From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mp0 ([2001:41d0:8:6d80::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by ms11 with LMTPS id gcXMNfiMNWC2VwAA0tVLHw (envelope-from ) for ; Tue, 23 Feb 2021 23:17:12 +0000 Received: from aspmx1.migadu.com ([2001:41d0:8:6d80::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by mp0 with LMTPS id gC4qMfiMNWBvOgAA1q6Kng (envelope-from ) for ; Tue, 23 Feb 2021 23:17:12 +0000 Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by aspmx1.migadu.com (Postfix) with ESMTPS id 328E326322 for ; Wed, 24 Feb 2021 00:17:12 +0100 (CET) Received: from localhost ([::1]:54972 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1lEgvX-0002ys-DU for larch@yhetil.org; Tue, 23 Feb 2021 18:17:11 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]:52118) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1lEgvN-0002yl-TQ for guix-patches@gnu.org; Tue, 23 Feb 2021 18:17:01 -0500 Received: from debbugs.gnu.org ([209.51.188.43]:49354) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1lEgvN-00040r-MU for guix-patches@gnu.org; Tue, 23 Feb 2021 18:17:01 -0500 Received: from Debian-debbugs by debbugs.gnu.org with local (Exim 4.84_2) (envelope-from ) id 1lEgvN-0003ct-Im for guix-patches@gnu.org; Tue, 23 Feb 2021 18:17:01 -0500 X-Loop: help-debbugs@gnu.org Subject: [bug#46728] [PATCH 3/7] gnu: Add aws-c-cal. Resent-From: Greg Hogan Original-Sender: "Debbugs-submit" Resent-CC: guix-patches@gnu.org Resent-Date: Tue, 23 Feb 2021 23:17:01 +0000 Resent-Message-ID: Resent-Sender: help-debbugs@gnu.org X-GNU-PR-Message: followup 46728 X-GNU-PR-Package: guix-patches X-GNU-PR-Keywords: patch To: 46728@debbugs.gnu.org Received: via spool by 46728-submit@debbugs.gnu.org id=B46728.161412219913908 (code B ref 46728); Tue, 23 Feb 2021 23:17:01 +0000 Received: (at 46728) by debbugs.gnu.org; 23 Feb 2021 23:16:39 +0000 Received: from localhost ([127.0.0.1]:60900 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1lEgv0-0003cF-SM for submit@debbugs.gnu.org; Tue, 23 Feb 2021 18:16:39 -0500 Received: from mail-il1-f179.google.com ([209.85.166.179]:44207) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1lEguy-0003c2-Lx for 46728@debbugs.gnu.org; Tue, 23 Feb 2021 18:16:37 -0500 Received: by mail-il1-f179.google.com with SMTP id o1so49246ila.11 for <46728@debbugs.gnu.org>; Tue, 23 Feb 2021 15:16:36 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=greghogan-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to; bh=8evI+avkQfvXT3MxugbnnHF05t5vGgu+nrz5XUTdG1I=; b=uUZvrmNv5WaGP7o6AbEmJRTBHAQynKN+yEMYaNnbJ2tDNygNvrdflptwDOhz4jeFD8 dZaM8WSPdkobD3jgQ7i2e5aqYoRj/n1Y/31Bgx+bMOUJR/gyA2w9GHHJeIykDRDEU2qL qtiStgUg0xg2vRjKj7RLFC54xRp9dd1taiACeX4UsLqufQ3yltrb2dMeQxfkmzQf6t4M fEMox6Niv1A2AH8wdmAihdnhyCeRpzKzFxS8dQMF0mzf1IDsOP5iSAD4USH4baxOI7Vm KlehiUNTtG1NqDvCkAGWLg7aK9+AX7ir/A3Jnv5c8hRx/DmEzSmcYSJQY0BeayAUTmyH 8BtQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=8evI+avkQfvXT3MxugbnnHF05t5vGgu+nrz5XUTdG1I=; b=OC01r2mPKcrDNfWfc0IZf3BTWES2W4Wx3K5O9q7EmhPj2gV0zrHDJST6pQu+Kmznfc CwMKu0v5SxV2a4aQ1EYoaaIDYU4mqep8ZCBxFisF/9in6GuLQ3C4AmI7z+ZvRWBkcJLC HViUPRlchf9k8CJ2Tx/tpp8iX8x4z010yll8l+7Kxtxjp4/eW/R/ngAViaEDWCpUD48O p92tVo3P+M6wEPTTk8LePhmC18f8zlMejSgmNXu74YVqTsXKzCxpcm4b1Jtv1b+nZNlv SU0xDlWcOGTWtpokJIKar2Y0HMFdeMO/y2AULHPPpNM+qfUT9DDH5eXVc1Lye6eFqnEf Kecg== X-Gm-Message-State: AOAM531TFsUSGdFmyDioqnFBy+UaJBvhPp6RpjZaNlSJe6zbKvau0REh K0/k9V9zDgyVzCMoU6YzoIKFhpgeVGuTU0FCAnXBrp5ADjj2dtM/ X-Google-Smtp-Source: ABdhPJz6k61UIZ6LNY4+beLe2ClDqeI6Xp9on0BqSopwDPt4MANMnisp1QCGZB/syO4kH9DOiKEfrR4D9WQFWZyDKOw= X-Received: by 2002:a92:5404:: with SMTP id i4mr19107513ilb.193.1614122191138; Tue, 23 Feb 2021 15:16:31 -0800 (PST) MIME-Version: 1.0 References: In-Reply-To: From: Greg Hogan Date: Tue, 23 Feb 2021 18:16:20 -0500 Message-ID: Content-Type: multipart/mixed; boundary="000000000000d3ddad05bc091b18" X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list X-BeenThere: guix-patches@gnu.org List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: guix-patches-bounces+larch=yhetil.org@gnu.org Sender: "Guix-patches" X-Migadu-Flow: FLOW_IN X-Migadu-Spam-Score: -1.27 Authentication-Results: aspmx1.migadu.com; dkim=fail ("body hash did not verify") header.d=greghogan-com.20150623.gappssmtp.com header.s=20150623 header.b=uUZvrmNv; dmarc=none; spf=pass (aspmx1.migadu.com: domain of guix-patches-bounces@gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=guix-patches-bounces@gnu.org X-Migadu-Queue-Id: 328E326322 X-Spam-Score: -1.27 X-Migadu-Scanner: scn0.migadu.com X-TUID: F2SxK+2Y0lho --000000000000d3ddad05bc091b18 Content-Type: multipart/alternative; boundary="000000000000d3ddac05bc091b16" --000000000000d3ddac05bc091b16 Content-Type: text/plain; charset="UTF-8" >From 1085752d13ead6359e7a59b96bb41edec3986d88 Mon Sep 17 00:00:00 2001 From: Greg Hogan Date: Tue, 19 Jan 2021 12:51:36 +0000 Subject: [PATCH 3/7] gnu: Add aws-c-cal. * gnu/packages/c.scm (aws-c-cal): New variable. * gnu/packages/patches/aws-c-cal-cmake-prefix.patch: New file. * gnu/local.mk (dist_patch_DATA): Add it. --- gnu/local.mk | 1 + gnu/packages/c.scm | 27 +++++++++++++++++++ .../patches/aws-c-cal-cmake-prefix.patch | 13 +++++++++ 3 files changed, 41 insertions(+) create mode 100644 gnu/packages/patches/aws-c-cal-cmake-prefix.patch diff --git a/gnu/local.mk b/gnu/local.mk index ae5a65cfcf..f16c1ae240 100644 --- a/gnu/local.mk +++ b/gnu/local.mk @@ -830,6 +830,7 @@ dist_patch_DATA = \ %D%/packages/patches/avahi-localstatedir.patch \ %D%/packages/patches/avidemux-install-to-lib.patch \ %D%/packages/patches/awesome-reproducible-png.patch \ + %D%/packages/patches/aws-c-cal-cmake-prefix.patch \ %D%/packages/patches/aws-c-event-stream-cmake-prefix.patch \ %D%/packages/patches/aws-checksums-cmake-prefix.patch \ %D%/packages/patches/azr3.patch \ diff --git a/gnu/packages/c.scm b/gnu/packages/c.scm index 7230972a68..48230b41c3 100644 --- a/gnu/packages/c.scm +++ b/gnu/packages/c.scm @@ -52,6 +52,7 @@ #:use-module (gnu packages autotools) #:use-module (gnu packages gettext) #:use-module (gnu packages pkg-config) + #:use-module (gnu packages tls) #:use-module (gnu packages xml)) (define-public tcc @@ -614,3 +615,29 @@ event stream encoding, a binary format for bidirectional client-server communication.") (home-page "https://github.com/awslabs/aws-c-event-stream") (license license:asl2.0))) + +(define-public aws-c-cal + (package + (name "aws-c-cal") + (version "0.4.5") + (source (origin + (method git-fetch) + (uri (git-reference + (url (string-append "https://github.com/awslabs/" name)) + (commit (string-append "v" version)))) + (file-name (git-file-name name version)) + (sha256 + (base32 + "04acra1mnzw9q7jycs5966akfbgnx96hkrq90nq0dhw8pvarlyv6")) + (patches (search-patches "aws-c-cal-cmake-prefix.patch")))) + (build-system cmake-build-system) + (propagated-inputs + `(("aws-c-common" ,aws-c-common))) + (inputs + `(("openssl" ,openssl) + ("openssl:static" ,openssl "static"))) + (synopsis "Amazon Web Services Crypto Abstraction Layer") + (description "This library provides a C99 wrapper for hash, HMAC, and ECC +cryptographic primitives for the @acronym{AWS,Amazon Web Services} SDK.") + (home-page "https://github.com/awslabs/aws-c-cal") + (license license:asl2.0))) diff --git a/gnu/packages/patches/aws-c-cal-cmake-prefix.patch b/gnu/packages/patches/aws-c-cal-cmake-prefix.patch new file mode 100644 index 0000000000..1ee7aa851d --- /dev/null +++ b/gnu/packages/patches/aws-c-cal-cmake-prefix.patch @@ -0,0 +1,13 @@ +--- a/CMakeLists.txt ++++ b/CMakeLists.txt +@@ -10,6 +10,10 @@ endif() + + option(BYO_CRYPTO "Set this if you want to provide your own cryptography implementation. This will cause the defaults to not be compiled." OFF) + ++if (DEFINED ENV{CMAKE_PREFIX_PATH}) ++ set(CMAKE_PREFIX_PATH $ENV{CMAKE_PREFIX_PATH}) ++endif() ++ + if (DEFINED CMAKE_PREFIX_PATH) + file(TO_CMAKE_PATH "${CMAKE_PREFIX_PATH}" CMAKE_PREFIX_PATH) + endif() -- 2.30.1 --000000000000d3ddac05bc091b16 Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable
From 1085752d13ead6359e7a59b96bb41ed= ec3986d88 Mon Sep 17 00:00:00 2001
From: Greg Hogan <code@greghogan.com>
Date: T= ue, 19 Jan 2021 12:51:36 +0000
Subject: [PATCH 3/7] gnu: Add aws-= c-cal.

* gnu/packages/c.scm (aws-c-cal): New varia= ble.
* gnu/packages/patches/aws-c-cal-cmake-prefix.patch:
New file.
* gnu/local.mk (dist= _patch_DATA): Add it.
---
=C2=A0gnu/local.mk =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2= =A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0| =C2=A01= +
=C2=A0gnu/packages/c.scm =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 = =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0| 27 ++++++++= +++++++++++
=C2=A0.../patches/aws-c-cal-cmake-prefix.patch =C2=A0= =C2=A0 =C2=A0| 13 +++++++++
=C2=A03 files changed, 41 insertions= (+)
=C2=A0create mode 100644 gnu/packages/patches/aws-c-cal-cmake= -prefix.patch

diff --git a/gnu/local.mk b/gnu/local.mk
<= div>index ae5a65cfcf..f16c1ae240 100644
--- a/gnu/local.mk
+++ b/gnu/l= ocal.mk
@@ -830,6 +830,7 @@ dist_patch_DATA =3D \
= =C2=A0 =C2=A0%D%/packages/patches/avahi-localstatedir.patch \
=C2=A0 = =C2=A0%D%/packages/patches/avidemux-install-to-lib.patch \
=C2=A0 =C2= =A0%D%/packages/patches/awesome-reproducible-png.patch \
+ =C2=A0%D%/= packages/patches/aws-c-cal-cmake-prefix.patch \
=C2=A0 =C2=A0%D%/pack= ages/patches/aws-c-event-stream-cmake-prefix.patch =C2=A0\
=C2=A0= =C2=A0%D%/packages/patches/aws-checksums-cmake-prefix.patch \
=C2=A0= =C2=A0%D%/packages/patches/azr3.patch \
diff --git a/gnu/packages/= c.scm b/gnu/packages/c.scm
index 7230972a68..48230b41c3 100644
--- a/gnu/packages/c.scm
+++ b/gnu/packages/c.scm
@@ -52,6 +52,7 @@
=C2=A0 =C2=A0#:use-module (gnu packages auto= tools)
=C2=A0 =C2=A0#:use-module (gnu packages gettext)
=C2=A0 =C2=A0#:use-module (gnu packages pkg-config)
+ =C2=A0#:us= e-module (gnu packages tls)
=C2=A0 =C2=A0#:use-module (gnu packag= es xml))

=C2=A0(define-public tcc
@@ -61= 4,3 +615,29 @@ event stream encoding, a binary format for bidirectional cli= ent-server
=C2=A0communication.")
=C2=A0 =C2=A0 = =C2=A0(home-page "https://github.com/awslabs/aws-c-event-stream")
= =C2=A0 =C2=A0 =C2=A0(license license:asl2.0)))
+
+(defi= ne-public aws-c-cal
+ =C2=A0(package
+ =C2=A0 =C2=A0(na= me "aws-c-cal")
+ =C2=A0 =C2=A0(version "0.4.5&quo= t;)
+ =C2=A0 =C2=A0(source (origin
+ =C2=A0 =C2=A0 =C2= =A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0(method git-fetch)
+ =C2=A0 =C2=A0= =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0(uri (git-reference
+ =C2=A0 = =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0(url (string-= append "https://github.com/aws= labs/" name))
+ =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2= =A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0(commit (string-append "v" version= ))))
+ =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0(file-name= (git-file-name name version))
+ =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2= =A0 =C2=A0 =C2=A0(sha256
+ =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2= =A0 =C2=A0 (base32
+ =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 = =C2=A0 =C2=A0"04acra1mnzw9q7jycs5966akfbgnx96hkrq90nq0dhw8pvarlyv6&quo= t;))
+ =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0(patches (= search-patches "aws-c-cal-cmake-prefix.patch"))))
+ =C2= =A0 =C2=A0(build-system cmake-build-system)
+ =C2=A0 =C2=A0(propa= gated-inputs
+ =C2=A0 =C2=A0 `(("aws-c-common" ,aws-c-c= ommon)))
+ =C2=A0 =C2=A0(inputs
+ =C2=A0 =C2=A0 `((&quo= t;openssl" ,openssl)
+ =C2=A0 =C2=A0 =C2=A0 ("openssl:s= tatic" ,openssl "static")))
+ =C2=A0 =C2=A0(synops= is "Amazon Web Services Crypto Abstraction Layer")
+ = =C2=A0 =C2=A0(description "This library provides a C99 wrapper for has= h, HMAC, and ECC
+cryptographic primitives for the @acronym{AWS,A= mazon Web Services} SDK.")
+ =C2=A0 =C2=A0(home-page "<= a href=3D"https://github.com/awslabs/aws-c-cal">https://github.com/awslabs/= aws-c-cal")
+ =C2=A0 =C2=A0(license license:asl2.0)))
diff --git a/gnu/packages/patches/aws-c-cal-cmake-prefix.patch b/gn= u/packages/patches/aws-c-cal-cmake-prefix.patch
new file mode 100= 644
index 0000000000..1ee7aa851d
--- /dev/null
+++ b/gnu/packages/patches/aws-c-cal-cmake-prefix.patch
@@ -0,0= +1,13 @@
+--- a/CMakeLists.txt
++++ b/CMakeLists.txt
+@@ -10,6 +10,10 @@ endif()
+
+ option(BYO_CRY= PTO "Set this if you want to provide your own cryptography implementat= ion. This will cause the defaults to not be compiled." OFF)
= +
++if (DEFINED ENV{CMAKE_PREFIX_PATH})
++ =C2=A0 =C2= =A0set(CMAKE_PREFIX_PATH $ENV{CMAKE_PREFIX_PATH})
++endif()
=
++
+ if (DEFINED CMAKE_PREFIX_PATH)
+ =C2=A0 =C2= =A0 file(TO_CMAKE_PATH "${CMAKE_PREFIX_PATH}" CMAKE_PREFIX_PATH)<= /div>
+ endif()
--
2.30.1
--000000000000d3ddac05bc091b16-- --000000000000d3ddad05bc091b18 Content-Type: application/x-patch; name="0003-gnu-Add-aws-c-cal.patch" Content-Disposition: attachment; filename="0003-gnu-Add-aws-c-cal.patch" Content-Transfer-Encoding: base64 Content-ID: X-Attachment-Id: f_klimmvpn0 RnJvbSAxMDg1NzUyZDEzZWFkNjM1OWU3YTU5Yjk2YmI0MWVkZWMzOTg2ZDg4IE1vbiBTZXAgMTcg MDA6MDA6MDAgMjAwMQpGcm9tOiBHcmVnIEhvZ2FuIDxjb2RlQGdyZWdob2dhbi5jb20+CkRhdGU6 IFR1ZSwgMTkgSmFuIDIwMjEgMTI6NTE6MzYgKzAwMDAKU3ViamVjdDogW1BBVENIIDMvN10gZ251 OiBBZGQgYXdzLWMtY2FsLgoKKiBnbnUvcGFja2FnZXMvYy5zY20gKGF3cy1jLWNhbCk6IE5ldyB2 YXJpYWJsZS4KKiBnbnUvcGFja2FnZXMvcGF0Y2hlcy9hd3MtYy1jYWwtY21ha2UtcHJlZml4LnBh dGNoOgpOZXcgZmlsZS4KKiBnbnUvbG9jYWwubWsgKGRpc3RfcGF0Y2hfREFUQSk6IEFkZCBpdC4K LS0tCiBnbnUvbG9jYWwubWsgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgfCAgMSAr CiBnbnUvcGFja2FnZXMvYy5zY20gICAgICAgICAgICAgICAgICAgICAgICAgICAgfCAyNyArKysr KysrKysrKysrKysrKysrCiAuLi4vcGF0Y2hlcy9hd3MtYy1jYWwtY21ha2UtcHJlZml4LnBhdGNo ICAgICAgfCAxMyArKysrKysrKysKIDMgZmlsZXMgY2hhbmdlZCwgNDEgaW5zZXJ0aW9ucygrKQog Y3JlYXRlIG1vZGUgMTAwNjQ0IGdudS9wYWNrYWdlcy9wYXRjaGVzL2F3cy1jLWNhbC1jbWFrZS1w cmVmaXgucGF0Y2gKCmRpZmYgLS1naXQgYS9nbnUvbG9jYWwubWsgYi9nbnUvbG9jYWwubWsKaW5k ZXggYWU1YTY1Y2ZjZi4uZjE2YzFhZTI0MCAxMDA2NDQKLS0tIGEvZ251L2xvY2FsLm1rCisrKyBi L2dudS9sb2NhbC5tawpAQCAtODMwLDYgKzgzMCw3IEBAIGRpc3RfcGF0Y2hfREFUQSA9CQkJCQkJ XAogICAlRCUvcGFja2FnZXMvcGF0Y2hlcy9hdmFoaS1sb2NhbHN0YXRlZGlyLnBhdGNoCQlcCiAg ICVEJS9wYWNrYWdlcy9wYXRjaGVzL2F2aWRlbXV4LWluc3RhbGwtdG8tbGliLnBhdGNoCQlcCiAg ICVEJS9wYWNrYWdlcy9wYXRjaGVzL2F3ZXNvbWUtcmVwcm9kdWNpYmxlLXBuZy5wYXRjaAkJXAor ICAlRCUvcGFja2FnZXMvcGF0Y2hlcy9hd3MtYy1jYWwtY21ha2UtcHJlZml4LnBhdGNoCQlcCiAg ICVEJS9wYWNrYWdlcy9wYXRjaGVzL2F3cy1jLWV2ZW50LXN0cmVhbS1jbWFrZS1wcmVmaXgucGF0 Y2ggIFwKICAgJUQlL3BhY2thZ2VzL3BhdGNoZXMvYXdzLWNoZWNrc3Vtcy1jbWFrZS1wcmVmaXgu cGF0Y2gJCVwKICAgJUQlL3BhY2thZ2VzL3BhdGNoZXMvYXpyMy5wYXRjaAkJCQlcCmRpZmYgLS1n aXQgYS9nbnUvcGFja2FnZXMvYy5zY20gYi9nbnUvcGFja2FnZXMvYy5zY20KaW5kZXggNzIzMDk3 MmE2OC4uNDgyMzBiNDFjMyAxMDA2NDQKLS0tIGEvZ251L3BhY2thZ2VzL2Muc2NtCisrKyBiL2du dS9wYWNrYWdlcy9jLnNjbQpAQCAtNTIsNiArNTIsNyBAQAogICAjOnVzZS1tb2R1bGUgKGdudSBw YWNrYWdlcyBhdXRvdG9vbHMpCiAgICM6dXNlLW1vZHVsZSAoZ251IHBhY2thZ2VzIGdldHRleHQp CiAgICM6dXNlLW1vZHVsZSAoZ251IHBhY2thZ2VzIHBrZy1jb25maWcpCisgICM6dXNlLW1vZHVs ZSAoZ251IHBhY2thZ2VzIHRscykKICAgIzp1c2UtbW9kdWxlIChnbnUgcGFja2FnZXMgeG1sKSkK IAogKGRlZmluZS1wdWJsaWMgdGNjCkBAIC02MTQsMyArNjE1LDI5IEBAIGV2ZW50IHN0cmVhbSBl bmNvZGluZywgYSBiaW5hcnkgZm9ybWF0IGZvciBiaWRpcmVjdGlvbmFsIGNsaWVudC1zZXJ2ZXIK IGNvbW11bmljYXRpb24uIikKICAgICAoaG9tZS1wYWdlICJodHRwczovL2dpdGh1Yi5jb20vYXdz bGFicy9hd3MtYy1ldmVudC1zdHJlYW0iKQogICAgIChsaWNlbnNlIGxpY2Vuc2U6YXNsMi4wKSkp CisKKyhkZWZpbmUtcHVibGljIGF3cy1jLWNhbAorICAocGFja2FnZQorICAgIChuYW1lICJhd3Mt Yy1jYWwiKQorICAgICh2ZXJzaW9uICIwLjQuNSIpCisgICAgKHNvdXJjZSAob3JpZ2luCisgICAg ICAgICAgICAgIChtZXRob2QgZ2l0LWZldGNoKQorICAgICAgICAgICAgICAodXJpIChnaXQtcmVm ZXJlbmNlCisgICAgICAgICAgICAgICAgICAgICh1cmwgKHN0cmluZy1hcHBlbmQgImh0dHBzOi8v Z2l0aHViLmNvbS9hd3NsYWJzLyIgbmFtZSkpCisgICAgICAgICAgICAgICAgICAgIChjb21taXQg KHN0cmluZy1hcHBlbmQgInYiIHZlcnNpb24pKSkpCisgICAgICAgICAgICAgIChmaWxlLW5hbWUg KGdpdC1maWxlLW5hbWUgbmFtZSB2ZXJzaW9uKSkKKyAgICAgICAgICAgICAgKHNoYTI1NgorICAg ICAgICAgICAgICAgKGJhc2UzMgorICAgICAgICAgICAgICAgICIwNGFjcmExbW56dzlxN2p5Y3M1 OTY2YWtmYmdueDk2aGtycTkwbnEwZGh3OHB2YXJseXY2IikpCisgICAgICAgICAgICAgIChwYXRj aGVzIChzZWFyY2gtcGF0Y2hlcyAiYXdzLWMtY2FsLWNtYWtlLXByZWZpeC5wYXRjaCIpKSkpCisg ICAgKGJ1aWxkLXN5c3RlbSBjbWFrZS1idWlsZC1zeXN0ZW0pCisgICAgKHByb3BhZ2F0ZWQtaW5w dXRzCisgICAgIGAoKCJhd3MtYy1jb21tb24iICxhd3MtYy1jb21tb24pKSkKKyAgICAoaW5wdXRz CisgICAgIGAoKCJvcGVuc3NsIiAsb3BlbnNzbCkKKyAgICAgICAoIm9wZW5zc2w6c3RhdGljIiAs b3BlbnNzbCAic3RhdGljIikpKQorICAgIChzeW5vcHNpcyAiQW1hem9uIFdlYiBTZXJ2aWNlcyBD cnlwdG8gQWJzdHJhY3Rpb24gTGF5ZXIiKQorICAgIChkZXNjcmlwdGlvbiAiVGhpcyBsaWJyYXJ5 IHByb3ZpZGVzIGEgQzk5IHdyYXBwZXIgZm9yIGhhc2gsIEhNQUMsIGFuZCBFQ0MKK2NyeXB0b2dy YXBoaWMgcHJpbWl0aXZlcyBmb3IgdGhlIEBhY3Jvbnlte0FXUyxBbWF6b24gV2ViIFNlcnZpY2Vz fSBTREsuIikKKyAgICAoaG9tZS1wYWdlICJodHRwczovL2dpdGh1Yi5jb20vYXdzbGFicy9hd3Mt Yy1jYWwiKQorICAgIChsaWNlbnNlIGxpY2Vuc2U6YXNsMi4wKSkpCmRpZmYgLS1naXQgYS9nbnUv cGFja2FnZXMvcGF0Y2hlcy9hd3MtYy1jYWwtY21ha2UtcHJlZml4LnBhdGNoIGIvZ251L3BhY2th Z2VzL3BhdGNoZXMvYXdzLWMtY2FsLWNtYWtlLXByZWZpeC5wYXRjaApuZXcgZmlsZSBtb2RlIDEw MDY0NAppbmRleCAwMDAwMDAwMDAwLi4xZWU3YWE4NTFkCi0tLSAvZGV2L251bGwKKysrIGIvZ251 L3BhY2thZ2VzL3BhdGNoZXMvYXdzLWMtY2FsLWNtYWtlLXByZWZpeC5wYXRjaApAQCAtMCwwICsx LDEzIEBACistLS0gYS9DTWFrZUxpc3RzLnR4dAorKysrIGIvQ01ha2VMaXN0cy50eHQKK0BAIC0x MCw2ICsxMCwxMCBAQCBlbmRpZigpCisgCisgb3B0aW9uKEJZT19DUllQVE8gIlNldCB0aGlzIGlm IHlvdSB3YW50IHRvIHByb3ZpZGUgeW91ciBvd24gY3J5cHRvZ3JhcGh5IGltcGxlbWVudGF0aW9u LiBUaGlzIHdpbGwgY2F1c2UgdGhlIGRlZmF1bHRzIHRvIG5vdCBiZSBjb21waWxlZC4iIE9GRikK KyAKKytpZiAoREVGSU5FRCBFTlZ7Q01BS0VfUFJFRklYX1BBVEh9KQorKyAgICBzZXQoQ01BS0Vf UFJFRklYX1BBVEggJEVOVntDTUFLRV9QUkVGSVhfUEFUSH0pCisrZW5kaWYoKQorKworIGlmIChE RUZJTkVEIENNQUtFX1BSRUZJWF9QQVRIKQorICAgICBmaWxlKFRPX0NNQUtFX1BBVEggIiR7Q01B S0VfUFJFRklYX1BBVEh9IiBDTUFLRV9QUkVGSVhfUEFUSCkKKyBlbmRpZigpCi0tIAoyLjMwLjEK Cg== --000000000000d3ddad05bc091b18--