From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mp0 ([2001:41d0:8:6d80::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by ms11 with LMTPS id ICUsIH+NNWC/QAAA0tVLHw (envelope-from ) for ; Tue, 23 Feb 2021 23:19:27 +0000 Received: from aspmx1.migadu.com ([2001:41d0:8:6d80::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by mp0 with LMTPS id UOQOHH+NNWBvOgAA1q6Kng (envelope-from ) for ; Tue, 23 Feb 2021 23:19:27 +0000 Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by aspmx1.migadu.com (Postfix) with ESMTPS id 7744926384 for ; Wed, 24 Feb 2021 00:19:26 +0100 (CET) Received: from localhost ([::1]:55478 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1lEgxh-0003My-K3 for larch@yhetil.org; Tue, 23 Feb 2021 18:19:25 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]:52478) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1lEgxK-0003MJ-NI for guix-patches@gnu.org; Tue, 23 Feb 2021 18:19:02 -0500 Received: from debbugs.gnu.org ([209.51.188.43]:49364) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1lEgxK-0004rW-GH for guix-patches@gnu.org; Tue, 23 Feb 2021 18:19:02 -0500 Received: from Debian-debbugs by debbugs.gnu.org with local (Exim 4.84_2) (envelope-from ) id 1lEgxK-0003gC-Bu for guix-patches@gnu.org; Tue, 23 Feb 2021 18:19:02 -0500 X-Loop: help-debbugs@gnu.org Subject: [bug#46728] [PATCH 5/7] gnu: Add aws-c-io. Resent-From: Greg Hogan Original-Sender: "Debbugs-submit" Resent-CC: guix-patches@gnu.org Resent-Date: Tue, 23 Feb 2021 23:19:02 +0000 Resent-Message-ID: Resent-Sender: help-debbugs@gnu.org X-GNU-PR-Message: followup 46728 X-GNU-PR-Package: guix-patches X-GNU-PR-Keywords: patch To: 46728@debbugs.gnu.org Received: via spool by 46728-submit@debbugs.gnu.org id=B46728.161412231414111 (code B ref 46728); Tue, 23 Feb 2021 23:19:02 +0000 Received: (at 46728) by debbugs.gnu.org; 23 Feb 2021 23:18:34 +0000 Received: from localhost ([127.0.0.1]:60910 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1lEgwr-0003fX-Q7 for submit@debbugs.gnu.org; Tue, 23 Feb 2021 18:18:34 -0500 Received: from mail-io1-f41.google.com ([209.85.166.41]:33438) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1lEgwp-0003fG-F5 for 46728@debbugs.gnu.org; Tue, 23 Feb 2021 18:18:32 -0500 Received: by mail-io1-f41.google.com with SMTP id 74so76660iob.0 for <46728@debbugs.gnu.org>; Tue, 23 Feb 2021 15:18:31 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=greghogan-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to; bh=CAC5JLQzz17z2CTx/xwhA9qXpG03wdKR6VS7wxiJsPE=; b=f1BQdWjBJc891qoKA/M12YM38BeEiV1cLJ3mDkXh2BhCJtP9V77zoUnFv76QgCNa7H pEiaEvwfHfRIb+kl74Q1Plbnu7x6QMXKT2ZaN98y5pU9mg1HIKt16EFV+i3UT5zg7nGK 4GIlxS9bVsO15JVnk4tHRMf4mHWp4OIPWRBphlQJyamehn1DAk7q6eV8o3M0tI++tz6b 4jQIfYTpEoAH45m5gG8ds6d0q5q4EnnrknRyemeNohulDjMHUdD2jegmpF1JQT8MUk70 CDbVsMCnqlWKbkva1uaKAzbNmXgaIhGAhCwM82honLtp5pR4/wT4TE9xHvPsiqDpjaFG CobQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=CAC5JLQzz17z2CTx/xwhA9qXpG03wdKR6VS7wxiJsPE=; b=ROTXTiqcqW09qd1y82q/h86dSOXputq7hKgVj+brC+wbq0UkdqASIRTgBuBrj8+2xk kmg9OEZMpf45vMnibh8+T/KiSBYy9c5pqylAtUHmx4BZ5WSJa2lXBbABvV6ew1Atsww3 cviAZpjQQ7UzimWeJHegg9p1T0sfCOcB/GHktojuLNG2jVmRzZnqwHZ6JIjACJRzIVzd GoV3T+DWVsxNXhOJOBZj/SmOe6QlgxNo74ruzPVCJeO58nurqsBO7C6aUm41BEmretVq 4oKw+1PdoxF0RpOW7DVbsPDEhD4PY1TEGeEpvi/UzXbpGYkuDxO/iCxA85u8Z6G5k9eF jP2Q== X-Gm-Message-State: AOAM531WaxDjWPkEyt3bzmYMvM98I4SmPrAMY9Dk/NiTjgD0Oa8TO2FK dMaNJ3It4SWK/mTZQycATtgnKn7n6/Csd29ZZBE5UqsneQYCD3pz X-Google-Smtp-Source: ABdhPJyGQSaFTtYGWHITfvE1kCZlyKWPfELVXiRIqkZA2t0nMKLXHeJr+fx9TgMNr4t8Y6qR8lGtBabJgv4ZZBSf23Q= X-Received: by 2002:a5e:870d:: with SMTP id y13mr21424656ioj.60.1614122305691; Tue, 23 Feb 2021 15:18:25 -0800 (PST) MIME-Version: 1.0 References: In-Reply-To: From: Greg Hogan Date: Tue, 23 Feb 2021 18:18:14 -0500 Message-ID: Content-Type: multipart/mixed; boundary="000000000000a7d81d05bc092250" X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list X-BeenThere: guix-patches@gnu.org List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: guix-patches-bounces+larch=yhetil.org@gnu.org Sender: "Guix-patches" X-Migadu-Flow: FLOW_IN X-Migadu-Spam-Score: -1.27 Authentication-Results: aspmx1.migadu.com; dkim=fail ("body hash did not verify") header.d=greghogan-com.20150623.gappssmtp.com header.s=20150623 header.b=f1BQdWjB; dmarc=none; spf=pass (aspmx1.migadu.com: domain of guix-patches-bounces@gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=guix-patches-bounces@gnu.org X-Migadu-Queue-Id: 7744926384 X-Spam-Score: -1.27 X-Migadu-Scanner: scn1.migadu.com X-TUID: 9SlklMkepirb --000000000000a7d81d05bc092250 Content-Type: multipart/alternative; boundary="000000000000a7d81b05bc09224e" --000000000000a7d81b05bc09224e Content-Type: text/plain; charset="UTF-8" >From 822ab358fdf54c3795894d062913abd533d546d9 Mon Sep 17 00:00:00 2001 From: Greg Hogan Date: Tue, 19 Jan 2021 12:53:18 +0000 Subject: [PATCH 5/7] gnu: Add aws-c-io. * gnu/packages/c.scm (aws-c-io): New variable. * gnu/packages/patches/aws-c-io-cmake-prefix.patch, gnu/packages/patches/aws-c-io-disable-networking-tests.patch: New files. * gnu/local.mk (dist_patch_DATA): Add them. --- gnu/local.mk | 2 + gnu/packages/c.scm | 28 +++++++ .../patches/aws-c-io-cmake-prefix.patch | 13 +++ .../aws-c-io-disable-networking-tests.patch | 81 +++++++++++++++++++ 4 files changed, 124 insertions(+) create mode 100644 gnu/packages/patches/aws-c-io-cmake-prefix.patch create mode 100644 gnu/packages/patches/aws-c-io-disable-networking-tests.patch diff --git a/gnu/local.mk b/gnu/local.mk index f16c1ae240..7f176b96f8 100644 --- a/gnu/local.mk +++ b/gnu/local.mk @@ -832,6 +832,8 @@ dist_patch_DATA = \ %D%/packages/patches/awesome-reproducible-png.patch \ %D%/packages/patches/aws-c-cal-cmake-prefix.patch \ %D%/packages/patches/aws-c-event-stream-cmake-prefix.patch \ + %D%/packages/patches/aws-c-io-cmake-prefix.patch \ + %D%/packages/patches/aws-c-io-disable-networking-tests.patch \ %D%/packages/patches/aws-checksums-cmake-prefix.patch \ %D%/packages/patches/azr3.patch \ %D%/packages/patches/bash-reproducible-linux-pgrp-pipe.patch \ diff --git a/gnu/packages/c.scm b/gnu/packages/c.scm index 48230b41c3..63b9d5dc27 100644 --- a/gnu/packages/c.scm +++ b/gnu/packages/c.scm @@ -616,6 +616,34 @@ communication.") (home-page "https://github.com/awslabs/aws-c-event-stream") (license license:asl2.0))) +(define-public aws-c-io + (package + (name "aws-c-io") + (version "0.9.0") + (source (origin + (method git-fetch) + (uri (git-reference + (url (string-append "https://github.com/awslabs/" name)) + (commit (string-append "v" version)))) + (file-name (git-file-name name version)) + (sha256 + (base32 + "0i1i88fb8cazrbx3cy5vn1a09zlx6kdk3rr3m7s7165b6drix8bm")) + (patches + (search-patches + "aws-c-io-cmake-prefix.patch" + "aws-c-io-disable-networking-tests.patch")))) + (build-system cmake-build-system) + (propagated-inputs + `(("aws-c-cal" ,aws-c-cal) + ("aws-c-common" ,aws-c-common) + ("s2n" ,s2n))) + (synopsis "Event driven framework for implementing application protocols") + (description "This library provides a C99 framework for constructing +event-driven, asynchronous network application protocols.") + (home-page "https://github.com/awslabs/aws-c-io") + (license license:asl2.0))) + (define-public aws-c-cal (package (name "aws-c-cal") diff --git a/gnu/packages/patches/aws-c-io-cmake-prefix.patch b/gnu/packages/patches/aws-c-io-cmake-prefix.patch new file mode 100644 index 0000000000..da3e4eb4a5 --- /dev/null +++ b/gnu/packages/patches/aws-c-io-cmake-prefix.patch @@ -0,0 +1,13 @@ +--- a/CMakeLists.txt ++++ b/CMakeLists.txt +@@ -6,6 +6,10 @@ if (POLICY CMP0069) + cmake_policy(SET CMP0069 NEW) # Enable LTO/IPO if available in the compiler, see AwsCFlags + endif() + ++if (DEFINED ENV{CMAKE_PREFIX_PATH}) ++ set(CMAKE_PREFIX_PATH $ENV{CMAKE_PREFIX_PATH}) ++endif() ++ + if (DEFINED CMAKE_PREFIX_PATH) + file(TO_CMAKE_PATH "${CMAKE_PREFIX_PATH}" CMAKE_PREFIX_PATH) + endif() diff --git a/gnu/packages/patches/aws-c-io-disable-networking-tests.patch b/gnu/packages/patches/aws-c-io-disable-networking-tests.patch new file mode 100644 index 0000000000..77f5f658fd --- /dev/null +++ b/gnu/packages/patches/aws-c-io-disable-networking-tests.patch @@ -0,0 +1,81 @@ +--- a/tests/CMakeLists.txt ++++ b/tests/CMakeLists.txt +@@ -52,8 +52,8 @@ add_test_case(local_socket_communication) + add_net_test_case(tcp_socket_communication) + add_net_test_case(udp_socket_communication) + add_test_case(udp_bind_connect_communication) +-add_net_test_case(connect_timeout) +-add_net_test_case(connect_timeout_cancelation) ++#add_net_test_case(connect_timeout) ++#add_net_test_case(connect_timeout_cancelation) + if (USE_VSOCK) + add_test_case(vsock_loopback_socket_communication) + endif () +@@ -64,7 +64,7 @@ add_test_case(incoming_tcp_sock_errors) + add_test_case(incoming_duplicate_tcp_bind_errors) + add_test_case(incoming_udp_sock_errors) + add_test_case(wrong_thread_read_write_fails) +-add_net_test_case(cleanup_before_connect_or_timeout_doesnt_explode) ++#add_net_test_case(cleanup_before_connect_or_timeout_doesnt_explode) + add_test_case(cleanup_in_accept_doesnt_explode) + add_test_case(cleanup_in_write_cb_doesnt_explode) + +@@ -80,21 +80,21 @@ add_test_case(channel_tasks_run) + add_test_case(channel_rejects_post_shutdown_tasks) + add_test_case(channel_cancels_pending_tasks) + add_test_case(channel_duplicate_shutdown) +-add_net_test_case(channel_connect_some_hosts_timeout) ++#add_net_test_case(channel_connect_some_hosts_timeout) + +-add_net_test_case(test_default_with_ipv6_lookup) ++#add_net_test_case(test_default_with_ipv6_lookup) + add_test_case(test_resolver_ipv6_address_lookup) +-add_net_test_case(test_default_with_multiple_lookups) ++#add_net_test_case(test_default_with_multiple_lookups) + add_test_case(test_resolver_ipv4_address_lookup) +-add_net_test_case(test_default_with_ipv4_only_lookup) ++#add_net_test_case(test_default_with_ipv4_only_lookup) + add_test_case(test_resolver_ttls) + add_test_case(test_resolver_connect_failure_recording) + add_test_case(test_resolver_ttl_refreshes_on_resolve) + + add_net_test_case(test_resolver_listener_create_destroy) +-add_net_test_case(test_resolver_add_listener_before_host) +-add_net_test_case(test_resolver_add_listener_after_host) +-add_net_test_case(test_resolver_add_multiple_listeners_fn) ++#add_net_test_case(test_resolver_add_listener_before_host) ++#add_net_test_case(test_resolver_add_listener_after_host) ++#add_net_test_case(test_resolver_add_multiple_listeners_fn) + add_net_test_case(test_resolver_listener_host_re_add_fn) + add_net_test_case(test_resolver_listener_multiple_results) + add_net_test_case(test_resolver_listener_address_expired_fn) +@@ -116,20 +116,20 @@ add_test_case(socket_handler_echo_and_backpressure) + add_test_case(socket_handler_close) + + add_test_case(tls_channel_echo_and_backpressure_test) +-add_net_test_case(tls_client_channel_negotiation_error_expired) +-add_net_test_case(tls_client_channel_negotiation_error_wrong_host) +-add_net_test_case(tls_client_channel_negotiation_error_self_signed) +-add_net_test_case(tls_client_channel_negotiation_error_untrusted_root) ++#add_net_test_case(tls_client_channel_negotiation_error_expired) ++#add_net_test_case(tls_client_channel_negotiation_error_wrong_host) ++#add_net_test_case(tls_client_channel_negotiation_error_self_signed) ++#add_net_test_case(tls_client_channel_negotiation_error_untrusted_root) + #track these down in s2n and find out why that aren't failing. + #add_net_test_case(tls_client_channel_negotiation_error_revoked) + #add_net_test_case(tls_client_channel_negotiation_error_pinning) +-add_net_test_case(tls_client_channel_negotiation_error_socket_closed) +-add_net_test_case(tls_client_channel_negotiation_success) +-add_net_test_case(tls_client_channel_negotiation_success_ecc256) +-add_net_test_case(tls_client_channel_negotiation_success_ecc384) ++#add_net_test_case(tls_client_channel_negotiation_error_socket_closed) ++#add_net_test_case(tls_client_channel_negotiation_success) ++#add_net_test_case(tls_client_channel_negotiation_success_ecc256) ++#add_net_test_case(tls_client_channel_negotiation_success_ecc384) + add_net_test_case(tls_server_multiple_connections) + add_net_test_case(tls_server_hangup_during_negotiation) +-add_net_test_case(tls_client_channel_no_verify) ++#add_net_test_case(tls_client_channel_no_verify) + add_net_test_case(test_tls_negotiation_timeout) + add_test_case(tls_destroy_null_context) + -- 2.30.1 --000000000000a7d81b05bc09224e Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable
From 822ab358fdf54c3795894d062913abd= 533d546d9 Mon Sep 17 00:00:00 2001
From: Greg Hogan <code@greghogan.com>
Date: T= ue, 19 Jan 2021 12:53:18 +0000
Subject: [PATCH 5/7] gnu: Add aws-= c-io.

* gnu/packages/c.scm (aws-c-io): New variabl= e.
* gnu/packages/patches/aws-c-io-cmake-prefix.patch,
= gnu/packages/patches/aws-c-io-disable-networking-tests.patch:
New= files.
* gnu/local.mk (dist_patc= h_DATA): Add them.
---
=C2=A0gnu/local.mk =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 = =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0| =C2=A02 +
=C2=A0gnu/packages/c.scm =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0= =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0| 28 +++++++
<= div>=C2=A0.../patches/aws-c-io-cmake-prefix.patch =C2=A0 =C2=A0 =C2=A0 | 13= +++
=C2=A0.../aws-c-io-disable-networking-tests.patch =C2=A0 | 8= 1 +++++++++++++++++++
=C2=A04 files changed, 124 insertions(+)
=C2=A0create mode 100644 gnu/packages/patches/aws-c-io-cmake-prefix= .patch
=C2=A0create mode 100644 gnu/packages/patches/aws-c-io-dis= able-networking-tests.patch

diff --git a/gnu/local.mk b/gnu/local= .mk
index f16c1ae240..7f176b96f8 100644
--- a/gnu/<= a href=3D"http://local.mk">local.mk
+++ b/gnu/local.mk
@@ -832,6 +832,8 @@ dist_patch_DATA =3D= \
=C2=A0 =C2=A0%D%/packages/patches/awesome-reproducible-png.pat= ch \=
=C2=A0 =C2=A0%D%/packages/patches/aws-c-cal-cmake-prefix.patch \
=C2=A0 =C2=A0%D%/packages/patches/aws-c-event-stream-cmake-prefix.pa= tch =C2=A0\
+ =C2=A0%D%/packages/patches/aws-c-io-cmake-prefix.pa= tch = \
+ =C2=A0%D%/packages/patches/aws-c-io-disable-networking-tests.= patch \
=C2=A0 =C2=A0%D%/packages/patches/aws-checksums-cmake-prefix.= patch \
=C2=A0 =C2=A0%D%/packages/patches/azr3.patch \
=C2=A0= =C2=A0%D%/packages/patches/bash-reproducible-linux-pgrp-pipe.patch \
= diff --git a/gnu/packages/c.scm b/gnu/packages/c.scm
index 48230b= 41c3..63b9d5dc27 100644
--- a/gnu/packages/c.scm
+++ b/= gnu/packages/c.scm
@@ -616,6 +616,34 @@ communication.")
=C2=A0 =C2=A0 =C2=A0(home-page "https://github.com/awslabs/aws-c-event-stream")

+ =C2=A0 =C2=A0(name "aws-c-io")
<= div>+ =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0(uri (git-reference
+ =C2=A0 =C2=A0 =C2=A0 = =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0(commit (string-append &quo= t;v" version))))
+ =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0= =C2=A0(file-name (git-file-name name version))
+ =C2=A0 =C2=A0 = =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0(sha256
+ =C2=A0 =C2=A0 =C2=A0 = =C2=A0 =C2=A0 =C2=A0 =C2=A0 (base32
+ =C2=A0 =C2=A0 =C2=A0 =C2=A0= =C2=A0 =C2=A0 =C2=A0 =C2=A0"0i1i88fb8cazrbx3cy5vn1a09zlx6kdk3rr3m7s71= 65b6drix8bm"))
+ =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 = =C2=A0(patches
+ =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0= (search-patches
+ =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2= =A0 =C2=A0"aws-c-io-cmake-prefix.patch"
+ =C2=A0 =C2=A0= =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0"aws-c-io-disable-networking= -tests.patch"))))
+ =C2=A0 =C2=A0(build-system cmake-build-s= ystem)
+ =C2=A0 =C2=A0(propagated-inputs
+ =C2=A0 =C2= =A0 `(("aws-c-cal" ,aws-c-cal)
+ =C2=A0 =C2=A0 =C2=A0 (= "aws-c-common" ,aws-c-common)
+ =C2=A0 =C2=A0 =C2=A0 (&= quot;s2n" ,s2n)))
+ =C2=A0 =C2=A0(synopsis "Event drive= n framework for implementing application protocols")
+ =C2= =A0 =C2=A0(description "This library provides a C99 framework for cons= tructing
+event-driven, asynchronous network application protocol= s.")
+ =C2=A0 =C2=A0(home-page "https://github.com/awslabs/aws-c-io")
+ =C2=A0 =C2=A0(license license:asl2.0)))
+
=C2= =A0(define-public aws-c-cal
=C2=A0 =C2=A0(package
=C2= =A0 =C2=A0 =C2=A0(name "aws-c-cal")
diff --git a/gnu/pa= ckages/patches/aws-c-io-cmake-prefix.patch b/gnu/packages/patches/aws-c-io-= cmake-prefix.patch
new file mode 100644
index 000000000= 0..da3e4eb4a5
--- /dev/null
+++ b/gnu/packages/patches/= aws-c-io-cmake-prefix.patch
@@ -0,0 +1,13 @@
+--- a/CMa= keLists.txt
++++ b/CMakeLists.txt
+@@ -6,6 +6,10 @@ if = (POLICY CMP0069)
+ =C2=A0 =C2=A0 cmake_policy(SET CMP0069 NEW) # = Enable LTO/IPO if available in the compiler, see AwsCFlags
+ endi= f()
+
++if (DEFINED ENV{CMAKE_PREFIX_PATH})
+= + =C2=A0 =C2=A0set(CMAKE_PREFIX_PATH $ENV{CMAKE_PREFIX_PATH})
++e= ndif()
++
+ if (DEFINED CMAKE_PREFIX_PATH)
+ = =C2=A0 =C2=A0 file(TO_CMAKE_PATH "${CMAKE_PREFIX_PATH}" CMAKE_PRE= FIX_PATH)
+ endif()
diff --git a/gnu/packages/patches/a= ws-c-io-disable-networking-tests.patch b/gnu/packages/patches/aws-c-io-disa= ble-networking-tests.patch
new file mode 100644
index 0= 000000000..77f5f658fd
--- /dev/null
+++ b/gnu/packages/= patches/aws-c-io-disable-networking-tests.patch
@@ -0,0 +1,81 @@<= /div>
+--- a/tests/CMakeLists.txt
++++ b/tests/CMakeLists.txt=
+@@ -52,8 +52,8 @@ add_test_case(local_socket_communication)
+ add_net_test_case(tcp_socket_communication)
+ add_net_te= st_case(udp_socket_communication)
+ add_test_case(udp_bind_connec= t_communication)
+-add_net_test_case(connect_timeout)
+= -add_net_test_case(connect_timeout_cancelation)
++#add_net_test_c= ase(connect_timeout)
++#add_net_test_case(connect_timeout_cancela= tion)
+ if (USE_VSOCK)
+ add_test_case(vsock_loopback_socke= t_communication)
+ endif ()
+@@ -64,7 +64,7 @@ add_test= _case(incoming_tcp_sock_errors)
+ add_test_case(incoming_duplicat= e_tcp_bind_errors)
+ add_test_case(incoming_udp_sock_errors)
+ add_test_case(wrong_thread_read_write_fails)
+-add_net_te= st_case(cleanup_before_connect_or_timeout_doesnt_explode)
++#add_= net_test_case(cleanup_before_connect_or_timeout_doesnt_explode)
+= add_test_case(cleanup_in_accept_doesnt_explode)
+ add_test_case(= cleanup_in_write_cb_doesnt_explode)
+
+@@ -80,21 +80,21= @@ add_test_case(channel_tasks_run)
+ add_test_case(channel_reje= cts_post_shutdown_tasks)
+ add_test_case(channel_cancels_pending_= tasks)
+ add_test_case(channel_duplicate_shutdown)
+-ad= d_net_test_case(channel_connect_some_hosts_timeout)
++#add_net_te= st_case(channel_connect_some_hosts_timeout)
+
+-add_net= _test_case(test_default_with_ipv6_lookup)
++#add_net_test_case(te= st_default_with_ipv6_lookup)
+ add_test_case(test_resolver_ipv6_a= ddress_lookup)
+-add_net_test_case(test_default_with_multiple_loo= kups)
++#add_net_test_case(test_default_with_multiple_lookups)
+ add_test_case(test_resolver_ipv4_address_lookup)
+-add_= net_test_case(test_default_with_ipv4_only_lookup)
++#add_net_test= _case(test_default_with_ipv4_only_lookup)
+ add_test_case(test_re= solver_ttls)
+ add_test_case(test_resolver_connect_failure_record= ing)
+ add_test_case(test_resolver_ttl_refreshes_on_resolve)
+
+ add_net_test_case(test_resolver_listener_create_destroy= )
+-add_net_test_case(test_resolver_add_listener_before_host)
+-add_net_test_case(test_resolver_add_listener_after_host)
+-add_net_test_case(test_resolver_add_multiple_listeners_fn)
++#= add_net_test_case(test_resolver_add_listener_before_host)
++#add_= net_test_case(test_resolver_add_listener_after_host)
++#add_net_t= est_case(test_resolver_add_multiple_listeners_fn)
+ add_net_test_= case(test_resolver_listener_host_re_add_fn)
+ add_net_test_case(t= est_resolver_listener_multiple_results)
+ add_net_test_case(test_= resolver_listener_address_expired_fn)
+@@ -116,20 +116,20 @@ add_= test_case(socket_handler_echo_and_backpressure)
+ add_test_case(s= ocket_handler_close)
+
+ add_test_case(tls_channel_echo= _and_backpressure_test)
+-add_net_test_case(tls_client_channel_ne= gotiation_error_expired)
+-add_net_test_case(tls_client_channel_n= egotiation_error_wrong_host)
+-add_net_test_case(tls_client_chann= el_negotiation_error_self_signed)
+-add_net_test_case(tls_client_= channel_negotiation_error_untrusted_root)
++#add_net_test_case(tl= s_client_channel_negotiation_error_expired)
++#add_net_test_case(= tls_client_channel_negotiation_error_wrong_host)
++#add_net_test_= case(tls_client_channel_negotiation_error_self_signed)
++#add_net= _test_case(tls_client_channel_negotiation_error_untrusted_root)
+= #track these down in s2n and find out why that aren't failing.
+ #add_net_test_case(tls_client_channel_negotiation_error_revoked)
=
+ #add_net_test_case(tls_client_channel_negotiation_error_pinning)
+-add_net_test_case(tls_client_channel_negotiation_error_socket_clos= ed)
+-add_net_test_case(tls_client_channel_negotiation_success)
+-add_net_test_case(tls_client_channel_negotiation_success_ecc256)=
+-add_net_test_case(tls_client_channel_negotiation_success_ecc38= 4)
++#add_net_test_case(tls_client_channel_negotiation_error_sock= et_closed)
++#add_net_test_case(tls_client_channel_negotiation_su= ccess)
++#add_net_test_case(tls_client_channel_negotiation_succes= s_ecc256)
++#add_net_test_case(tls_client_channel_negotiation_suc= cess_ecc384)
+ add_net_test_case(tls_server_multiple_connections)=
+ add_net_test_case(tls_server_hangup_during_negotiation)
<= div>+-add_net_test_case(tls_client_channel_no_verify)
++#add_net_= test_case(tls_client_channel_no_verify)
+ add_net_test_case(test_= tls_negotiation_timeout)
+ add_test_case(tls_destroy_null_context= )
+
--
2.30.1
--000000000000a7d81b05bc09224e-- --000000000000a7d81d05bc092250 Content-Type: application/x-patch; name="0005-gnu-Add-aws-c-io.patch" Content-Disposition: attachment; filename="0005-gnu-Add-aws-c-io.patch" Content-Transfer-Encoding: base64 Content-ID: X-Attachment-Id: f_klimpaqh0 RnJvbSA4MjJhYjM1OGZkZjU0YzM3OTU4OTRkMDYyOTEzYWJkNTMzZDU0NmQ5IE1vbiBTZXAgMTcg MDA6MDA6MDAgMjAwMQpGcm9tOiBHcmVnIEhvZ2FuIDxjb2RlQGdyZWdob2dhbi5jb20+CkRhdGU6 IFR1ZSwgMTkgSmFuIDIwMjEgMTI6NTM6MTggKzAwMDAKU3ViamVjdDogW1BBVENIIDUvN10gZ251 OiBBZGQgYXdzLWMtaW8uCgoqIGdudS9wYWNrYWdlcy9jLnNjbSAoYXdzLWMtaW8pOiBOZXcgdmFy aWFibGUuCiogZ251L3BhY2thZ2VzL3BhdGNoZXMvYXdzLWMtaW8tY21ha2UtcHJlZml4LnBhdGNo LApnbnUvcGFja2FnZXMvcGF0Y2hlcy9hd3MtYy1pby1kaXNhYmxlLW5ldHdvcmtpbmctdGVzdHMu cGF0Y2g6Ck5ldyBmaWxlcy4KKiBnbnUvbG9jYWwubWsgKGRpc3RfcGF0Y2hfREFUQSk6IEFkZCB0 aGVtLgotLS0KIGdudS9sb2NhbC5tayAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICB8 ICAyICsKIGdudS9wYWNrYWdlcy9jLnNjbSAgICAgICAgICAgICAgICAgICAgICAgICAgICB8IDI4 ICsrKysrKysKIC4uLi9wYXRjaGVzL2F3cy1jLWlvLWNtYWtlLXByZWZpeC5wYXRjaCAgICAgICB8 IDEzICsrKwogLi4uL2F3cy1jLWlvLWRpc2FibGUtbmV0d29ya2luZy10ZXN0cy5wYXRjaCAgIHwg ODEgKysrKysrKysrKysrKysrKysrKwogNCBmaWxlcyBjaGFuZ2VkLCAxMjQgaW5zZXJ0aW9ucygr KQogY3JlYXRlIG1vZGUgMTAwNjQ0IGdudS9wYWNrYWdlcy9wYXRjaGVzL2F3cy1jLWlvLWNtYWtl LXByZWZpeC5wYXRjaAogY3JlYXRlIG1vZGUgMTAwNjQ0IGdudS9wYWNrYWdlcy9wYXRjaGVzL2F3 cy1jLWlvLWRpc2FibGUtbmV0d29ya2luZy10ZXN0cy5wYXRjaAoKZGlmZiAtLWdpdCBhL2dudS9s b2NhbC5tayBiL2dudS9sb2NhbC5tawppbmRleCBmMTZjMWFlMjQwLi43ZjE3NmI5NmY4IDEwMDY0 NAotLS0gYS9nbnUvbG9jYWwubWsKKysrIGIvZ251L2xvY2FsLm1rCkBAIC04MzIsNiArODMyLDgg QEAgZGlzdF9wYXRjaF9EQVRBID0JCQkJCQlcCiAgICVEJS9wYWNrYWdlcy9wYXRjaGVzL2F3ZXNv bWUtcmVwcm9kdWNpYmxlLXBuZy5wYXRjaAkJXAogICAlRCUvcGFja2FnZXMvcGF0Y2hlcy9hd3Mt Yy1jYWwtY21ha2UtcHJlZml4LnBhdGNoCQlcCiAgICVEJS9wYWNrYWdlcy9wYXRjaGVzL2F3cy1j LWV2ZW50LXN0cmVhbS1jbWFrZS1wcmVmaXgucGF0Y2ggIFwKKyAgJUQlL3BhY2thZ2VzL3BhdGNo ZXMvYXdzLWMtaW8tY21ha2UtcHJlZml4LnBhdGNoCQlcCisgICVEJS9wYWNrYWdlcy9wYXRjaGVz L2F3cy1jLWlvLWRpc2FibGUtbmV0d29ya2luZy10ZXN0cy5wYXRjaAkJXAogICAlRCUvcGFja2Fn ZXMvcGF0Y2hlcy9hd3MtY2hlY2tzdW1zLWNtYWtlLXByZWZpeC5wYXRjaAkJXAogICAlRCUvcGFj a2FnZXMvcGF0Y2hlcy9henIzLnBhdGNoCQkJCVwKICAgJUQlL3BhY2thZ2VzL3BhdGNoZXMvYmFz aC1yZXByb2R1Y2libGUtbGludXgtcGdycC1waXBlLnBhdGNoCVwKZGlmZiAtLWdpdCBhL2dudS9w YWNrYWdlcy9jLnNjbSBiL2dudS9wYWNrYWdlcy9jLnNjbQppbmRleCA0ODIzMGI0MWMzLi42M2I5 ZDVkYzI3IDEwMDY0NAotLS0gYS9nbnUvcGFja2FnZXMvYy5zY20KKysrIGIvZ251L3BhY2thZ2Vz L2Muc2NtCkBAIC02MTYsNiArNjE2LDM0IEBAIGNvbW11bmljYXRpb24uIikKICAgICAoaG9tZS1w YWdlICJodHRwczovL2dpdGh1Yi5jb20vYXdzbGFicy9hd3MtYy1ldmVudC1zdHJlYW0iKQogICAg IChsaWNlbnNlIGxpY2Vuc2U6YXNsMi4wKSkpCiAKKyhkZWZpbmUtcHVibGljIGF3cy1jLWlvCisg IChwYWNrYWdlCisgICAgKG5hbWUgImF3cy1jLWlvIikKKyAgICAodmVyc2lvbiAiMC45LjAiKQor ICAgIChzb3VyY2UgKG9yaWdpbgorICAgICAgICAgICAgICAobWV0aG9kIGdpdC1mZXRjaCkKKyAg ICAgICAgICAgICAgKHVyaSAoZ2l0LXJlZmVyZW5jZQorICAgICAgICAgICAgICAgICAgICAodXJs IChzdHJpbmctYXBwZW5kICJodHRwczovL2dpdGh1Yi5jb20vYXdzbGFicy8iIG5hbWUpKQorICAg ICAgICAgICAgICAgICAgICAoY29tbWl0IChzdHJpbmctYXBwZW5kICJ2IiB2ZXJzaW9uKSkpKQor ICAgICAgICAgICAgICAoZmlsZS1uYW1lIChnaXQtZmlsZS1uYW1lIG5hbWUgdmVyc2lvbikpCisg ICAgICAgICAgICAgIChzaGEyNTYKKyAgICAgICAgICAgICAgIChiYXNlMzIKKyAgICAgICAgICAg ICAgICAiMGkxaTg4ZmI4Y2F6cmJ4M2N5NXZuMWEwOXpseDZrZGszcnIzbTdzNzE2NWI2ZHJpeDhi bSIpKQorICAgICAgICAgICAgICAocGF0Y2hlcworICAgICAgICAgICAgICAgKHNlYXJjaC1wYXRj aGVzCisgICAgICAgICAgICAgICAgImF3cy1jLWlvLWNtYWtlLXByZWZpeC5wYXRjaCIKKyAgICAg ICAgICAgICAgICAiYXdzLWMtaW8tZGlzYWJsZS1uZXR3b3JraW5nLXRlc3RzLnBhdGNoIikpKSkK KyAgICAoYnVpbGQtc3lzdGVtIGNtYWtlLWJ1aWxkLXN5c3RlbSkKKyAgICAocHJvcGFnYXRlZC1p bnB1dHMKKyAgICAgYCgoImF3cy1jLWNhbCIgLGF3cy1jLWNhbCkKKyAgICAgICAoImF3cy1jLWNv bW1vbiIgLGF3cy1jLWNvbW1vbikKKyAgICAgICAoInMybiIgLHMybikpKQorICAgIChzeW5vcHNp cyAiRXZlbnQgZHJpdmVuIGZyYW1ld29yayBmb3IgaW1wbGVtZW50aW5nIGFwcGxpY2F0aW9uIHBy b3RvY29scyIpCisgICAgKGRlc2NyaXB0aW9uICJUaGlzIGxpYnJhcnkgcHJvdmlkZXMgYSBDOTkg ZnJhbWV3b3JrIGZvciBjb25zdHJ1Y3RpbmcKK2V2ZW50LWRyaXZlbiwgYXN5bmNocm9ub3VzIG5l dHdvcmsgYXBwbGljYXRpb24gcHJvdG9jb2xzLiIpCisgICAgKGhvbWUtcGFnZSAiaHR0cHM6Ly9n aXRodWIuY29tL2F3c2xhYnMvYXdzLWMtaW8iKQorICAgIChsaWNlbnNlIGxpY2Vuc2U6YXNsMi4w KSkpCisKIChkZWZpbmUtcHVibGljIGF3cy1jLWNhbAogICAocGFja2FnZQogICAgIChuYW1lICJh d3MtYy1jYWwiKQpkaWZmIC0tZ2l0IGEvZ251L3BhY2thZ2VzL3BhdGNoZXMvYXdzLWMtaW8tY21h a2UtcHJlZml4LnBhdGNoIGIvZ251L3BhY2thZ2VzL3BhdGNoZXMvYXdzLWMtaW8tY21ha2UtcHJl Zml4LnBhdGNoCm5ldyBmaWxlIG1vZGUgMTAwNjQ0CmluZGV4IDAwMDAwMDAwMDAuLmRhM2U0ZWI0 YTUKLS0tIC9kZXYvbnVsbAorKysgYi9nbnUvcGFja2FnZXMvcGF0Y2hlcy9hd3MtYy1pby1jbWFr ZS1wcmVmaXgucGF0Y2gKQEAgLTAsMCArMSwxMyBAQAorLS0tIGEvQ01ha2VMaXN0cy50eHQKKysr KyBiL0NNYWtlTGlzdHMudHh0CitAQCAtNiw2ICs2LDEwIEBAIGlmIChQT0xJQ1kgQ01QMDA2OSkK KyAgICAgY21ha2VfcG9saWN5KFNFVCBDTVAwMDY5IE5FVykgIyBFbmFibGUgTFRPL0lQTyBpZiBh dmFpbGFibGUgaW4gdGhlIGNvbXBpbGVyLCBzZWUgQXdzQ0ZsYWdzCisgZW5kaWYoKQorIAorK2lm IChERUZJTkVEIEVOVntDTUFLRV9QUkVGSVhfUEFUSH0pCisrICAgIHNldChDTUFLRV9QUkVGSVhf UEFUSCAkRU5We0NNQUtFX1BSRUZJWF9QQVRIfSkKKytlbmRpZigpCisrCisgaWYgKERFRklORUQg Q01BS0VfUFJFRklYX1BBVEgpCisgICAgIGZpbGUoVE9fQ01BS0VfUEFUSCAiJHtDTUFLRV9QUkVG SVhfUEFUSH0iIENNQUtFX1BSRUZJWF9QQVRIKQorIGVuZGlmKCkKZGlmZiAtLWdpdCBhL2dudS9w YWNrYWdlcy9wYXRjaGVzL2F3cy1jLWlvLWRpc2FibGUtbmV0d29ya2luZy10ZXN0cy5wYXRjaCBi L2dudS9wYWNrYWdlcy9wYXRjaGVzL2F3cy1jLWlvLWRpc2FibGUtbmV0d29ya2luZy10ZXN0cy5w YXRjaApuZXcgZmlsZSBtb2RlIDEwMDY0NAppbmRleCAwMDAwMDAwMDAwLi43N2Y1ZjY1OGZkCi0t LSAvZGV2L251bGwKKysrIGIvZ251L3BhY2thZ2VzL3BhdGNoZXMvYXdzLWMtaW8tZGlzYWJsZS1u ZXR3b3JraW5nLXRlc3RzLnBhdGNoCkBAIC0wLDAgKzEsODEgQEAKKy0tLSBhL3Rlc3RzL0NNYWtl TGlzdHMudHh0CisrKysgYi90ZXN0cy9DTWFrZUxpc3RzLnR4dAorQEAgLTUyLDggKzUyLDggQEAg YWRkX3Rlc3RfY2FzZShsb2NhbF9zb2NrZXRfY29tbXVuaWNhdGlvbikKKyBhZGRfbmV0X3Rlc3Rf Y2FzZSh0Y3Bfc29ja2V0X2NvbW11bmljYXRpb24pCisgYWRkX25ldF90ZXN0X2Nhc2UodWRwX3Nv Y2tldF9jb21tdW5pY2F0aW9uKQorIGFkZF90ZXN0X2Nhc2UodWRwX2JpbmRfY29ubmVjdF9jb21t dW5pY2F0aW9uKQorLWFkZF9uZXRfdGVzdF9jYXNlKGNvbm5lY3RfdGltZW91dCkKKy1hZGRfbmV0 X3Rlc3RfY2FzZShjb25uZWN0X3RpbWVvdXRfY2FuY2VsYXRpb24pCisrI2FkZF9uZXRfdGVzdF9j YXNlKGNvbm5lY3RfdGltZW91dCkKKysjYWRkX25ldF90ZXN0X2Nhc2UoY29ubmVjdF90aW1lb3V0 X2NhbmNlbGF0aW9uKQorIGlmIChVU0VfVlNPQ0spCisgCWFkZF90ZXN0X2Nhc2UodnNvY2tfbG9v cGJhY2tfc29ja2V0X2NvbW11bmljYXRpb24pCisgZW5kaWYgKCkKK0BAIC02NCw3ICs2NCw3IEBA IGFkZF90ZXN0X2Nhc2UoaW5jb21pbmdfdGNwX3NvY2tfZXJyb3JzKQorIGFkZF90ZXN0X2Nhc2Uo aW5jb21pbmdfZHVwbGljYXRlX3RjcF9iaW5kX2Vycm9ycykKKyBhZGRfdGVzdF9jYXNlKGluY29t aW5nX3VkcF9zb2NrX2Vycm9ycykKKyBhZGRfdGVzdF9jYXNlKHdyb25nX3RocmVhZF9yZWFkX3dy aXRlX2ZhaWxzKQorLWFkZF9uZXRfdGVzdF9jYXNlKGNsZWFudXBfYmVmb3JlX2Nvbm5lY3Rfb3Jf dGltZW91dF9kb2VzbnRfZXhwbG9kZSkKKysjYWRkX25ldF90ZXN0X2Nhc2UoY2xlYW51cF9iZWZv cmVfY29ubmVjdF9vcl90aW1lb3V0X2RvZXNudF9leHBsb2RlKQorIGFkZF90ZXN0X2Nhc2UoY2xl YW51cF9pbl9hY2NlcHRfZG9lc250X2V4cGxvZGUpCisgYWRkX3Rlc3RfY2FzZShjbGVhbnVwX2lu X3dyaXRlX2NiX2RvZXNudF9leHBsb2RlKQorIAorQEAgLTgwLDIxICs4MCwyMSBAQCBhZGRfdGVz dF9jYXNlKGNoYW5uZWxfdGFza3NfcnVuKQorIGFkZF90ZXN0X2Nhc2UoY2hhbm5lbF9yZWplY3Rz X3Bvc3Rfc2h1dGRvd25fdGFza3MpCisgYWRkX3Rlc3RfY2FzZShjaGFubmVsX2NhbmNlbHNfcGVu ZGluZ190YXNrcykKKyBhZGRfdGVzdF9jYXNlKGNoYW5uZWxfZHVwbGljYXRlX3NodXRkb3duKQor LWFkZF9uZXRfdGVzdF9jYXNlKGNoYW5uZWxfY29ubmVjdF9zb21lX2hvc3RzX3RpbWVvdXQpCisr I2FkZF9uZXRfdGVzdF9jYXNlKGNoYW5uZWxfY29ubmVjdF9zb21lX2hvc3RzX3RpbWVvdXQpCisg CistYWRkX25ldF90ZXN0X2Nhc2UodGVzdF9kZWZhdWx0X3dpdGhfaXB2Nl9sb29rdXApCisrI2Fk ZF9uZXRfdGVzdF9jYXNlKHRlc3RfZGVmYXVsdF93aXRoX2lwdjZfbG9va3VwKQorIGFkZF90ZXN0 X2Nhc2UodGVzdF9yZXNvbHZlcl9pcHY2X2FkZHJlc3NfbG9va3VwKQorLWFkZF9uZXRfdGVzdF9j YXNlKHRlc3RfZGVmYXVsdF93aXRoX211bHRpcGxlX2xvb2t1cHMpCisrI2FkZF9uZXRfdGVzdF9j YXNlKHRlc3RfZGVmYXVsdF93aXRoX211bHRpcGxlX2xvb2t1cHMpCisgYWRkX3Rlc3RfY2FzZSh0 ZXN0X3Jlc29sdmVyX2lwdjRfYWRkcmVzc19sb29rdXApCistYWRkX25ldF90ZXN0X2Nhc2UodGVz dF9kZWZhdWx0X3dpdGhfaXB2NF9vbmx5X2xvb2t1cCkKKysjYWRkX25ldF90ZXN0X2Nhc2UodGVz dF9kZWZhdWx0X3dpdGhfaXB2NF9vbmx5X2xvb2t1cCkKKyBhZGRfdGVzdF9jYXNlKHRlc3RfcmVz b2x2ZXJfdHRscykKKyBhZGRfdGVzdF9jYXNlKHRlc3RfcmVzb2x2ZXJfY29ubmVjdF9mYWlsdXJl X3JlY29yZGluZykKKyBhZGRfdGVzdF9jYXNlKHRlc3RfcmVzb2x2ZXJfdHRsX3JlZnJlc2hlc19v bl9yZXNvbHZlKQorIAorIGFkZF9uZXRfdGVzdF9jYXNlKHRlc3RfcmVzb2x2ZXJfbGlzdGVuZXJf Y3JlYXRlX2Rlc3Ryb3kpCistYWRkX25ldF90ZXN0X2Nhc2UodGVzdF9yZXNvbHZlcl9hZGRfbGlz dGVuZXJfYmVmb3JlX2hvc3QpCistYWRkX25ldF90ZXN0X2Nhc2UodGVzdF9yZXNvbHZlcl9hZGRf bGlzdGVuZXJfYWZ0ZXJfaG9zdCkKKy1hZGRfbmV0X3Rlc3RfY2FzZSh0ZXN0X3Jlc29sdmVyX2Fk ZF9tdWx0aXBsZV9saXN0ZW5lcnNfZm4pCisrI2FkZF9uZXRfdGVzdF9jYXNlKHRlc3RfcmVzb2x2 ZXJfYWRkX2xpc3RlbmVyX2JlZm9yZV9ob3N0KQorKyNhZGRfbmV0X3Rlc3RfY2FzZSh0ZXN0X3Jl c29sdmVyX2FkZF9saXN0ZW5lcl9hZnRlcl9ob3N0KQorKyNhZGRfbmV0X3Rlc3RfY2FzZSh0ZXN0 X3Jlc29sdmVyX2FkZF9tdWx0aXBsZV9saXN0ZW5lcnNfZm4pCisgYWRkX25ldF90ZXN0X2Nhc2Uo dGVzdF9yZXNvbHZlcl9saXN0ZW5lcl9ob3N0X3JlX2FkZF9mbikKKyBhZGRfbmV0X3Rlc3RfY2Fz ZSh0ZXN0X3Jlc29sdmVyX2xpc3RlbmVyX211bHRpcGxlX3Jlc3VsdHMpCisgYWRkX25ldF90ZXN0 X2Nhc2UodGVzdF9yZXNvbHZlcl9saXN0ZW5lcl9hZGRyZXNzX2V4cGlyZWRfZm4pCitAQCAtMTE2 LDIwICsxMTYsMjAgQEAgYWRkX3Rlc3RfY2FzZShzb2NrZXRfaGFuZGxlcl9lY2hvX2FuZF9iYWNr cHJlc3N1cmUpCisgYWRkX3Rlc3RfY2FzZShzb2NrZXRfaGFuZGxlcl9jbG9zZSkKKyAKKyBhZGRf dGVzdF9jYXNlKHRsc19jaGFubmVsX2VjaG9fYW5kX2JhY2twcmVzc3VyZV90ZXN0KQorLWFkZF9u ZXRfdGVzdF9jYXNlKHRsc19jbGllbnRfY2hhbm5lbF9uZWdvdGlhdGlvbl9lcnJvcl9leHBpcmVk KQorLWFkZF9uZXRfdGVzdF9jYXNlKHRsc19jbGllbnRfY2hhbm5lbF9uZWdvdGlhdGlvbl9lcnJv cl93cm9uZ19ob3N0KQorLWFkZF9uZXRfdGVzdF9jYXNlKHRsc19jbGllbnRfY2hhbm5lbF9uZWdv dGlhdGlvbl9lcnJvcl9zZWxmX3NpZ25lZCkKKy1hZGRfbmV0X3Rlc3RfY2FzZSh0bHNfY2xpZW50 X2NoYW5uZWxfbmVnb3RpYXRpb25fZXJyb3JfdW50cnVzdGVkX3Jvb3QpCisrI2FkZF9uZXRfdGVz dF9jYXNlKHRsc19jbGllbnRfY2hhbm5lbF9uZWdvdGlhdGlvbl9lcnJvcl9leHBpcmVkKQorKyNh ZGRfbmV0X3Rlc3RfY2FzZSh0bHNfY2xpZW50X2NoYW5uZWxfbmVnb3RpYXRpb25fZXJyb3Jfd3Jv bmdfaG9zdCkKKysjYWRkX25ldF90ZXN0X2Nhc2UodGxzX2NsaWVudF9jaGFubmVsX25lZ290aWF0 aW9uX2Vycm9yX3NlbGZfc2lnbmVkKQorKyNhZGRfbmV0X3Rlc3RfY2FzZSh0bHNfY2xpZW50X2No YW5uZWxfbmVnb3RpYXRpb25fZXJyb3JfdW50cnVzdGVkX3Jvb3QpCisgI3RyYWNrIHRoZXNlIGRv d24gaW4gczJuIGFuZCBmaW5kIG91dCB3aHkgdGhhdCBhcmVuJ3QgZmFpbGluZy4KKyAjYWRkX25l dF90ZXN0X2Nhc2UodGxzX2NsaWVudF9jaGFubmVsX25lZ290aWF0aW9uX2Vycm9yX3Jldm9rZWQp CisgI2FkZF9uZXRfdGVzdF9jYXNlKHRsc19jbGllbnRfY2hhbm5lbF9uZWdvdGlhdGlvbl9lcnJv cl9waW5uaW5nKQorLWFkZF9uZXRfdGVzdF9jYXNlKHRsc19jbGllbnRfY2hhbm5lbF9uZWdvdGlh dGlvbl9lcnJvcl9zb2NrZXRfY2xvc2VkKQorLWFkZF9uZXRfdGVzdF9jYXNlKHRsc19jbGllbnRf Y2hhbm5lbF9uZWdvdGlhdGlvbl9zdWNjZXNzKQorLWFkZF9uZXRfdGVzdF9jYXNlKHRsc19jbGll bnRfY2hhbm5lbF9uZWdvdGlhdGlvbl9zdWNjZXNzX2VjYzI1NikKKy1hZGRfbmV0X3Rlc3RfY2Fz ZSh0bHNfY2xpZW50X2NoYW5uZWxfbmVnb3RpYXRpb25fc3VjY2Vzc19lY2MzODQpCisrI2FkZF9u ZXRfdGVzdF9jYXNlKHRsc19jbGllbnRfY2hhbm5lbF9uZWdvdGlhdGlvbl9lcnJvcl9zb2NrZXRf Y2xvc2VkKQorKyNhZGRfbmV0X3Rlc3RfY2FzZSh0bHNfY2xpZW50X2NoYW5uZWxfbmVnb3RpYXRp b25fc3VjY2VzcykKKysjYWRkX25ldF90ZXN0X2Nhc2UodGxzX2NsaWVudF9jaGFubmVsX25lZ290 aWF0aW9uX3N1Y2Nlc3NfZWNjMjU2KQorKyNhZGRfbmV0X3Rlc3RfY2FzZSh0bHNfY2xpZW50X2No YW5uZWxfbmVnb3RpYXRpb25fc3VjY2Vzc19lY2MzODQpCisgYWRkX25ldF90ZXN0X2Nhc2UodGxz X3NlcnZlcl9tdWx0aXBsZV9jb25uZWN0aW9ucykKKyBhZGRfbmV0X3Rlc3RfY2FzZSh0bHNfc2Vy dmVyX2hhbmd1cF9kdXJpbmdfbmVnb3RpYXRpb24pCistYWRkX25ldF90ZXN0X2Nhc2UodGxzX2Ns aWVudF9jaGFubmVsX25vX3ZlcmlmeSkKKysjYWRkX25ldF90ZXN0X2Nhc2UodGxzX2NsaWVudF9j aGFubmVsX25vX3ZlcmlmeSkKKyBhZGRfbmV0X3Rlc3RfY2FzZSh0ZXN0X3Rsc19uZWdvdGlhdGlv bl90aW1lb3V0KQorIGFkZF90ZXN0X2Nhc2UodGxzX2Rlc3Ryb3lfbnVsbF9jb250ZXh0KQorIAot LSAKMi4zMC4xCgo= --000000000000a7d81d05bc092250--