-
Notifications
You must be signed in to change notification settings - Fork 1.8k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge branch 'master' into update/elfutils
- Loading branch information
Showing
357 changed files
with
3,865 additions
and
4,207 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -1243,3 +1243,6 @@ authorized_users: | |
- NelDav | ||
- utelle | ||
- har-bw | ||
- abedra | ||
- bennettgoble | ||
- juansblanco |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
132 changes: 132 additions & 0 deletions
132
recipes/aws-c-auth/all/patches/0.6.17-0001-fix-macro-usage.patch
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,132 @@ | ||
diff --git a/source/aws_signing.c b/source/aws_signing.c | ||
index 940d7be..ecc1144 100644 | ||
--- a/source/aws_signing.c | ||
+++ b/source/aws_signing.c | ||
@@ -2500,7 +2500,7 @@ int aws_verify_sigv4a_signing( | ||
aws_credentials_release(signing_state->config.credentials); | ||
signing_state->config.credentials = ecc_credentials; | ||
if (signing_state->config.credentials == NULL) { | ||
- AWS_LOGF_ERROR(AWS_LS_AUTH_SIGNING, "Unable to create ECC from provided credentials") | ||
+ AWS_LOGF_ERROR(AWS_LS_AUTH_SIGNING, "Unable to create ECC from provided credentials"); | ||
goto done; | ||
} | ||
} | ||
diff --git a/source/credentials_provider_process.c b/source/credentials_provider_process.c | ||
index 655df86..29f99d0 100644 | ||
--- a/source/credentials_provider_process.c | ||
+++ b/source/credentials_provider_process.c | ||
@@ -187,7 +187,7 @@ static struct aws_string *s_get_command(struct aws_allocator *allocator, struct | ||
if (!command_buf.len) { | ||
AWS_LOGF_ERROR( | ||
AWS_LS_AUTH_CREDENTIALS_PROVIDER, | ||
- "Failed to resolve credentials_process command during process credentials provider initialization.") | ||
+ "Failed to resolve credentials_process command during process credentials provider initialization."); | ||
goto on_finish; | ||
} | ||
|
||
@@ -202,7 +202,7 @@ static struct aws_string *s_get_command(struct aws_allocator *allocator, struct | ||
|
||
AWS_LOGF_DEBUG( | ||
AWS_LS_AUTH_CREDENTIALS_PROVIDER, | ||
- "Successfully loaded credentials_process command for process credentials provider.") | ||
+ "Successfully loaded credentials_process command for process credentials provider."); | ||
|
||
on_finish: | ||
aws_string_destroy(profile_name); | ||
diff --git a/source/credentials_provider_sts_web_identity.c b/source/credentials_provider_sts_web_identity.c | ||
index cb03cb5..c3e4697 100644 | ||
--- a/source/credentials_provider_sts_web_identity.c | ||
+++ b/source/credentials_provider_sts_web_identity.c | ||
@@ -231,7 +231,7 @@ static bool s_parse_retryable_error_from_response(struct aws_allocator *allocato | ||
if (xml_parser == NULL) { | ||
AWS_LOGF_ERROR( | ||
AWS_LS_AUTH_CREDENTIALS_PROVIDER, | ||
- "Failed to init xml parser for sts web identity credentials provider to parse error information.") | ||
+ "Failed to init xml parser for sts web identity credentials provider to parse error information."); | ||
return false; | ||
} | ||
bool get_retryable_error = false; | ||
@@ -330,14 +330,14 @@ static struct aws_credentials *s_parse_credentials_from_response( | ||
if (xml_parser == NULL) { | ||
AWS_LOGF_ERROR( | ||
AWS_LS_AUTH_CREDENTIALS_PROVIDER, | ||
- "Failed to init xml parser for sts web identity credentials provider to parse error information.") | ||
+ "Failed to init xml parser for sts web identity credentials provider to parse error information."); | ||
return NULL; | ||
} | ||
uint64_t now = UINT64_MAX; | ||
if (aws_sys_clock_get_ticks(&now) != AWS_OP_SUCCESS) { | ||
AWS_LOGF_ERROR( | ||
AWS_LS_AUTH_CREDENTIALS_PROVIDER, | ||
- "Failed to get sys clock for sts web identity credentials provider to parse error information.") | ||
+ "Failed to get sys clock for sts web identity credentials provider to parse error information."); | ||
goto on_finish; | ||
} | ||
uint64_t now_seconds = aws_timestamp_convert(now, AWS_TIMESTAMP_NANOS, AWS_TIMESTAMP_SECS, NULL); | ||
@@ -998,7 +998,7 @@ static struct sts_web_identity_parameters *s_parameters_new(struct aws_allocator | ||
AWS_LOGF_ERROR( | ||
AWS_LS_AUTH_CREDENTIALS_PROVIDER, | ||
"Failed to resolve either region, role arn or token file path during sts web identity provider " | ||
- "initialization.") | ||
+ "initialization."); | ||
goto on_finish; | ||
|
||
} else { | ||
@@ -1021,7 +1021,7 @@ static struct sts_web_identity_parameters *s_parameters_new(struct aws_allocator | ||
aws_byte_buf_init_copy_from_cursor(¶meters->role_arn, allocator, aws_byte_cursor_from_string(role_arn))) { | ||
AWS_LOGF_ERROR( | ||
AWS_LS_AUTH_CREDENTIALS_PROVIDER, | ||
- "Failed to resolve role arn during sts web identity provider initialization.") | ||
+ "Failed to resolve role arn during sts web identity provider initialization."); | ||
goto on_finish; | ||
} | ||
|
||
@@ -1031,7 +1031,7 @@ static struct sts_web_identity_parameters *s_parameters_new(struct aws_allocator | ||
¶meters->token_file_path, allocator, aws_byte_cursor_from_string(token_file_path))) { | ||
AWS_LOGF_ERROR( | ||
AWS_LS_AUTH_CREDENTIALS_PROVIDER, | ||
- "Failed to resolve token file path during sts web identity provider initialization.") | ||
+ "Failed to resolve token file path during sts web identity provider initialization."); | ||
goto on_finish; | ||
} | ||
|
||
@@ -1047,7 +1047,7 @@ static struct sts_web_identity_parameters *s_parameters_new(struct aws_allocator | ||
|
||
AWS_LOGF_DEBUG( | ||
AWS_LS_AUTH_CREDENTIALS_PROVIDER, | ||
- "Successfully loaded all required parameters for sts web identity credentials provider.") | ||
+ "Successfully loaded all required parameters for sts web identity credentials provider."); | ||
success = true; | ||
|
||
on_finish: | ||
diff --git a/source/credentials_utils.c b/source/credentials_utils.c | ||
index 061e26b..2cb61d6 100644 | ||
--- a/source/credentials_utils.c | ||
+++ b/source/credentials_utils.c | ||
@@ -98,7 +98,7 @@ static bool s_parse_expiration_value_from_json_object( | ||
|
||
if (expiration_cursor.len == 0) { | ||
AWS_LOGF_INFO( | ||
- AWS_LS_AUTH_CREDENTIALS_PROVIDER, "Parsed a credentials json document with empty expiration.") | ||
+ AWS_LS_AUTH_CREDENTIALS_PROVIDER, "Parsed a credentials json document with empty expiration."); | ||
return false; | ||
} | ||
|
||
@@ -211,7 +211,7 @@ struct aws_credentials *aws_parse_credentials_from_aws_json_object( | ||
if (access_key_id_cursor.len == 0 || secrete_access_key_cursor.len == 0) { | ||
AWS_LOGF_ERROR( | ||
AWS_LS_AUTH_CREDENTIALS_PROVIDER, | ||
- "Parsed an unexpected credentials json document, either access key, secret key is empty.") | ||
+ "Parsed an unexpected credentials json document, either access key, secret key is empty."); | ||
goto done; | ||
} | ||
|
||
@@ -222,7 +222,7 @@ struct aws_credentials *aws_parse_credentials_from_aws_json_object( | ||
aws_json_value_get_string(token, &session_token_cursor); | ||
if (options->token_required && session_token_cursor.len == 0) { | ||
AWS_LOGF_ERROR( | ||
- AWS_LS_AUTH_CREDENTIALS_PROVIDER, "Parsed an unexpected credentials json document with empty token.") | ||
+ AWS_LS_AUTH_CREDENTIALS_PROVIDER, "Parsed an unexpected credentials json document with empty token."); | ||
goto done; | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,4 +1,6 @@ | ||
versions: | ||
"0.7.7": | ||
folder: all | ||
"0.6.17": | ||
folder: all | ||
"0.6.11": | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,4 +1,8 @@ | ||
versions: | ||
"0.9.10": | ||
folder: all | ||
"0.8.12": | ||
folder: all | ||
"0.7.12": | ||
folder: all | ||
"0.7.10": | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.