From 5535cb4a93724c4b6ab0c5c3de2f3cf9bc8cd1cf70818180a1c7862931176996 Mon Sep 17 00:00:00 2001 From: John Paul Adrian Glaubitz Date: Fri, 6 Sep 2024 12:00:05 +0000 Subject: [PATCH] - Update to version 0.7.27 * Add content-sha256 header for presign when the signed_body_value is set to UNSIGNED-PAYLOAD by @TingDaoK in (#248) OBS-URL: https://build.opensuse.org/package/show/devel:libraries:c_c++/aws-c-auth?expand=0&rev=43 --- .gitattributes | 23 +++ .gitignore | 1 + aca_fix-cmake-modules-path.patch | 45 ++++++ aws-c-auth.changes | 259 +++++++++++++++++++++++++++++++ aws-c-auth.spec | 107 +++++++++++++ v0.7.22.tar.gz | 3 + v0.7.23.tar.gz | 3 + v0.7.24.tar.gz | 3 + v0.7.26.tar.gz | 3 + v0.7.27.tar.gz | 3 + 10 files changed, 450 insertions(+) create mode 100644 .gitattributes create mode 100644 .gitignore create mode 100644 aca_fix-cmake-modules-path.patch create mode 100644 aws-c-auth.changes create mode 100644 aws-c-auth.spec create mode 100644 v0.7.22.tar.gz create mode 100644 v0.7.23.tar.gz create mode 100644 v0.7.24.tar.gz create mode 100644 v0.7.26.tar.gz create mode 100644 v0.7.27.tar.gz diff --git a/.gitattributes b/.gitattributes new file mode 100644 index 0000000..9b03811 --- /dev/null +++ b/.gitattributes @@ -0,0 +1,23 @@ +## Default LFS +*.7z filter=lfs diff=lfs merge=lfs -text +*.bsp filter=lfs diff=lfs merge=lfs -text +*.bz2 filter=lfs diff=lfs merge=lfs -text +*.gem filter=lfs diff=lfs merge=lfs -text +*.gz filter=lfs diff=lfs merge=lfs -text +*.jar filter=lfs diff=lfs merge=lfs -text +*.lz filter=lfs diff=lfs merge=lfs -text +*.lzma filter=lfs diff=lfs merge=lfs -text +*.obscpio filter=lfs diff=lfs merge=lfs -text +*.oxt filter=lfs diff=lfs merge=lfs -text +*.pdf filter=lfs diff=lfs merge=lfs -text +*.png filter=lfs diff=lfs merge=lfs -text +*.rpm filter=lfs diff=lfs merge=lfs -text +*.tbz filter=lfs diff=lfs merge=lfs -text +*.tbz2 filter=lfs diff=lfs merge=lfs -text +*.tgz filter=lfs diff=lfs merge=lfs -text +*.ttf filter=lfs diff=lfs merge=lfs -text +*.txz filter=lfs diff=lfs merge=lfs -text +*.whl filter=lfs diff=lfs merge=lfs -text +*.xz filter=lfs diff=lfs merge=lfs -text +*.zip filter=lfs diff=lfs merge=lfs -text +*.zst filter=lfs diff=lfs merge=lfs -text diff --git a/.gitignore b/.gitignore new file mode 100644 index 0000000..57affb6 --- /dev/null +++ b/.gitignore @@ -0,0 +1 @@ +.osc diff --git a/aca_fix-cmake-modules-path.patch b/aca_fix-cmake-modules-path.patch new file mode 100644 index 0000000..8e1eaff --- /dev/null +++ b/aca_fix-cmake-modules-path.patch @@ -0,0 +1,45 @@ +diff -Nru aws-c-auth-0.6.4.orig/CMakeLists.txt aws-c-auth-0.6.4/CMakeLists.txt +--- aws-c-auth-0.6.4.orig/CMakeLists.txt 2021-08-31 21:05:57.000000000 +0000 ++++ aws-c-auth-0.6.4/CMakeLists.txt 2021-10-12 12:14:56.438749566 +0000 +@@ -14,18 +14,11 @@ + file(TO_CMAKE_PATH "${CMAKE_INSTALL_PREFIX}" CMAKE_INSTALL_PREFIX) + endif() + +- +-if (UNIX AND NOT APPLE) +- include(GNUInstallDirs) +-elseif(NOT DEFINED CMAKE_INSTALL_LIBDIR) +- set(CMAKE_INSTALL_LIBDIR "lib") +-endif() +- +-# This is required in order to append /lib/cmake to each element in CMAKE_PREFIX_PATH +-set(AWS_MODULE_DIR "/${CMAKE_INSTALL_LIBDIR}/cmake") +-string(REPLACE ";" "${AWS_MODULE_DIR};" AWS_MODULE_PATH "${CMAKE_PREFIX_PATH}${AWS_MODULE_DIR}") +-# Append that generated list to the module search path +-list(APPEND CMAKE_MODULE_PATH ${AWS_MODULE_PATH}) ++find_package(aws-c-common REQUIRED) ++set(CMAKE_MODULE_PATH ${aws-c-common_DIR}) ++ ++list(APPEND CMAKE_MODULE_PATH "${CMAKE_CURRENT_LIST_DIR}/cmake/modules") ++include(GNUInstallDirs) + + include(AwsCFlags) + include(AwsCheckHeaders) +@@ -118,7 +111,7 @@ + endif() + + install(EXPORT "${PROJECT_NAME}-targets" +- DESTINATION "${LIBRARY_DIRECTORY}/${PROJECT_NAME}/cmake/${TARGET_DIR}/" ++ DESTINATION "${LIB_INSTALL_DIR}/cmake/${CMAKE_PROJECT_NAME}/${TARGET_DIR}/" + NAMESPACE AWS:: + COMPONENT Development) + +@@ -127,7 +120,7 @@ + @ONLY) + + install(FILES "${CMAKE_CURRENT_BINARY_DIR}/${PROJECT_NAME}-config.cmake" +- DESTINATION "${LIBRARY_DIRECTORY}/${PROJECT_NAME}/cmake/" ++ DESTINATION "${LIB_INSTALL_DIR}/cmake/${CMAKE_PROJECT_NAME}" + COMPONENT Development) + + include(CTest) diff --git a/aws-c-auth.changes b/aws-c-auth.changes new file mode 100644 index 0000000..0a2b694 --- /dev/null +++ b/aws-c-auth.changes @@ -0,0 +1,259 @@ +------------------------------------------------------------------- +Thu Sep 5 07:35:47 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.7.27 + * Add content-sha256 header for presign when the signed_body_value + is set to UNSIGNED-PAYLOAD by @TingDaoK in (#248) + +------------------------------------------------------------------- +Mon Aug 26 15:19:39 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.7.26 + * Update CacheCredentialsProvider Refresh Time to + 5 Minutes before Expiry by @waahm7 in (#247) + +------------------------------------------------------------------- +Wed Aug 7 13:33:07 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.7.25 + * Add ProcessProvider to ProfileProvider by @waahm7 in (#245) + +------------------------------------------------------------------- +Fri Aug 2 10:47:41 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.7.24 + * Fix Empty Env varibales for STSWebIdentity by @waahm7 in (#246) + +------------------------------------------------------------------- +Wed Jul 31 09:10:10 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.7.23 + * Ecforce ECS Credentials Provider IP Rules by @waahm7 in (#238) + * clang-format 18 by @graebm in (#242) + * Update MacOS to arm64 by @waahm7 in (#243) + * Support "external_id" in config file, + for STS AssumeRole by @graebm in (#244) + +------------------------------------------------------------------- +Thu Jun 13 12:32:10 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.7.22 + * trivial: add_net_test_case for credentials_provider_ecs_basic_success_uri_env + test by @waahm7 in (#240) + +------------------------------------------------------------------- +Mon May 13 08:36:07 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.7.21 + * Fix STSCredentialsProvider Signing Region by @waahm7 in (#239) +- from version 0.7.20 + * Fix STS Credentials Provider to use regional + endpoint if possible by @waahm7 in (#237) + +------------------------------------------------------------------- +Wed May 8 13:08:23 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.7.19 + * Refactor ECSCredentialsProvider Part 1 by @waahm7 in (#236) + * Refactor ECSCredentialsProvider Part 2 by @waahm7 in (#235) +- from version 0.7.18 + * Update ECS Credentials Provider to add support for + AWS_CONTAINER_AUTHORIZATION_TOKEN_FILE by @waahm7 in (#233) + +------------------------------------------------------------------- +Thu Apr 4 15:38:20 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.7.17 + * Additional logging for default credentials chain by @jamesbornholt in (#231) + * Remove unused test files by @jmklix in (#232) + +------------------------------------------------------------------- +Tue Feb 20 11:12:58 UTC 2024 - Dominique Leuenberger + +- Use %autosetup macro. Allows to eliminate the usage of deprecated + %patchN. + +------------------------------------------------------------------- +Mon Feb 19 15:27:03 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.7.16 + * Fix a bunch of places we forget to aws_raise_error() by @graebm in (#229) +- from version 0.7.15 + * Make Partial Creds a Transient Error by @waahm7 in (#226) + +------------------------------------------------------------------- +Sat Jan 27 16:37:26 UTC 2024 - Dirk Müller + +- fix packaging shlib naming + +------------------------------------------------------------------- +Fri Jan 26 11:48:06 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.7.14 + * Make Partial Creds a Transient Error by @waahm7 in (#226) +- from version 0.7.13 + * Handle empty path in AWS_CONTAINER_CREDENTIALS_FULL_URI + by @jamesbornholt in (#225) +- from version 0.7.12 + * Remove old test files by @graebm in (#223) + * Add assumeRole chain support by @waahm7 in (#224) +- from version 0.7.11 + * Add an option to disable environment credentials provider + in the default chain by @waahm7 in (#222) + +------------------------------------------------------------------- +Wed Jan 3 13:23:11 UTC 2024 - John Paul Adrian Glaubitz + +- Update to version 0.7.10 + * Change `port` from uint16_t to uint32_t to support VSOCK by @graebm in (#220) +- from version 0.7.9 + * Fix error when tests run in parallel by @graebm in (#221) + +------------------------------------------------------------------- +Thu Nov 30 12:37:35 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.7.8 + * Performance optimization updates by @TingDaoK in (#219) + +------------------------------------------------------------------- +Tue Nov 21 10:21:45 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.7.7 + * Add an Option to Disable v2 to v1 Fallback by @waahm7 in (#218) +- from version 0.7.6 + * Fix the imds client endless retry by @TingDaoK in (#217) +- from version 0.7.5 + * aws_signable refcounts request by @graebm in (#216) +- from version 0.7.4 + * Increase ancient bot by @jmklix in (#199) + * Fix permissions for stale issue bot by @jmklix in (#212) + * Minor CMakelists.txt cleanup by @graebm in (#213) + * Added workflow for handling answerable discussions + by @yasminetalby in (#214) + * StsWebIdentity allow parameters by @waahm7 in (#215) + +------------------------------------------------------------------- +Tue Aug 15 10:03:33 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.7.3 + * Remove Outdated Comment by @waahm7 in (#210) + * Fix ProcessCredentialsProvider Callback to + trigger once by @waahm7 in (#211) + +------------------------------------------------------------------- +Tue Jul 25 08:54:29 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.7.2 + * Allow Overriding of Profile in Default Chain by @waahm7 in (#209) +- from version 0.7.1 + * Treat empty environment variable as unset by @TingDaoK in (#206) + * Adapt to XML API changes by @graebm in (#207) + +------------------------------------------------------------------- +Wed Jul 5 10:48:09 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.7.0 + * Fix session token in ProcessCredentialsProvider by @waahm7 in (#205) + +------------------------------------------------------------------- +Mon Jul 3 12:41:17 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.6.30 + * Add process credentials provider in default chain by @waahm7 in (#204) + +------------------------------------------------------------------- +Fri Jun 23 08:07:54 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.6.29 + * Don't use the default cursor to override if + no override needed by @TingDaoK in (#200) + * Fix the function that saying accepting null + but actually not by @TingDaoK in (#201) + * Send Host header in IMDS requests + by @jamesbornholt in (#203) + +------------------------------------------------------------------- +Tue May 16 09:55:20 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.6.28 + * Fix warnings in public headers by @waahm7 in (#198) + +------------------------------------------------------------------- +Tue May 9 07:42:30 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.6.27 + * Fix aws_parse_credentials_from_json_document by @waahm7 in (#192) + * Fix the doc, decrement for release by @TingDaoK in (#194) + * Add github templates and bots by @jmklix in (#196) + * Update builder version to fix aws-lc build + on manylinux-1 by @TingDaoK in (#197) + * Implement SSOCredentialsProvider by @waahm7 in (#189) + +------------------------------------------------------------------- +Wed Mar 15 10:53:24 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.6.26 + * Add Option to Use Cached Profile Collection by @waahm7 in (#187) + +------------------------------------------------------------------- +Fri Mar 3 13:14:31 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.6.25 + * Event Signing Support via Sigv4 by @waahm7 in (#186) + +------------------------------------------------------------------- +Fri Feb 3 22:10:21 UTC 2023 - John Paul Adrian Glaubitz + +- Update to version 0.6.24 + * Fix trailer signing by @waahm7 in (#184) +- from version 0.6.23 + * Adds default monitoring options for IMDS client by @waahm7 in (#183) +- from version 0.6.22 + * Add codecov action by @TingDaoK in (#180) + * Fix macro usage by @DmitriyMusatkin in (#181) + +------------------------------------------------------------------- +Tue Nov 22 11:59:15 UTC 2022 - John Paul Adrian Glaubitz + +- Update to version 0.6.21 + * Add delegate failure error code by @waahm7 in (#179) + +------------------------------------------------------------------- +Fri Nov 11 13:03:48 UTC 2022 - John Paul Adrian Glaubitz + +- Update to version 0.6.20 + * Update CI by @waahm7 in (#177) +- from version 0.6.19 + * Fix C++ One Definition Rules (ODR) Violations by @graebm in (#178) + +------------------------------------------------------------------- +Wed Nov 2 09:04:34 UTC 2022 - John Paul Adrian Glaubitz + +- Update to version 0.6.18 + * Cognito tests require networking by @graebm in (#176) + +------------------------------------------------------------------- +Wed Oct 5 13:23:15 UTC 2022 - John Paul Adrian Glaubitz + +- Update to version 0.6.17 + * Adds basic cognito credentials provider implementation + +------------------------------------------------------------------- +Fri Sep 2 09:47:28 UTC 2022 - John Paul Adrian Glaubitz + +- Update to version 0.6.16 + * Use the default load target function by @TingDaoK in (#172) +- from version 0.6.15 + * Adds support for Anonymous Credentials by @waahm7 in (#171) +- from version 0.6.14 + * Expiration override by @bretambrose in (#166) + * STS web ID default by @bretambrose in (#167) + * Never sign "Expect" header by @graebm in (#170) +- Add rpmlint override for bogus shlib-policy-name-error + * aws-c-auth-rpmlintrc + +------------------------------------------------------------------- +Thu Apr 28 13:58:17 UTC 2022 - John Paul Adrian Glaubitz + +- Initial build + + Version 0.6.13 diff --git a/aws-c-auth.spec b/aws-c-auth.spec new file mode 100644 index 0000000..eac0c77 --- /dev/null +++ b/aws-c-auth.spec @@ -0,0 +1,107 @@ +# +# spec file for package aws-c-auth +# +# Copyright (c) 2024 SUSE LLC +# +# All modifications and additions to the file contributed by third parties +# remain the property of their copyright owners, unless otherwise agreed +# upon. The license for this file, and modifications and additions to the +# file, is the same license as for the pristine package itself (unless the +# license for the pristine package is not an Open Source License, in which +# case the license is the MIT License). An "Open Source License" is a +# license that conforms to the Open Source Definition (Version 1.9) +# published by the Open Source Initiative. + +# Please submit bugfixes or comments via https://bugs.opensuse.org/ +# + + +%define library_version 1.0.0 +%define library_pkg 1_0_0 +%define library_soversion 1 +Name: aws-c-auth +Version: 0.7.27 +Release: 0 +Summary: AWS C99 library implementation of AWS client-side authentication +License: Apache-2.0 +Group: Development/Libraries/C and C++ +URL: https://github.com/awslabs/aws-c-auth +Source0: https://github.com/awslabs/%{name}/archive/v%{version}.tar.gz +Patch0: aca_fix-cmake-modules-path.patch +BuildRequires: cmake +BuildRequires: fdupes +BuildRequires: cmake(aws-c-common) +BuildRequires: cmake(aws-c-compression) +BuildRequires: cmake(aws-c-cal) +BuildRequires: cmake(aws-c-http) +BuildRequires: cmake(aws-c-io) +BuildRequires: cmake(aws-c-sdkutils) +BuildRequires: cmake(s2n) +BuildRequires: pkgconfig(libssl) +BuildRequires: ninja +BuildRequires: pkgconfig + +%description +C99 library implementation of AWS client-side authentication: standard +credentials providers and signing. + +From a cryptographic perspective, only functions with the suffix "_constant_time" +should be considered constant time. + +%package -n lib%{name}%{library_pkg} +Summary: Shared library files for aws-c-auth library +Group: Development/Libraries/C and C++ +Provides: lib%{name}%{library_soversion} = %{version} +Obsoletes: lib%{name}%{library_soversion} <= %{version} + +%description -n lib%{name}%{library_pkg} +AWS C99 library implementation of AWS client-side authentication: +standard credentials providers and signing. + +This package contains the dynamically linked library. + +%package devel +Summary: Development files for aws-c-auth library +Group: Development/Libraries/C and C++ +Requires: lib%{name}%{library_pkg} = %{version} + +%description devel +AWS C99 library implementation of AWS client-side authentication: +standard credentials providers and signing. + +This package contains the development files. + +%prep +%autosetup -p1 + +%build +%define __builder ninja +%cmake \ + -DCMAKE_BUILD_TYPE=Release +%make_jobs + +# Testsuite currently hangs +# see: https://github.com/awslabs/aws-c-auth/issues/147 +#%%check +#export LD_LIBRARY_PATH=%{_builddir}/%{name}-%{version}/build +#%%ctest + +%install +%cmake_install +ln -s lib%{name}.so.%{library_version} %{buildroot}%{_libdir}/lib%{name}.so.%{library_soversion} + +%post -n lib%{name}%{library_pkg} -p /sbin/ldconfig +%postun -n lib%{name}%{library_pkg} -p /sbin/ldconfig + +%files -n lib%{name}%{library_pkg} +%doc README.md +%license LICENSE +%{_libdir}/*.so.%{library_soversion} +%{_libdir}/*.so.%{library_version} + +%files devel +%{_libdir}/cmake/%{name}/ +%{_libdir}/*.so +%{_includedir}/* + +%changelog diff --git a/v0.7.22.tar.gz b/v0.7.22.tar.gz new file mode 100644 index 0000000..38edede --- /dev/null +++ b/v0.7.22.tar.gz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:f249a12a6ac319e929c005fb7efd5534c83d3af3a3a53722626ff60a494054bb +size 253281 diff --git a/v0.7.23.tar.gz b/v0.7.23.tar.gz new file mode 100644 index 0000000..1d49730 --- /dev/null +++ b/v0.7.23.tar.gz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:ec2b7971c403263a710b6d963bbef583dd475fdc309a3b2f4030124ceffb0918 +size 255878 diff --git a/v0.7.24.tar.gz b/v0.7.24.tar.gz new file mode 100644 index 0000000..411fa27 --- /dev/null +++ b/v0.7.24.tar.gz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:0773951894742627ae122045e47211195fcbed3ce37b03cb2a123c6ff56a3e60 +size 255978 diff --git a/v0.7.26.tar.gz b/v0.7.26.tar.gz new file mode 100644 index 0000000..bf5851c --- /dev/null +++ b/v0.7.26.tar.gz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:7ec249622ac4eee38e9f974f9c0e6f3f06f3e3b55eba56e5934b0633f0e5e808 +size 256203 diff --git a/v0.7.27.tar.gz b/v0.7.27.tar.gz new file mode 100644 index 0000000..595f069 --- /dev/null +++ b/v0.7.27.tar.gz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:4b234b20e5ff216d28657662dd32c015922457851043e222f43162c776f29f78 +size 257885