From: Fabrice Fontaine Date: Tue, 2 Feb 2021 17:27:05 +0000 (+0100) Subject: package/qpid-proton: bump to version 0.33.0 X-Git-Url: https://git.libre-soc.org/?a=commitdiff_plain;h=d4c0fde91da0d79204a21ed8de1bd410efa1c4d6;p=buildroot.git package/qpid-proton: bump to version 0.33.0 - Update site to get latest version - Remove all patches (already in version) - License file has been renamed and slightly updated to change paths since version 0.23.0 and https://github.com/apache/qpid-proton/commit/37136940e3077f25ce58c94775f48c66f666f4a8 - Remove BUILD_{JAVA,JAVASCRIPT,PERL,PHP} as those bindings don't exist anymore - Disable go binding - Disable fuzz testing - Add new optional libuv and jsoncpp dependencies - Update QPID_PROTON_REMOVE_USELESS_FILES Signed-off-by: Fabrice Fontaine Reviewed-by: Luca Ceresoli Tested-by: Luca Ceresoli Signed-off-by: Thomas Petazzoni --- diff --git a/package/qpid-proton/0001-PROTON-1381-PROTON-1326-Modify-openssl-DH-code-to-wo.patch b/package/qpid-proton/0001-PROTON-1381-PROTON-1326-Modify-openssl-DH-code-to-wo.patch deleted file mode 100644 index 1085804f41..0000000000 --- a/package/qpid-proton/0001-PROTON-1381-PROTON-1326-Modify-openssl-DH-code-to-wo.patch +++ /dev/null @@ -1,78 +0,0 @@ -From bc872440428073e86ce2631276dc8b7f62da4c33 Mon Sep 17 00:00:00 2001 -From: Andrew Stitcher -Date: Tue, 17 Jan 2017 02:10:48 -0500 -Subject: [PATCH] PROTON-1381, PROTON-1326: Modify openssl DH code to work with - openssl 1.1 Modified patch from Volker Diels-Grabsch - -Upstream: https://github.com/apache/qpid-proton/commit/bc872440428073e86ce2631276dc8b7f62da4c33 - -Signed-off-by: Matthew Weber ---- - proton-c/src/ssl/openssl.c | 37 +++++++++++++++++++++++++++---------- - 1 file changed, 27 insertions(+), 10 deletions(-) - -diff --git a/proton-c/src/ssl/openssl.c b/proton-c/src/ssl/openssl.c -index 0b7d157..0c51c03 100644 ---- a/proton-c/src/ssl/openssl.c -+++ b/proton-c/src/ssl/openssl.c -@@ -356,12 +356,22 @@ static int verify_callback(int preverify_ok, X509_STORE_CTX *ctx) - return preverify_ok; - } - -+// This was introduced in v1.1 -+#if OPENSSL_VERSION_NUMBER < 0x10100000 -+int DH_set0_pqg(DH *dh, BIGNUM *p, BIGNUM *q, BIGNUM *g) -+{ -+ dh->p = p; -+ dh->q = q; -+ dh->g = g; -+ return 1; -+} -+#endif - - // this code was generated using the command: - // "openssl dhparam -C -2 2048" - static DH *get_dh2048(void) - { -- static const unsigned char dh2048_p[]={ -+ static const unsigned char dhp_2048[]={ - 0xAE,0xF7,0xE9,0x66,0x26,0x7A,0xAC,0x0A,0x6F,0x1E,0xCD,0x81, - 0xBD,0x0A,0x10,0x7E,0xFA,0x2C,0xF5,0x2D,0x98,0xD4,0xE7,0xD9, - 0xE4,0x04,0x8B,0x06,0x85,0xF2,0x0B,0xA3,0x90,0x15,0x56,0x0C, -@@ -385,17 +395,24 @@ static DH *get_dh2048(void) - 0xA4,0xED,0xFD,0x49,0x0B,0xE3,0x4A,0xF6,0x28,0xB3,0x98,0xB0, - 0x23,0x1C,0x09,0x33, - }; -- static const unsigned char dh2048_g[]={ -+ static const unsigned char dhg_2048[]={ - 0x02, - }; -- DH *dh; -- -- if ((dh=DH_new()) == NULL) return(NULL); -- dh->p=BN_bin2bn(dh2048_p,sizeof(dh2048_p),NULL); -- dh->g=BN_bin2bn(dh2048_g,sizeof(dh2048_g),NULL); -- if ((dh->p == NULL) || (dh->g == NULL)) -- { DH_free(dh); return(NULL); } -- return(dh); -+ DH *dh = DH_new(); -+ BIGNUM *dhp_bn, *dhg_bn; -+ -+ if (dh == NULL) -+ return NULL; -+ dhp_bn = BN_bin2bn(dhp_2048, sizeof (dhp_2048), NULL); -+ dhg_bn = BN_bin2bn(dhg_2048, sizeof (dhg_2048), NULL); -+ if (dhp_bn == NULL || dhg_bn == NULL -+ || !DH_set0_pqg(dh, dhp_bn, NULL, dhg_bn)) { -+ DH_free(dh); -+ BN_free(dhp_bn); -+ BN_free(dhg_bn); -+ return NULL; -+ } -+ return dh; - } - - typedef struct { --- -1.9.1 - diff --git a/package/qpid-proton/0002-PROTON-1326-restore-anonymous-cyphers-by-lowering-Op.patch b/package/qpid-proton/0002-PROTON-1326-restore-anonymous-cyphers-by-lowering-Op.patch deleted file mode 100644 index 2adba9a591..0000000000 --- a/package/qpid-proton/0002-PROTON-1326-restore-anonymous-cyphers-by-lowering-Op.patch +++ /dev/null @@ -1,62 +0,0 @@ -From 8c54c62516671375de4068158ccaa0bc1dba0a4a Mon Sep 17 00:00:00 2001 -From: Cliff Jansen -Date: Wed, 2 Aug 2017 16:34:39 -0700 -Subject: [PATCH] PROTON-1326: restore anonymous cyphers by lowering OpenSSL - v1.1 security level just for the PN_SSL_ANONYMOUS_PEER verification mode - -Upstream: https://github.com/apache/qpid-proton/commit/8c54c62516671375de4068158ccaa0bc1dba0a4a - -Signed-off-by: Matthew Weber ---- - proton-c/src/ssl/openssl.c | 14 ++++++++++++++ - 1 file changed, 14 insertions(+) - -diff --git a/proton-c/src/ssl/openssl.c b/proton-c/src/ssl/openssl.c -index 8cb4e7b..f37cf49 100644 ---- a/proton-c/src/ssl/openssl.c -+++ b/proton-c/src/ssl/openssl.c -@@ -72,6 +72,9 @@ struct pn_ssl_domain_t { - char *trusted_CAs; - - int ref_count; -+#if OPENSSL_VERSION_NUMBER >= 0x10100000 -+ int default_seclevel; -+#endif - pn_ssl_mode_t mode; - pn_ssl_verify_mode_t verify_mode; - -@@ -524,6 +527,9 @@ pn_ssl_domain_t *pn_ssl_domain( pn_ssl_mode_t mode ) - // Mitigate the CRIME vulnerability - SSL_CTX_set_options(domain->ctx, SSL_OP_NO_COMPRESSION); - #endif -+#if OPENSSL_VERSION_NUMBER >= 0x10100000 -+ domain->default_seclevel = SSL_CTX_get_security_level(domain->ctx); -+#endif - - // by default, allow anonymous ciphers so certificates are not required 'out of the box' - if (!SSL_CTX_set_cipher_list( domain->ctx, CIPHERS_ANONYMOUS )) { -@@ -647,6 +653,10 @@ int pn_ssl_domain_set_peer_authentication(pn_ssl_domain_t *domain, - case PN_SSL_VERIFY_PEER: - case PN_SSL_VERIFY_PEER_NAME: - -+#if OPENSSL_VERSION_NUMBER >= 0x10100000 -+ SSL_CTX_set_security_level(domain->ctx, domain->default_seclevel); -+#endif -+ - if (!domain->has_ca_db) { - pn_transport_logf(NULL, "Error: cannot verify peer without a trusted CA configured.\n" - " Use pn_ssl_domain_set_trusted_ca_db()"); -@@ -685,6 +695,10 @@ int pn_ssl_domain_set_peer_authentication(pn_ssl_domain_t *domain, - break; - - case PN_SSL_ANONYMOUS_PEER: // hippie free love mode... :) -+#if OPENSSL_VERSION_NUMBER >= 0x10100000 -+ // Must use lowest OpenSSL security level to enable anonymous ciphers. -+ SSL_CTX_set_security_level(domain->ctx, 0); -+#endif - SSL_CTX_set_verify( domain->ctx, SSL_VERIFY_NONE, NULL ); - break; - --- -1.9.1 - diff --git a/package/qpid-proton/0003-PROTON-1587-fix-openssl-error-handling-causing-spuri.patch b/package/qpid-proton/0003-PROTON-1587-fix-openssl-error-handling-causing-spuri.patch deleted file mode 100644 index bbd3c7b810..0000000000 --- a/package/qpid-proton/0003-PROTON-1587-fix-openssl-error-handling-causing-spuri.patch +++ /dev/null @@ -1,58 +0,0 @@ -From c31ca95ac73d0da462f7e324e1c3a33b11c39f2c Mon Sep 17 00:00:00 2001 -From: Alan Conway -Date: Wed, 27 Sep 2017 18:37:24 -0400 -Subject: [PATCH] PROTON-1587: fix openssl error handling, causing spurious - errors - -From the SSL_get_error() man page: - - In addition to ssl and ret, SSL_get_error() inspects the current thread's OpenSSL error - queue. Thus, SSL_get_error() must be used in the same thread that performed the TLS/SSL I/O - operation, and no other OpenSSL function calls should appear in between. The current - thread's error queue must be empty before the TLS/SSL I/O operation is attempted, or - SSL_get_error() will not work reliably. - -Proton was not clearing the error queue, so the "shutdown-during-init" -error (which was introduced recently in OpenSSL) was left dangling, and was -reported incorrectly when the thread was used to serve another transport. - -Upstream: https://github.com/apache/qpid-proton/commit/c31ca95ac73d0da462f7e324e1c3a33b11c39f2c - -Signed-off-by: Matthew Weber ---- - proton-c/src/ssl/openssl.c | 5 ++++- - 1 file changed, 4 insertions(+), 1 deletion(-) - -diff --git a/proton-c/src/ssl/openssl.c b/proton-c/src/ssl/openssl.c -index 5c750b0..3a4e1a3 100644 ---- a/proton-c/src/ssl/openssl.c -+++ b/proton-c/src/ssl/openssl.c -@@ -206,7 +206,7 @@ static int ssl_failed(pn_transport_t *transport) - // fake a shutdown so the i/o processing code will close properly - SSL_set_shutdown(ssl->ssl, SSL_SENT_SHUTDOWN|SSL_RECEIVED_SHUTDOWN); - // try to grab the first SSL error to add to the failure log -- char buf[128] = "Unknown error."; -+ char buf[256] = "Unknown error"; - unsigned long ssl_err = ERR_get_error(); - if (ssl_err) { - ERR_error_string_n( ssl_err, buf, sizeof(buf) ); -@@ -909,6 +909,7 @@ static ssize_t process_input_ssl( pn_transport_t *transport, unsigned int layer, - - do { - work_pending = false; -+ ERR_clear_error(); - - // Write to network bio as much as possible, consuming bytes/available - -@@ -1058,6 +1059,8 @@ static ssize_t process_output_ssl( pn_transport_t *transport, unsigned int layer - - do { - work_pending = false; -+ ERR_clear_error(); -+ - // first, get any pending application output, if possible - - if (!ssl->app_output_closed && ssl->out_count < ssl->out_size) { --- -1.9.1 - diff --git a/package/qpid-proton/0004-src-ssl-openssl-add-libressl-compatibility.patch b/package/qpid-proton/0004-src-ssl-openssl-add-libressl-compatibility.patch deleted file mode 100644 index f969671ffb..0000000000 --- a/package/qpid-proton/0004-src-ssl-openssl-add-libressl-compatibility.patch +++ /dev/null @@ -1,53 +0,0 @@ -From 87c44b4ebc64c15f6324ed40852224b61fbe77a7 Mon Sep 17 00:00:00 2001 -From: Matt Weber -Date: Tue, 5 Feb 2019 06:10:16 -0600 -Subject: [PATCH] src/ssl/openssl: add libressl compatibility - -Similar to https://github.com/FreeRDP/FreeRDP/issues/5049 -libressl has `#define OPENSSL_VERSION_NUMBER ` defined the same as -openssl 1.1.x which results in SSL_CTX_set_security_level() getting used. - -This patch prevents SSL_CTX_set_security_level() from being used with -libressl. - -Upstream: https://github.com/apache/qpid-proton/pull/175 - -Signed-off-by: Matthew Weber ---- - c/src/ssl/openssl.c | 6 +++--- - 1 file changed, 3 insertions(+), 3 deletions(-) - -diff --git a/proton-c/src/ssl/openssl.c b/proton-c/src/ssl/openssl.c -index c2b5869..541d0ae 100644 ---- a/proton-c/src/ssl/openssl.c -+++ b/proton-c/src/ssl/openssl.c -@@ -522,7 +522,7 @@ pn_ssl_domain_t *pn_ssl_domain( pn_ssl_mode_t mode ) - // Mitigate the CRIME vulnerability - SSL_CTX_set_options(domain->ctx, SSL_OP_NO_COMPRESSION); - #endif --#if OPENSSL_VERSION_NUMBER >= 0x10100000 -+#if OPENSSL_VERSION_NUMBER >= 0x10100000 && !defined(LIBRESSL_VERSION_NUMBER) - domain->default_seclevel = SSL_CTX_get_security_level(domain->ctx); - #endif - -@@ -709,7 +709,7 @@ int pn_ssl_domain_set_peer_authentication(pn_ssl_domain_t *domain, - case PN_SSL_VERIFY_PEER: - case PN_SSL_VERIFY_PEER_NAME: - --#if OPENSSL_VERSION_NUMBER >= 0x10100000 -+#if OPENSSL_VERSION_NUMBER >= 0x10100000 && !defined(LIBRESSL_VERSION_NUMBER) - SSL_CTX_set_security_level(domain->ctx, domain->default_seclevel); - #endif - -@@ -749,7 +749,7 @@ int pn_ssl_domain_set_peer_authentication(pn_ssl_domain_t *domain, - break; - - case PN_SSL_ANONYMOUS_PEER: // hippie free love mode... :) --#if OPENSSL_VERSION_NUMBER >= 0x10100000 -+#if OPENSSL_VERSION_NUMBER >= 0x10100000 && !defined(LIBRESSL_VERSION_NUMBER) - // Must use lowest OpenSSL security level to enable anonymous ciphers. - SSL_CTX_set_security_level(domain->ctx, 0); - #endif --- -1.9.1 - diff --git a/package/qpid-proton/qpid-proton.hash b/package/qpid-proton/qpid-proton.hash index 1ee72eef7a..22600e47d8 100644 --- a/package/qpid-proton/qpid-proton.hash +++ b/package/qpid-proton/qpid-proton.hash @@ -1,4 +1,5 @@ -# Hash from: http://www.apache.org/dist/qpid/proton/0.9.1/qpid-proton-0.9.1.tar.gz.sha -sha1 98008d90acd0d47cbd7ac1572a2bb50b452338ed qpid-proton-0.9.1.tar.gz +# Hash from: https://www.apache.org/dist/qpid/proton/0.33.0/qpid-proton-0.33.0.tar.gz.sha512 +sha512 d82cade354fd01f2cf7a3e0c17d48cdfa3bde263c8571762cdeb0b4da6ef2d6fd6f97cdba4fa4e8fc1b5368c54ccd2ca860fb56f46f58091c91deab843a17cf2 qpid-proton-0.33.0.tar.gz + # Locally computed -sha256 9fade5e12873678456137b36cfa4a5983c3793836d41c011f2c2abb02ca36a66 LICENSE +sha256 52310e65489d30afeefc8589479fc02862a875349c19edd165658a915009da82 LICENSE.txt diff --git a/package/qpid-proton/qpid-proton.mk b/package/qpid-proton/qpid-proton.mk index ff7d748231..b73ab8d6da 100644 --- a/package/qpid-proton/qpid-proton.mk +++ b/package/qpid-proton/qpid-proton.mk @@ -4,34 +4,42 @@ # ################################################################################ -QPID_PROTON_VERSION = 0.9.1 -QPID_PROTON_SITE = http://apache.panu.it/qpid/proton/$(QPID_PROTON_VERSION) -QPID_PROTON_STRIP_COMPONENTS = 2 +QPID_PROTON_VERSION = 0.33.0 +QPID_PROTON_SITE = \ + https://downloads.apache.org/qpid/proton/$(QPID_PROTON_VERSION) QPID_PROTON_LICENSE = Apache-2.0 -QPID_PROTON_LICENSE_FILES = LICENSE +QPID_PROTON_LICENSE_FILES = LICENSE.txt QPID_PROTON_CPE_ID_VENDOR = apache QPID_PROTON_CPE_ID_PRODUCT = qpid_proton QPID_PROTON_INSTALL_STAGING = YES QPID_PROTON_DEPENDENCIES = \ host-python \ util-linux \ + $(if $(BR2_PACKAGE_LIBUV),libuv) \ $(if $(BR2_PACKAGE_OPENSSL),openssl) -# Language bindings are enabled when host-swig tool is present in HOST_DIR. +# python and ruby language bindings are enabled when host-swig tool is present +# in HOST_DIR. +# go language binding is enabled when host-go is present # For now, disable all of them. QPID_PROTON_CONF_OPTS = \ - -DBUILD_JAVA=OFF \ - -DBUILD_JAVASCRIPT=OFF \ - -DBUILD_PERL=OFF \ - -DBUILD_PHP=OFF \ + -DBUILD_GO=OFF \ -DBUILD_PYTHON=OFF \ -DBUILD_RUBY=OFF \ + -DENABLE_FUZZ_TESTING=OFF \ -DENABLE_VALGRIND=OFF \ -DENABLE_WARNING_ERROR=OFF \ -DPYTHON_EXECUTABLE=$(HOST_DIR)/bin/python2 +ifeq ($(BR2_PACKAGE_JSONCPP),y) +QPID_PROTON_DEPENDENCIES += jsoncpp +QPID_PROTON_CONF_OPTS += -DENABLE_JSONCPP=ON +else +QPID_PROTON_CONF_OPTS += -DENABLE_JSONCPP=OFF +endif + define QPID_PROTON_REMOVE_USELESS_FILES - rm -fr $(TARGET_DIR)/usr/share/proton-*/ + rm -fr $(TARGET_DIR)/usr/share/proton/ endef QPID_PROTON_POST_INSTALL_TARGET_HOOKS += QPID_PROTON_REMOVE_USELESS_FILES