- /dev/null +++ b/v0.15.2.tar.gz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:3fab086364bc48997ff6f5809825603f0b88cc892382ce21f5d66ce8996c95ef +size 679998 diff --git a/v0.15.3.tar.gz b/v0.15.3.tar.gz new file mode 100644 index 0000000..fb00b89 --- /dev/null +++ b/v0.15.3.tar.gz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:d8cb4d7d3ec4fb27cbce158d6823a1f2f5d868e116f1d6703db2ab8159343c3f +size 681849 diff --git a/v0.15.4.tar.gz b/v0.15.4.tar.gz new file mode 100644 index 0000000..465c00c --- /dev/null +++ b/v0.15.4.tar.gz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:e5202033b09df61ffb2a57284a04735ac013296decc107de1c4abd1ce7d5cfda +size 687131