From bb5e81c235880db846f5dcf6cd9a1380c84d7dfc Mon Sep 17 00:00:00 2001 From: MSVSphere Packaging Team Date: Wed, 8 Nov 2023 14:30:54 +0300 Subject: [PATCH] import dotnet8.0-8.0.100~rc.2-0.1.el9_3 --- .dotnet8.0.metadata | 1 + .gitignore | 1 + SOURCES/check-debug-symbols.py | 135 +++ .../dotnet-3673-rc2-version-mismatch.patch | 38 + SOURCES/dotnet.sh.in | 14 + SOURCES/release.json | 9 + .../roslyn-analyzers-ppc64le-apphost.patch | 12 + SOURCES/runtime-92274-webcil-s390x.patch | 260 ++++ SOURCES/runtime-92920-multiple-ssl-dirs.patch | 416 +++++++ SOURCES/vstest-intent-net8.0.patch | 13 + SPECS/dotnet8.0.spec | 1045 +++++++++++++++++ 11 files changed, 1944 insertions(+) create mode 100644 .dotnet8.0.metadata create mode 100644 .gitignore create mode 100755 SOURCES/check-debug-symbols.py create mode 100644 SOURCES/dotnet-3673-rc2-version-mismatch.patch create mode 100644 SOURCES/dotnet.sh.in create mode 100644 SOURCES/release.json create mode 100644 SOURCES/roslyn-analyzers-ppc64le-apphost.patch create mode 100644 SOURCES/runtime-92274-webcil-s390x.patch create mode 100644 SOURCES/runtime-92920-multiple-ssl-dirs.patch create mode 100644 SOURCES/vstest-intent-net8.0.patch create mode 100644 SPECS/dotnet8.0.spec diff --git a/.dotnet8.0.metadata b/.dotnet8.0.metadata new file mode 100644 index 0000000..5895169 --- /dev/null +++ b/.dotnet8.0.metadata @@ -0,0 +1 @@ +39620cc0d166a265d5d5022a38c5f1ec648563ae SOURCES/dotnet-v8.0.0-rc.2.23479.6.tar.gz diff --git a/.gitignore b/.gitignore new file mode 100644 index 0000000..bffa144 --- /dev/null +++ b/.gitignore @@ -0,0 +1 @@ +SOURCES/dotnet-v8.0.0-rc.2.23479.6.tar.gz diff --git a/SOURCES/check-debug-symbols.py b/SOURCES/check-debug-symbols.py new file mode 100755 index 0000000..d759f47 --- /dev/null +++ b/SOURCES/check-debug-symbols.py @@ -0,0 +1,135 @@ +#!/usr/bin/python3 + +""" +Check debug symbols are present in shared object and can identify +code. + +It starts scanning from a directory and recursively scans all ELF +files found in it for various symbols to ensure all debuginfo is +present and nothing has been stripped. + +Usage: + +./check-debug-symbols /path/of/dir/to/scan/ + + +Example: + +./check-debug-symbols /usr/lib64 +""" + +# This technique was explained to me by Mark Wielaard (mjw). + +import collections +import os +import re +import subprocess +import sys + +ScanResult = collections.namedtuple('ScanResult', + 'file_name debug_info debug_abbrev file_symbols gnu_debuglink') + + +def scan_file(file): + "Scan the provided file and return a ScanResult containing results of the scan." + + # Test for .debug_* sections in the shared object. This is the main test. + # Stripped objects will not contain these. + readelf_S_result = subprocess.run(['eu-readelf', '-S', file], + stdout=subprocess.PIPE, encoding='utf-8', check=True) + has_debug_info = any(line for line in readelf_S_result.stdout.split('\n') if '] .debug_info' in line) + + has_debug_abbrev = any(line for line in readelf_S_result.stdout.split('\n') if '] .debug_abbrev' in line) + + # Test FILE symbols. These will most likely be removed by anyting that + # manipulates symbol tables because it's generally useless. So a nice test + # that nothing has messed with symbols. + def contains_file_symbols(line): + parts = line.split() + if len(parts) < 8: + return False + return \ + parts[2] == '0' and parts[3] == 'FILE' and parts[4] == 'LOCAL' and parts[5] == 'DEFAULT' and \ + parts[6] == 'ABS' and re.match(r'((.*/)?[-_a-zA-Z0-9]+\.(c|cc|cpp|cxx))?', parts[7]) + + readelf_s_result = subprocess.run(["eu-readelf", '-s', file], + stdout=subprocess.PIPE, encoding='utf-8', check=True) + has_file_symbols = any(line for line in readelf_s_result.stdout.split('\n') if contains_file_symbols(line)) + + # Test that there are no .gnu_debuglink sections pointing to another + # debuginfo file. There shouldn't be any debuginfo files, so the link makes + # no sense either. + has_gnu_debuglink = any(line for line in readelf_s_result.stdout.split('\n') if '] .gnu_debuglink' in line) + + return ScanResult(file, has_debug_info, has_debug_abbrev, has_file_symbols, has_gnu_debuglink) + +def is_elf(file): + result = subprocess.run(['file', file], stdout=subprocess.PIPE, encoding='utf-8', check=True) + return re.search(r'ELF 64-bit [LM]SB (?:pie )?(?:executable|shared object)', result.stdout) + +def scan_file_if_sensible(file): + if is_elf(file): + return scan_file(file) + return None + +def scan_dir(dir): + results = [] + for root, _, files in os.walk(dir): + for name in files: + result = scan_file_if_sensible(os.path.join(root, name)) + if result: + results.append(result) + return results + +def scan(file): + file = os.path.abspath(file) + if os.path.isdir(file): + return scan_dir(file) + elif os.path.isfile(file): + return [scan_file_if_sensible(file)] + +def is_bad_result(result): + return not result.debug_info or not result.debug_abbrev or not result.file_symbols or result.gnu_debuglink + +def print_scan_results(results, verbose): + # print(results) + for result in results: + file_name = result.file_name + found_issue = False + if not result.debug_info: + found_issue = True + print('error: missing .debug_info section in', file_name) + if not result.debug_abbrev: + found_issue = True + print('error: missing .debug_abbrev section in', file_name) + if not result.file_symbols: + found_issue = True + print('error: missing FILE symbols in', file_name) + if result.gnu_debuglink: + found_issue = True + print('error: unexpected .gnu_debuglink section in', file_name) + if verbose and not found_issue: + print('OK: ', file_name) + +def main(args): + verbose = False + files = [] + for arg in args: + if arg == '--verbose' or arg == '-v': + verbose = True + else: + files.append(arg) + + results = [] + for file in files: + results.extend(scan(file)) + + print_scan_results(results, verbose) + + if any(is_bad_result(result) for result in results): + return 1 + return 0 + + +if __name__ == '__main__': + sys.exit(main(sys.argv[1:])) diff --git a/SOURCES/dotnet-3673-rc2-version-mismatch.patch b/SOURCES/dotnet-3673-rc2-version-mismatch.patch new file mode 100644 index 0000000..d277252 --- /dev/null +++ b/SOURCES/dotnet-3673-rc2-version-mismatch.patch @@ -0,0 +1,38 @@ +From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001 +From: Matt Thalman +Date: Tue, 24 Oct 2023 16:20:26 -0500 +Subject: [PATCH] Use correct runtime package version + +--- + prereqs/git-info/AllRepoVersions.props | 2 +- + prereqs/git-info/runtime.props | 4 ++-- + 2 files changed, 3 insertions(+), 3 deletions(-) + +diff --git a/prereqs/git-info/AllRepoVersions.props b/prereqs/git-info/AllRepoVersions.props +index 79a789e1cd..a3f3ccf094 100644 +--- a/prereqs/git-info/AllRepoVersions.props ++++ b/prereqs/git-info/AllRepoVersions.props +@@ -32,7 +32,7 @@ + bdd9c5ba66b00beebdc3516acc5e29b83efd89af + 4.8.0-3.23471.11 + 0b25e38ad32a69cd83ae246104b32449203cc71c +- 8.0.0-rc.2.23475.17 ++ 8.0.0-rc.2.23479.6 + 67e671f384bee6937630b52b02cc78e69b27e280 + 8.0.100-rc.2.23480.5 + 6dbf3aaa0fc9664df86462f5c70b99800934fccd +diff --git a/prereqs/git-info/runtime.props b/prereqs/git-info/runtime.props +index 546469c3a0..20c2bf8840 100644 +--- a/prereqs/git-info/runtime.props ++++ b/prereqs/git-info/runtime.props +@@ -2,8 +2,8 @@ + + + 0b25e38ad32a69cd83ae246104b32449203cc71c +- 20230925.17 +- 8.0.0-rc.2.23475.17 ++ 20230929.6 ++ 8.0.0-rc.2.23479.6 + rc.2 + false + diff --git a/SOURCES/dotnet.sh.in b/SOURCES/dotnet.sh.in new file mode 100644 index 0000000..65b92a0 --- /dev/null +++ b/SOURCES/dotnet.sh.in @@ -0,0 +1,14 @@ + +# Set location for AppHost lookup +[ -z "$DOTNET_ROOT" ] && export DOTNET_ROOT=@LIBDIR@/dotnet + +# Add dotnet tools directory to PATH +DOTNET_TOOLS_PATH="$HOME/.dotnet/tools" +case "$PATH" in + *"$DOTNET_TOOLS_PATH"* ) true ;; + * ) PATH="$PATH:$DOTNET_TOOLS_PATH" ;; +esac + +# Extract self-contained executables under HOME +# to avoid multi-user issues from using the default '/var/tmp'. +[ -z "$DOTNET_BUNDLE_EXTRACT_BASE_DIR" ] && export DOTNET_BUNDLE_EXTRACT_BASE_DIR="${XDG_CACHE_HOME:-"$HOME"/.cache}/dotnet_bundle_extract" diff --git a/SOURCES/release.json b/SOURCES/release.json new file mode 100644 index 0000000..c2cfe24 --- /dev/null +++ b/SOURCES/release.json @@ -0,0 +1,9 @@ +{ + "release": "8.0.0-rc.2", + "channel": "8.0", + "tag": "v8.0.0-rc.2.23479.6", + "sdkVersion": "8.0.100-rc.2.23502.2", + "runtimeVersion": "8.0.0-rc.2.23479.6", + "sourceRepository": "https://github.com/dotnet/dotnet", + "sourceVersion": "1e872358329855089d8d14cec1f06d5b075824b5" +} diff --git a/SOURCES/roslyn-analyzers-ppc64le-apphost.patch b/SOURCES/roslyn-analyzers-ppc64le-apphost.patch new file mode 100644 index 0000000..4dd465c --- /dev/null +++ b/SOURCES/roslyn-analyzers-ppc64le-apphost.patch @@ -0,0 +1,12 @@ +diff --git a/src/roslyn-analyzers/src/PerformanceTests/Tests/PerformanceTests.csproj b/src/roslyn-analyzers/src/PerformanceTests/Tests/PerformanceTests.csproj +index 044a2aba4..b3f8f2611 100644 +--- a/src/roslyn-analyzers/src/PerformanceTests/Tests/PerformanceTests.csproj ++++ b/src/roslyn-analyzers/src/PerformanceTests/Tests/PerformanceTests.csproj +@@ -4,6 +4,7 @@ + preview + disable + Exe ++ false + + + true diff --git a/SOURCES/runtime-92274-webcil-s390x.patch b/SOURCES/runtime-92274-webcil-s390x.patch new file mode 100644 index 0000000..1a39223 --- /dev/null +++ b/SOURCES/runtime-92274-webcil-s390x.patch @@ -0,0 +1,260 @@ +From 72f310a6c3dccbabf9edc29677b51ed78c87cc67 Mon Sep 17 00:00:00 2001 +From: Sanjam Panda +Date: Tue, 19 Sep 2023 15:16:02 +0200 +Subject: [PATCH 1/3] [wasm] Endian fix for Webcil + +'dotnet new blazorwasm' command failed on s390x and was throwing a not implemented exception + +The issue was with with the WebCil writer and reader, specific endianness conversions relating to the webcil payload were not implemented for big endian machines. + +We considered fixing the generic implementation, but there were only two structures in use: WebcilHeader and WebcilSectionHeader, so it was easier to handle them explicitly. +--- + .../Microsoft.NET.WebAssembly.Webcil.csproj | 1 + + .../WebcilConverter.cs | 35 +++++++++++++----- + .../WebcilReader.cs | 37 +++++++++++++++---- + 3 files changed, 57 insertions(+), 16 deletions(-) + +diff --git a/src/runtime/src/tasks/Microsoft.NET.WebAssembly.Webcil/Microsoft.NET.WebAssembly.Webcil.csproj b/src/runtime/src/tasks/Microsoft.NET.WebAssembly.Webcil/Microsoft.NET.WebAssembly.Webcil.csproj +index c35eb57e80686..d09ae4a569a59 100644 +--- a/src/runtime/src/tasks/Microsoft.NET.WebAssembly.Webcil/Microsoft.NET.WebAssembly.Webcil.csproj ++++ b/src/runtime/src/tasks/Microsoft.NET.WebAssembly.Webcil/Microsoft.NET.WebAssembly.Webcil.csproj +@@ -16,6 +16,7 @@ + + + ++ + + + +diff --git a/src/runtime/src/tasks/Microsoft.NET.WebAssembly.Webcil/WebcilConverter.cs b/src/runtime/src/tasks/Microsoft.NET.WebAssembly.Webcil/WebcilConverter.cs +index a38af7270a2da..7b882c42d579e 100644 +--- a/src/runtime/src/tasks/Microsoft.NET.WebAssembly.Webcil/WebcilConverter.cs ++++ b/src/runtime/src/tasks/Microsoft.NET.WebAssembly.Webcil/WebcilConverter.cs +@@ -2,6 +2,7 @@ + // The .NET Foundation licenses this file to you under the MIT license. + + using System; ++using System.Buffers.Binary; + using System.IO; + using System.Collections.Immutable; + using System.Reflection.PortableExecutable; +@@ -181,9 +182,6 @@ private static void WriteHeader(Stream s, WebcilHeader header) + + private static void WriteSectionHeaders(Stream s, ImmutableArray sectionsHeaders) + { +- // FIXME: fixup endianness +- if (!BitConverter.IsLittleEndian) +- throw new NotImplementedException(); + foreach (var sectionHeader in sectionsHeaders) + { + WriteSectionHeader(s, sectionHeader); +@@ -192,16 +190,38 @@ private static void WriteSectionHeaders(Stream s, ImmutableArray(Stream s, T structure) + where T : unmanaged + { +- // FIXME: fixup endianness +- if (!BitConverter.IsLittleEndian) +- throw new NotImplementedException(); + unsafe + { + byte* p = (byte*)&structure; +@@ -212,9 +232,6 @@ private static void WriteStructure(Stream s, T structure) + private static void WriteStructure(Stream s, T structure) + where T : unmanaged + { +- // FIXME: fixup endianness +- if (!BitConverter.IsLittleEndian) +- throw new NotImplementedException(); + int size = Marshal.SizeOf(); + byte[] buffer = new byte[size]; + IntPtr ptr = IntPtr.Zero; +diff --git a/src/runtime/src/tasks/Microsoft.NET.WebAssembly.Webcil/WebcilReader.cs b/src/runtime/src/tasks/Microsoft.NET.WebAssembly.Webcil/WebcilReader.cs +index 4f42f82798664..ac4f9d86095a9 100644 +--- a/src/runtime/src/tasks/Microsoft.NET.WebAssembly.Webcil/WebcilReader.cs ++++ b/src/runtime/src/tasks/Microsoft.NET.WebAssembly.Webcil/WebcilReader.cs +@@ -6,7 +6,7 @@ + using System.IO; + using System.Reflection; + using System.Runtime.InteropServices; +- ++using System.Buffers.Binary; + using System.Reflection.Metadata; + using System.Reflection.PortableExecutable; + +@@ -63,14 +63,20 @@ private unsafe bool ReadHeader() + { + return false; + } +- if (!BitConverter.IsLittleEndian) +- { +- throw new NotImplementedException("TODO: implement big endian support"); +- } + fixed (byte* p = buffer) + { + header = *(WebcilHeader*)p; + } ++ if (!BitConverter.IsLittleEndian) ++ { ++ header.version_major = BinaryPrimitives.ReverseEndianness(header.version_major); ++ header.version_minor = BinaryPrimitives.ReverseEndianness(header.version_minor); ++ header.coff_sections = BinaryPrimitives.ReverseEndianness(header.coff_sections); ++ header.pe_cli_header_rva = BinaryPrimitives.ReverseEndianness(header.pe_cli_header_rva); ++ header.pe_cli_header_size = BinaryPrimitives.ReverseEndianness(header.pe_cli_header_size); ++ header.pe_debug_rva = BinaryPrimitives.ReverseEndianness(header.pe_debug_rva); ++ header.pe_debug_rva = BinaryPrimitives.ReverseEndianness(header.pe_debug_size); ++ } + if (header.id[0] != 'W' || header.id[1] != 'b' + || header.id[2] != 'I' || header.id[3] != 'L' + || header.version_major != Internal.Constants.WC_VERSION_MAJOR +@@ -346,6 +352,7 @@ private long TranslateRVA(uint rva) + + private unsafe ImmutableArray ReadSections() + { ++ WebcilSectionHeader secheader; + var sections = ImmutableArray.CreateBuilder(_header.coff_sections); + var buffer = new byte[Marshal.SizeOf()]; + _stream.Seek(SectionDirectoryOffset + _webcilInWasmOffset, SeekOrigin.Begin); +@@ -357,8 +364,24 @@ private unsafe ImmutableArray ReadSections() + } + fixed (byte* p = buffer) + { +- // FIXME endianness +- sections.Add(*(WebcilSectionHeader*)p); ++ secheader = (*(WebcilSectionHeader*)p); ++ } ++ if (!BitConverter.IsLittleEndian) ++ { ++ sections.Add ++ ( ++ new WebcilSectionHeader ++ ( ++ virtualSize: BinaryPrimitives.ReverseEndianness(secheader.VirtualSize), ++ virtualAddress: BinaryPrimitives.ReverseEndianness(secheader.VirtualAddress), ++ sizeOfRawData: BinaryPrimitives.ReverseEndianness(secheader.SizeOfRawData), ++ pointerToRawData: BinaryPrimitives.ReverseEndianness(secheader.PointerToRawData) ++ ) ++ ); ++ } ++ else ++ { ++ sections.Add(secheader); + } + } + return sections.MoveToImmutable(); + +From 0c78184347335db183a38cf6bd26e2fe69160931 Mon Sep 17 00:00:00 2001 +From: =?UTF-8?q?Aleksey=20Kliger=20=28=CE=BBgeek=29?= +Date: Thu, 21 Sep 2023 14:31:12 -0400 +Subject: [PATCH 2/3] Fix infinite recursion + +--- + .../WebcilConverter.cs | 25 ++++++++----------- + 1 file changed, 10 insertions(+), 15 deletions(-) + +diff --git a/src/runtime/src/tasks/Microsoft.NET.WebAssembly.Webcil/WebcilConverter.cs b/src/runtime/src/tasks/Microsoft.NET.WebAssembly.Webcil/WebcilConverter.cs +index 7b882c42d579e..fc95eded5bc33 100644 +--- a/src/runtime/src/tasks/Microsoft.NET.WebAssembly.Webcil/WebcilConverter.cs ++++ b/src/runtime/src/tasks/Microsoft.NET.WebAssembly.Webcil/WebcilConverter.cs +@@ -177,6 +177,16 @@ public unsafe void GatherInfo(PEReader peReader, out WCFileInfo wcInfo, out PEFi + + private static void WriteHeader(Stream s, WebcilHeader header) + { ++ if (!BitConverter.IsLittleEndian) ++ { ++ webcilHeader.version_major = BinaryPrimitives.ReverseEndianness(webcilHeader.version_major); ++ webcilHeader.version_minor = BinaryPrimitives.ReverseEndianness(webcilHeader.version_minor); ++ webcilHeader.coff_sections = BinaryPrimitives.ReverseEndianness(webcilHeader.coff_sections); ++ webcilHeader.pe_cli_header_rva = BinaryPrimitives.ReverseEndianness(webcilHeader.pe_cli_header_rva); ++ webcilHeader.pe_cli_header_size = BinaryPrimitives.ReverseEndianness(webcilHeader.pe_cli_header_size); ++ webcilHeader.pe_debug_rva = BinaryPrimitives.ReverseEndianness(webcilHeader.pe_debug_rva); ++ webcilHeader.pe_debug_size = BinaryPrimitives.ReverseEndianness(webcilHeader.pe_debug_size); ++ } + WriteStructure(s, header); + } + +@@ -203,21 +213,6 @@ private static void WriteSectionHeader(Stream s, WebcilSectionHeader sectionHead + WriteStructure(s, sectionHeader); + } + +- private static void WriteStructure(Stream s, WebcilHeader webcilHeader) +- { +- if (!BitConverter.IsLittleEndian) +- { +- webcilHeader.version_major = BinaryPrimitives.ReverseEndianness(webcilHeader.version_major); +- webcilHeader.version_minor = BinaryPrimitives.ReverseEndianness(webcilHeader.version_minor); +- webcilHeader.coff_sections = BinaryPrimitives.ReverseEndianness(webcilHeader.coff_sections); +- webcilHeader.pe_cli_header_rva = BinaryPrimitives.ReverseEndianness(webcilHeader.pe_cli_header_rva); +- webcilHeader.pe_cli_header_size = BinaryPrimitives.ReverseEndianness(webcilHeader.pe_cli_header_size); +- webcilHeader.pe_debug_rva = BinaryPrimitives.ReverseEndianness(webcilHeader.pe_debug_rva); +- webcilHeader.pe_debug_size = BinaryPrimitives.ReverseEndianness(webcilHeader.pe_debug_size); +- } +- WriteStructure(s, webcilHeader); +- } +- + #if NETCOREAPP2_1_OR_GREATER + private static void WriteStructure(Stream s, T structure) + where T : unmanaged + +From cecf4f09f0c52340c753811098f0f2d9593049aa Mon Sep 17 00:00:00 2001 +From: Aleksey Kliger +Date: Thu, 21 Sep 2023 14:36:20 -0400 +Subject: [PATCH 3/3] rename var + +--- + src/tasks/Microsoft.NET.WebAssembly.Webcil/WebcilConverter.cs | 4 ++-- + 1 file changed, 2 insertions(+), 2 deletions(-) + +diff --git a/src/runtime/src/tasks/Microsoft.NET.WebAssembly.Webcil/WebcilConverter.cs b/src/runtime/src/tasks/Microsoft.NET.WebAssembly.Webcil/WebcilConverter.cs +index fc95eded5bc33..13c34bde4b8ea 100644 +--- a/src/runtime/src/tasks/Microsoft.NET.WebAssembly.Webcil/WebcilConverter.cs ++++ b/src/runtime/src/tasks/Microsoft.NET.WebAssembly.Webcil/WebcilConverter.cs +@@ -175,7 +175,7 @@ public unsafe void GatherInfo(PEReader peReader, out WCFileInfo wcInfo, out PEFi + SectionStart: firstWCSection); + } + +- private static void WriteHeader(Stream s, WebcilHeader header) ++ private static void WriteHeader(Stream s, WebcilHeader webcilHeader) + { + if (!BitConverter.IsLittleEndian) + { +@@ -187,7 +187,7 @@ private static void WriteHeader(Stream s, WebcilHeader header) + webcilHeader.pe_debug_rva = BinaryPrimitives.ReverseEndianness(webcilHeader.pe_debug_rva); + webcilHeader.pe_debug_size = BinaryPrimitives.ReverseEndianness(webcilHeader.pe_debug_size); + } +- WriteStructure(s, header); ++ WriteStructure(s, webcilHeader); + } + + private static void WriteSectionHeaders(Stream s, ImmutableArray sectionsHeaders) diff --git a/SOURCES/runtime-92920-multiple-ssl-dirs.patch b/SOURCES/runtime-92920-multiple-ssl-dirs.patch new file mode 100644 index 0000000..8ea9c77 --- /dev/null +++ b/SOURCES/runtime-92920-multiple-ssl-dirs.patch @@ -0,0 +1,416 @@ +From 9aec1e3b0b9ddc02b81bd115399f8951288b261b Mon Sep 17 00:00:00 2001 +From: Tom Deseyn +Date: Wed, 11 Oct 2023 18:32:20 +0200 +Subject: [PATCH] Support specifying multiple directories through SSL_CERT_DIR + +Co-authored-by: Jeremy Barton +Co-authored-by: Kevin Jones +--- + .../OpenSslCachedSystemStoreProvider.cs | 232 +++++++++--------- + .../X509Certificates/X509StoreTests.Unix.cs | 42 +++- + 2 files changed, 157 insertions(+), 117 deletions(-) + +diff --git a/src/runtime/src/libraries/System.Security.Cryptography/src/System/Security/Cryptography/X509Certificates/OpenSslCachedSystemStoreProvider.cs b/src/runtime/src/libraries/System.Security.Cryptography/src/System/Security/Cryptography/X509Certificates/OpenSslCachedSystemStoreProvider.cs +index 4c9643c01e2..e66b3d1ad11 100644 +--- a/src/runtime/src/libraries/System.Security.Cryptography/src/System/Security/Cryptography/X509Certificates/OpenSslCachedSystemStoreProvider.cs ++++ b/src/runtime/src/libraries/System.Security.Cryptography/src/System/Security/Cryptography/X509Certificates/OpenSslCachedSystemStoreProvider.cs +@@ -21,14 +21,14 @@ internal sealed class OpenSslCachedSystemStoreProvider : IStorePal + private static readonly TimeSpan s_lastWriteRecheckInterval = TimeSpan.FromSeconds(5); + private static readonly TimeSpan s_assumeInvalidInterval = TimeSpan.FromMinutes(5); + private static readonly Stopwatch s_recheckStopwatch = new Stopwatch(); +- private static DirectoryInfo? s_rootStoreDirectoryInfo = SafeOpenRootDirectoryInfo(); ++ private static string[]? s_rootStoreDirectories; + private static bool s_defaultRootDir; +- private static readonly FileInfo? s_rootStoreFileInfo = SafeOpenRootFileInfo(); ++ private static string? s_rootStoreFile; ++ private static DateTime[]? s_directoryLastWrite; ++ private static DateTime s_fileLastWrite; + + // Use non-Value-Tuple so that it's an atomic update. + private static Tuple? s_nativeCollections; +- private static DateTime s_directoryCertsLastWrite; +- private static DateTime s_fileCertsLastWrite; + + private readonly bool _isRoot; + +@@ -93,18 +93,11 @@ public void Remove(ICertificatePal cert) + { + lock (s_recheckStopwatch) + { +- FileInfo? fileInfo = s_rootStoreFileInfo; +- DirectoryInfo? dirInfo = s_rootStoreDirectoryInfo; +- +- fileInfo?.Refresh(); +- dirInfo?.Refresh(); +- + if (ret == null || + elapsed > s_assumeInvalidInterval || +- (fileInfo != null && fileInfo.Exists && ContentWriteTime(fileInfo) != s_fileCertsLastWrite) || +- (dirInfo != null && dirInfo.Exists && ContentWriteTime(dirInfo) != s_directoryCertsLastWrite)) ++ LastWriteTimesHaveChanged()) + { +- ret = LoadMachineStores(dirInfo, fileInfo); ++ ret = LoadMachineStores(); + } + } + } +@@ -113,9 +106,37 @@ public void Remove(ICertificatePal cert) + return ret; + } + +- private static Tuple LoadMachineStores( +- DirectoryInfo? rootStorePath, +- FileInfo? rootStoreFile) ++ private static bool LastWriteTimesHaveChanged() ++ { ++ Debug.Assert( ++ Monitor.IsEntered(s_recheckStopwatch), ++ "LastWriteTimesHaveChanged assumes a lock(s_recheckStopwatch)"); ++ ++ if (s_rootStoreFile != null) ++ { ++ _ = TryStatFile(s_rootStoreFile, out DateTime lastModified); ++ if (lastModified != s_fileLastWrite) ++ { ++ return true; ++ } ++ } ++ ++ if (s_rootStoreDirectories != null && s_directoryLastWrite != null) ++ { ++ for (int i = 0; i < s_rootStoreDirectories.Length; i++) ++ { ++ _ = TryStatDirectory(s_rootStoreDirectories[i], out DateTime lastModified); ++ if (lastModified != s_directoryLastWrite[i]) ++ { ++ return true; ++ } ++ } ++ } ++ ++ return false; ++ } ++ ++ private static Tuple LoadMachineStores() + { + Debug.Assert( + Monitor.IsEntered(s_recheckStopwatch), +@@ -126,61 +147,76 @@ public void Remove(ICertificatePal cert) + SafeX509StackHandle intermedStore = Interop.Crypto.NewX509Stack(); + Interop.Crypto.CheckValidOpenSslHandle(intermedStore); + +- DateTime newFileTime = default; +- DateTime newDirTime = default; +- + var uniqueRootCerts = new HashSet(); + var uniqueIntermediateCerts = new HashSet(); + bool firstLoad = (s_nativeCollections == null); + +- if (rootStoreFile != null && rootStoreFile.Exists) ++ if (firstLoad) + { +- newFileTime = ContentWriteTime(rootStoreFile); +- ProcessFile(rootStoreFile); ++ s_rootStoreDirectories = GetRootStoreDirectories(out s_defaultRootDir); ++ s_directoryLastWrite = new DateTime[s_rootStoreDirectories.Length]; ++ s_rootStoreFile = GetRootStoreFile(); ++ } ++ else ++ { ++ Debug.Assert(s_rootStoreDirectories is not null); ++ Debug.Assert(s_directoryLastWrite is not null); ++ } ++ ++ if (s_rootStoreFile != null) ++ { ++ ProcessFile(s_rootStoreFile, out s_fileLastWrite); + } + + bool hasStoreData = false; + +- if (rootStorePath != null && rootStorePath.Exists) ++ for (int i = 0; i < s_rootStoreDirectories.Length; i++) + { +- newDirTime = ContentWriteTime(rootStorePath); +- hasStoreData = ProcessDir(rootStorePath); ++ hasStoreData = ProcessDir(s_rootStoreDirectories[i], out s_directoryLastWrite[i]); + } + + if (firstLoad && !hasStoreData && s_defaultRootDir) + { +- DirectoryInfo etcSslCerts = new DirectoryInfo("/etc/ssl/certs"); +- +- if (etcSslCerts.Exists) ++ const string DefaultCertDir = "/etc/ssl/certs"; ++ hasStoreData = ProcessDir(DefaultCertDir, out DateTime lastModified); ++ if (hasStoreData) + { +- DateTime tmpTime = ContentWriteTime(etcSslCerts); +- hasStoreData = ProcessDir(etcSslCerts); +- +- if (hasStoreData) +- { +- newDirTime = tmpTime; +- s_rootStoreDirectoryInfo = etcSslCerts; +- } ++ s_rootStoreDirectories = new[] { DefaultCertDir }; ++ s_directoryLastWrite = new[] { lastModified }; + } + } + +- bool ProcessDir(DirectoryInfo dir) ++ bool ProcessDir(string dir, out DateTime lastModified) + { ++ if (!TryStatDirectory(dir, out lastModified)) ++ { ++ return false; ++ } ++ + bool hasStoreData = false; + +- foreach (FileInfo file in dir.EnumerateFiles()) ++ foreach (string file in Directory.EnumerateFiles(dir)) + { +- hasStoreData |= ProcessFile(file); ++ hasStoreData |= ProcessFile(file, out _, skipStat: true); + } + + return hasStoreData; + } + +- bool ProcessFile(FileInfo file) ++ bool ProcessFile(string file, out DateTime lastModified, bool skipStat = false) + { + bool readData = false; + +- using (SafeBioHandle fileBio = Interop.Crypto.BioNewFile(file.FullName, "rb")) ++ if (skipStat) ++ { ++ lastModified = default; ++ } ++ else if (!TryStatFile(file, out lastModified)) ++ { ++ return false; ++ } ++ ++ using (SafeBioHandle fileBio = Interop.Crypto.BioNewFile(file, "rb")) + { + // The handle may be invalid, for example when we don't have read permission for the file. + if (fileBio.IsInvalid) +@@ -274,114 +310,78 @@ bool ProcessFile(FileInfo file) + // on every call. + + Volatile.Write(ref s_nativeCollections, newCollections); +- s_directoryCertsLastWrite = newDirTime; +- s_fileCertsLastWrite = newFileTime; + s_recheckStopwatch.Restart(); + return newCollections; + } + +- private static FileInfo? SafeOpenRootFileInfo() ++ private static string? GetRootStoreFile() + { + string? rootFile = Interop.Crypto.GetX509RootStoreFile(); + + if (!string.IsNullOrEmpty(rootFile)) + { +- try +- { +- return new FileInfo(rootFile); +- } +- catch (ArgumentException) +- { +- // If SSL_CERT_FILE is set to the empty string, or anything else which gives +- // "The path is not of a legal form", then the GetX509RootStoreFile value is ignored. +- } ++ return Path.GetFullPath(rootFile); + } + + return null; + } + +- private static DirectoryInfo? SafeOpenRootDirectoryInfo() ++ private static string[] GetRootStoreDirectories(out bool isDefault) + { +- string? rootDirectory = Interop.Crypto.GetX509RootStorePath(out s_defaultRootDir); ++ string rootDirectory = Interop.Crypto.GetX509RootStorePath(out isDefault) ?? ""; + +- if (!string.IsNullOrEmpty(rootDirectory)) +- { +- try +- { +- return new DirectoryInfo(rootDirectory); +- } +- catch (ArgumentException) +- { +- // If SSL_CERT_DIR is set to the empty string, or anything else which gives +- // "The path is not of a legal form", then the GetX509RootStoreFile value is ignored. +- } +- } +- +- return null; +- } +- +- private static DateTime ContentWriteTime(FileInfo info) +- { +- string path = info.FullName; +- string? target = Interop.Sys.ReadLink(path); +- +- if (string.IsNullOrEmpty(target)) +- { +- return info.LastWriteTimeUtc; +- } ++ string[] directories = rootDirectory.Split(Path.PathSeparator, StringSplitOptions.RemoveEmptyEntries); + +- if (target[0] != '/') ++ for (int i = 0; i < directories.Length; i++) + { +- target = Path.Join(info.Directory?.FullName, target); ++ directories[i] = Path.GetFullPath(directories[i]); + } + +- try ++ // Remove duplicates. ++ if (directories.Length > 1) + { +- var targetInfo = new FileInfo(target); +- +- if (targetInfo.Exists) ++ var set = new HashSet(directories, StringComparer.Ordinal); ++ if (set.Count != directories.Length) + { +- return targetInfo.LastWriteTimeUtc; ++ // Preserve the original order. ++ string[] directoriesTrimmed = new string[set.Count]; ++ int j = 0; ++ for (int i = 0; i < directories.Length; i++) ++ { ++ string directory = directories[i]; ++ if (set.Remove(directory)) ++ { ++ directoriesTrimmed[j++] = directory; ++ } ++ } ++ Debug.Assert(set.Count == 0); ++ directories = directoriesTrimmed; + } + } +- catch (ArgumentException) +- { +- // If we can't load information about the link path, just treat it as not a link. +- } + +- return info.LastWriteTimeUtc; ++ return directories; + } + +- private static DateTime ContentWriteTime(DirectoryInfo info) +- { +- string path = info.FullName; +- string? target = Interop.Sys.ReadLink(path); +- +- if (string.IsNullOrEmpty(target)) +- { +- return info.LastWriteTimeUtc; +- } ++ private static bool TryStatFile(string path, out DateTime lastModified) ++ => TryStat(path, Interop.Sys.FileTypes.S_IFREG, out lastModified); + +- if (target[0] != '/') +- { +- target = Path.Join(info.Parent?.FullName, target); +- } ++ private static bool TryStatDirectory(string path, out DateTime lastModified) ++ => TryStat(path, Interop.Sys.FileTypes.S_IFDIR, out lastModified); + +- try +- { +- var targetInfo = new DirectoryInfo(target); ++ private static bool TryStat(string path, int fileType, out DateTime lastModified) ++ { ++ lastModified = default; + +- if (targetInfo.Exists) +- { +- return targetInfo.LastWriteTimeUtc; +- } +- } +- catch (ArgumentException) ++ Interop.Sys.FileStatus status; ++ // Use Stat to follow links. ++ if (Interop.Sys.Stat(path, out status) < 0 || ++ (status.Mode & Interop.Sys.FileTypes.S_IFMT) != fileType) + { +- // If we can't load information about the link path, just treat it as not a link. ++ return false; + } + +- return info.LastWriteTimeUtc; ++ lastModified = DateTime.UnixEpoch + TimeSpan.FromTicks(status.MTime * TimeSpan.TicksPerSecond + status.MTimeNsec / TimeSpan.NanosecondsPerTick); ++ return true; + } + } + } +diff --git a/src/runtime/src/libraries/System.Security.Cryptography/tests/X509Certificates/X509StoreTests.Unix.cs b/src/runtime/src/libraries/System.Security.Cryptography/tests/X509Certificates/X509StoreTests.Unix.cs +index 0efb6c12028..f460d6b9bd6 100644 +--- a/src/runtime/src/libraries/System.Security.Cryptography/tests/X509Certificates/X509StoreTests.Unix.cs ++++ b/src/runtime/src/libraries/System.Security.Cryptography/tests/X509Certificates/X509StoreTests.Unix.cs +@@ -10,7 +10,6 @@ namespace System.Security.Cryptography.X509Certificates.Tests + { + public partial class X509StoreTests + { +- + [ConditionalFact(nameof(NotRunningAsRootAndRemoteExecutorSupported))] // root can read '2.pem' + [PlatformSpecific(TestPlatforms.Linux)] // Windows/OSX doesn't use SSL_CERT_{DIR,FILE}. + private void X509Store_MachineStoreLoadSkipsInvalidFiles() +@@ -50,6 +49,47 @@ private void X509Store_MachineStoreLoadSkipsInvalidFiles() + }, new RemoteInvokeOptions { StartInfo = psi }).Dispose(); + } + ++ [ConditionalFact(typeof(RemoteExecutor), nameof(RemoteExecutor.IsSupported))] ++ [PlatformSpecific(TestPlatforms.Linux)] // Windows/OSX doesn't use SSL_CERT_{DIR,FILE}. ++ private void X509Store_MachineStoreLoadsMutipleSslCertDirectories() ++ { ++ // Create 3 certificates and place them in two directories that will be passed ++ // using SSL_CERT_DIR. ++ string sslCertDir1 = GetTestFilePath(); ++ Directory.CreateDirectory(sslCertDir1); ++ File.WriteAllBytes(Path.Combine(sslCertDir1, "1.pem"), TestData.SelfSigned1PemBytes); ++ File.WriteAllBytes(Path.Combine(sslCertDir1, "2.pem"), TestData.SelfSigned2PemBytes); ++ string sslCertDir2 = GetTestFilePath(); ++ Directory.CreateDirectory(sslCertDir2); ++ File.WriteAllBytes(Path.Combine(sslCertDir2, "3.pem"), TestData.SelfSigned3PemBytes); ++ ++ // Add a non-existing directory after each valid directory to verify they are ignored. ++ string sslCertDir = string.Join(Path.PathSeparator, ++ new[] { ++ sslCertDir1, ++ sslCertDir2, ++ "", // empty string ++ sslCertDir2, // duplicate directory ++ "/invalid2", // path that does not exist ++ }); ++ ++ var psi = new ProcessStartInfo(); ++ psi.Environment.Add("SSL_CERT_DIR", sslCertDir); ++ // Set SSL_CERT_FILE to avoid loading the default bundle file. ++ psi.Environment.Add("SSL_CERT_FILE", "/nonexisting"); ++ RemoteExecutor.Invoke(() => ++ { ++ Assert.NotNull(Environment.GetEnvironmentVariable("SSL_CERT_DIR")); ++ using (var store = new X509Store(StoreName.Root, StoreLocation.LocalMachine)) ++ { ++ store.Open(OpenFlags.OpenExistingOnly); ++ ++ // Check nr of certificates in store. ++ Assert.Equal(3, store.Certificates.Count); ++ } ++ }, new RemoteInvokeOptions { StartInfo = psi }).Dispose(); ++ } ++ + public static bool NotRunningAsRootAndRemoteExecutorSupported => !Environment.IsPrivilegedProcess && RemoteExecutor.IsSupported; + } + } +-- +2.41.0 + diff --git a/SOURCES/vstest-intent-net8.0.patch b/SOURCES/vstest-intent-net8.0.patch new file mode 100644 index 0000000..6a51807 --- /dev/null +++ b/SOURCES/vstest-intent-net8.0.patch @@ -0,0 +1,13 @@ +diff --git a/src/vstest/test/Intent/Intent.csproj b/src/vstest/test/Intent/Intent.csproj +index bb711c9256..6d0b199a9b 100644 +--- a/src/vstest/test/Intent/Intent.csproj ++++ b/src/vstest/test/Intent/Intent.csproj +@@ -2,7 +2,7 @@ + + + Exe +- net6.0 ++ net8.0 + enable + enable + diff --git a/SPECS/dotnet8.0.spec b/SPECS/dotnet8.0.spec new file mode 100644 index 0000000..27bb34c --- /dev/null +++ b/SPECS/dotnet8.0.spec @@ -0,0 +1,1045 @@ +%bcond_with bootstrap + +# LTO triggers a compilation error for a source level issue. Given that LTO should not +# change the validity of any given source and the nature of the error (undefined enum), I +# suspect a generator program is mis-behaving in some way. This needs further debugging, +# until that's done, disable LTO. This has to happen before setting the flags below. +%define _lto_cflags %{nil} + +%global dotnetver 8.0 + +%global host_version 8.0.0-rc.2.23479.6 +%global runtime_version 8.0.0-rc.2.23479.6 +%global aspnetcore_runtime_version 8.0.0-rc.2.23480.2 +%global sdk_version 8.0.100-rc.2.23502.1 +%global sdk_feature_band_version %(echo %{sdk_version} | cut -d '-' -f 1 | sed -e 's|[[:digit:]][[:digit:]]$|00|') +%global templates_version 8.0.0-rc.2.23480.2 +#%%global templates_version %%(echo %%{runtime_version} | awk 'BEGIN { FS="."; OFS="." } {print $1, $2, $3+1 }') + +# upstream can produce releases with a different tag than the SDK version +%global upstream_tag v8.0.0-rc.2.23479.6 +%global upstream_tag_without_v %(echo %{upstream_tag} | sed -e 's|^v||') + +%global host_rpm_version 8.0.0~rc.2 +%global runtime_rpm_version 8.0.0~rc.2 +%global aspnetcore_runtime_rpm_version 8.0.0~rc.2 +%global sdk_rpm_version 8.0.100~rc.2 + +%if 0%{?fedora} || 0%{?rhel} < 8 +%global use_bundled_libunwind 0 +%else +%global use_bundled_libunwind 1 +%endif + +%ifarch aarch64 ppc64le s390x +%global use_bundled_libunwind 1 +%endif + +%ifarch aarch64 +%global runtime_arch arm64 +%endif +%ifarch ppc64le +%global runtime_arch ppc64le +%endif +%ifarch s390x +%global runtime_arch s390x +%endif +%ifarch x86_64 +%global runtime_arch x64 +%endif + +%global mono_archs s390x ppc64le + +%{!?runtime_id:%global runtime_id %(. /etc/os-release ; echo "${ID}.${VERSION_ID%%.*}")-%{runtime_arch}} + +Name: dotnet%{dotnetver} +Version: %{sdk_rpm_version} +Release: 0.1%{?dist} +Summary: .NET Runtime and SDK +License: 0BSD AND Apache-2.0 AND (Apache-2.0 WITH LLVM-exception) AND APSL-2.0 AND BSD-2-Clause AND BSD-3-Clause AND BSD-4-Clause AND BSL-1.0 AND bzip2-1.0.6 AND CC0-1.0 AND CC-BY-3.0 AND CC-BY-4.0 AND CC-PDDC AND CNRI-Python AND EPL-1.0 AND GPL-2.0-only AND (GPL-2.0-only WITH GCC-exception-2.0) AND GPL-2.0-or-later AND GPL-3.0-only AND ICU AND ISC AND LGPL-2.1-only AND LGPL-2.1-or-later AND LicenseRef-Fedora-Public-Domain AND LicenseRef-ISO-8879 AND MIT AND MIT-Wu AND MS-PL AND MS-RL AND NCSA AND OFL-1.1 AND OpenSSL AND Unicode-DFS-2015 AND Unicode-DFS-2016 AND W3C-19980720 AND X11 AND Zlib + +URL: https://github.com/dotnet/ + +%if %{with bootstrap} +%global bootstrap_sdk_version 8.0.100-rc.1.23410.12 +%global tarball_name dotnet-%{upstream_tag}-x64-bootstrap +# The source is generated on a Fedora box via: +# ./build-dotnet-tarball --bootstrap %%{upstream_tag} +Source0: %{tarball_name}.tar.xz +# Generated via ./build-arm64-bootstrap-tarball +Source1: dotnet-prebuilts-%{bootstrap_sdk_version}-arm64.tar.gz +# Generated manually, same pattern as the arm64 tarball +Source2: dotnet-prebuilts-%{bootstrap_sdk_version}-ppc64le.tar.gz +# Generated manually, same pattern as the arm64 tarball +Source3: dotnet-prebuilts-%{bootstrap_sdk_version}-s390x.tar.gz +%else +# For non-releases, the source is generated on a Fedora box via: +# ./build-dotnet-tarball %%{upstream_tag} or commit +%global tarball_name dotnet-sdk-source-%{upstream_tag} +Source0: https://github.com/dotnet/dotnet/archive/refs/tags/%{upstream_tag}.tar.gz#/dotnet-%{upstream_tag}.tar.gz +%endif +Source5: https://github.com/dotnet/dotnet/releases/download/%{upstream_tag}/release.json + +#Source10: %%{tarball_name}-nm-dev.tgz +#Source11: %%{tarball_name}-nm-prod.tgz + +Source20: check-debug-symbols.py +Source21: dotnet.sh.in + +# Disable apphost; there's no net6.0 apphost for ppc64le +Patch1: roslyn-analyzers-ppc64le-apphost.patch +# https://github.com/dotnet/source-build/discussions/3481 +Patch2: vstest-intent-net8.0.patch +# https://github.com/dotnet/runtime/pull/92274 +Patch3: runtime-92274-webcil-s390x.patch +# https://github.com/dotnet/runtime/pull/92920 +Patch4: runtime-92920-multiple-ssl-dirs.patch +# https://github.com/dotnet/source-build/issues/3673 +Patch5: dotnet-3673-rc2-version-mismatch.patch + + +%if 0%{?fedora} || 0%{?rhel} >= 8 +ExclusiveArch: aarch64 ppc64le s390x x86_64 +%else +ExclusiveArch: x86_64 +%endif + + +BuildRequires: clang +BuildRequires: cmake +BuildRequires: coreutils +%if %{without bootstrap} +BuildRequires: dotnet-sdk-%{dotnetver} +BuildRequires: dotnet-sdk-%{dotnetver}-source-built-artifacts +%endif +BuildRequires: findutils +BuildRequires: git +%if 0%{?fedora} || 0%{?rhel} > 7 +BuildRequires: glibc-langpack-en +%endif +BuildRequires: hostname +BuildRequires: krb5-devel +BuildRequires: libicu-devel +%if ! %{use_bundled_libunwind} +BuildRequires: libunwind-devel +%endif +%ifnarch s390x +BuildRequires: lld +%else +# lld is not supported/available/usable on s390x +BuildRequires: binutils +%endif +# If the build ever crashes, then having lldb installed might help the +# runtime generate a backtrace for the crash +BuildRequires: lldb +BuildRequires: llvm +BuildRequires: lttng-ust-devel +BuildRequires: make +#BuildRequires: nodejs-devel +BuildRequires: openssl-devel +BuildRequires: python3 +BuildRequires: tar +BuildRequires: util-linux +BuildRequires: zlib-devel + + +# The tracing support in CoreCLR is optional. It has a run-time +# dependency on some additional libraries like lttng-ust. The runtime +# gracefully disables tracing if the dependencies are missing. +%global __requires_exclude_from ^(%{_libdir}/dotnet/.*/libcoreclrtraceptprovider\\.so)$ + +# Avoid generating provides and requires for private libraries +%global privlibs libhostfxr +%global privlibs %{privlibs}|libclrgc +%global privlibs %{privlibs}|libclrjit +%global privlibs %{privlibs}|libcoreclr +%global privlibs %{privlibs}|libcoreclrtraceptprovider +%global privlibs %{privlibs}|libhostpolicy +%global privlibs %{privlibs}|libmscordaccore +%global privlibs %{privlibs}|libmscordbi +%global privlibs %{privlibs}|libnethost +%global privlibs %{privlibs}|libSystem.Globalization.Native +%global privlibs %{privlibs}|libSystem.IO.Compression.Native +%global privlibs %{privlibs}|libSystem.Native +%global privlibs %{privlibs}|libSystem.Net.Security.Native +%global privlibs %{privlibs}|libSystem.Security.Cryptography.Native.OpenSsl +%global __provides_exclude ^(%{privlibs})\\.so +%global __requires_exclude ^(%{privlibs})\\.so + + +%description +.NET is a fast, lightweight and modular platform for creating +cross platform applications that work on Linux, macOS and Windows. + +It particularly focuses on creating console applications, web +applications and micro-services. + +.NET contains a runtime conforming to .NET Standards a set of +framework libraries, an SDK containing compilers and a 'dotnet' +application to drive everything. + +# The `dotnet` package was a bit of historical mistake. Users +# shouldn't be asked to install .NET without a version because .NET +# code (source or build) is generally version specific. We have kept +# it around in older versions of RHEL and Fedora. But no reason to +# continue this mistake. +%if ( 0%{?fedora} && 0%{?fedora} < 38 ) || ( 0%{?rhel} && 0%{?rhel} < 9 ) + +%package -n dotnet + +Version: %{sdk_rpm_version} +Summary: .NET CLI tools and runtime + +Requires: dotnet-sdk-%{dotnetver}%{?_isa} >= %{sdk_rpm_version}-%{release} + +%description -n dotnet +.NET is a fast, lightweight and modular platform for creating +cross platform applications that work on Linux, macOS and Windows. + +It particularly focuses on creating console applications, web +applications and micro-services. + +.NET contains a runtime conforming to .NET Standards a set of +framework libraries, an SDK containing compilers and a 'dotnet' +application to drive everything. + +%endif + +%package -n dotnet-host + +Version: %{host_rpm_version} +Summary: .NET command line launcher + +%description -n dotnet-host +The .NET host is a command line program that runs a standalone +.NET application or launches the SDK. + +.NET is a fast, lightweight and modular platform for creating +cross platform applications that work on Linux, Mac and Windows. + +It particularly focuses on creating console applications, web +applications and micro-services. + + +%package -n dotnet-hostfxr-%{dotnetver} + +Version: %{host_rpm_version} +Summary: .NET command line host resolver + +# Theoretically any version of the host should work. But lets aim for the one +# provided by this package, or from a newer version of .NET +Requires: dotnet-host%{?_isa} >= %{host_rpm_version}-%{release} + +%description -n dotnet-hostfxr-%{dotnetver} +The .NET host resolver contains the logic to resolve and select +the right version of the .NET SDK or runtime to use. + +.NET is a fast, lightweight and modular platform for creating +cross platform applications that work on Linux, Mac and Windows. + +It particularly focuses on creating console applications, web +applications and micro-services. + + +%package -n dotnet-runtime-%{dotnetver} + +Version: %{runtime_rpm_version} +Summary: NET %{dotnetver} runtime + +Requires: dotnet-hostfxr-%{dotnetver}%{?_isa} >= %{host_rpm_version}-%{release} + +# libicu is dlopen()ed +Requires: libicu%{?_isa} + +# See src/runtime/src/libraries/Native/AnyOS/brotli-version.txt +Provides: bundled(libbrotli) = 1.0.9 +%if %{use_bundled_libunwind} +# See src/runtime/src/coreclr/pal/src/libunwind/libunwind-version.txt +Provides: bundled(libunwind) = 1.5.rc1.28.g9165d2a1 +%endif + +%description -n dotnet-runtime-%{dotnetver} +The .NET runtime contains everything needed to run .NET applications. +It includes a high performance Virtual Machine as well as the framework +libraries used by .NET applications. + +.NET is a fast, lightweight and modular platform for creating +cross platform applications that work on Linux, Mac and Windows. + +It particularly focuses on creating console applications, web +applications and micro-services. + + +%package -n aspnetcore-runtime-%{dotnetver} + +Version: %{aspnetcore_runtime_rpm_version} +Summary: ASP.NET Core %{dotnetver} runtime + +Requires: dotnet-runtime-%{dotnetver}%{?_isa} = %{runtime_rpm_version}-%{release} + +%description -n aspnetcore-runtime-%{dotnetver} +The ASP.NET Core runtime contains everything needed to run .NET +web applications. It includes a high performance Virtual Machine as +well as the framework libraries used by .NET applications. + +ASP.NET Core is a fast, lightweight and modular platform for creating +cross platform web applications that work on Linux, Mac and Windows. + +It particularly focuses on creating console applications, web +applications and micro-services. + + +%package -n dotnet-templates-%{dotnetver} + +Version: %{sdk_rpm_version} +Summary: .NET %{dotnetver} templates + +# Theoretically any version of the host should work. But lets aim for the one +# provided by this package, or from a newer version of .NET +Requires: dotnet-host%{?_isa} >= %{host_rpm_version}-%{release} + +%description -n dotnet-templates-%{dotnetver} +This package contains templates used by the .NET SDK. + +.NET is a fast, lightweight and modular platform for creating +cross platform applications that work on Linux, Mac and Windows. + +It particularly focuses on creating console applications, web +applications and micro-services. + + +%package -n dotnet-sdk-%{dotnetver} + +Version: %{sdk_rpm_version} +Summary: .NET %{dotnetver} Software Development Kit + +Provides: bundled(js-jquery) + +Requires: dotnet-runtime-%{dotnetver}%{?_isa} >= %{runtime_rpm_version}-%{release} +Requires: aspnetcore-runtime-%{dotnetver}%{?_isa} >= %{aspnetcore_runtime_rpm_version}-%{release} + +Requires: dotnet-apphost-pack-%{dotnetver}%{?_isa} >= %{runtime_rpm_version}-%{release} +Requires: dotnet-targeting-pack-%{dotnetver}%{?_isa} >= %{runtime_rpm_version}-%{release} +Requires: aspnetcore-targeting-pack-%{dotnetver}%{?_isa} >= %{aspnetcore_runtime_rpm_version}-%{release} +Requires: netstandard-targeting-pack-2.1%{?_isa} >= %{sdk_rpm_version}-%{release} + +Requires: dotnet-templates-%{dotnetver}%{?_isa} >= %{sdk_rpm_version}-%{release} + +%description -n dotnet-sdk-%{dotnetver} +The .NET SDK is a collection of command line applications to +create, build, publish and run .NET applications. + +.NET is a fast, lightweight and modular platform for creating +cross platform applications that work on Linux, Mac and Windows. + +It particularly focuses on creating console applications, web +applications and micro-services. + + +%global dotnet_targeting_pack() %{expand: +%package -n %{1} + +Version: %{2} +Summary: Targeting Pack for %{3} %{4} + +Requires: dotnet-host%{?_isa} + +%description -n %{1} +This package provides a targeting pack for %{3} %{4} +that allows developers to compile against and target %{3} %{4} +applications using the .NET SDK. + +%files -n %{1} +%dir %{_libdir}/dotnet/packs +%{_libdir}/dotnet/packs/%{5} +} + +%dotnet_targeting_pack dotnet-apphost-pack-%{dotnetver} %{runtime_rpm_version} Microsoft.NETCore.App %{dotnetver} Microsoft.NETCore.App.Host.%{runtime_id} +%dotnet_targeting_pack dotnet-targeting-pack-%{dotnetver} %{runtime_rpm_version} Microsoft.NETCore.App %{dotnetver} Microsoft.NETCore.App.Ref +%dotnet_targeting_pack aspnetcore-targeting-pack-%{dotnetver} %{aspnetcore_runtime_rpm_version} Microsoft.AspNetCore.App %{dotnetver} Microsoft.AspNetCore.App.Ref +%dotnet_targeting_pack netstandard-targeting-pack-2.1 %{sdk_rpm_version} NETStandard.Library 2.1 NETStandard.Library.Ref + + +%package -n dotnet-sdk-%{dotnetver}-source-built-artifacts + +Version: %{sdk_rpm_version} +Summary: Internal package for building .NET %{dotnetver} Software Development Kit + +%description -n dotnet-sdk-%{dotnetver}-source-built-artifacts +The .NET source-built archive is a collection of packages needed +to build the .NET SDK itself. + +These are not meant for general use. + + +%prep +release_json_tag=$(grep tag %{SOURCE5} | cut -d: -f2 | sed -E 's/[," ]*//g') +if [[ ${release_json_tag} != %{upstream_tag} ]]; then + echo "error: tag in release.json doesn't match tag in spec file" + exit 1 +fi + +%if %{without bootstrap} +%setup -q -n dotnet-%{upstream_tag_without_v} + +# Remove all prebuilts +find -iname '*.dll' -type f -delete +find -iname '*.so' -type f -delete +find -iname '*.tar.gz' -type f -delete +find -iname '*.nupkg' -type f -delete +find -iname '*.zip' -type f -delete + +rm -rf .dotnet/ +rm -rf packages/source-built + +mkdir -p prereqs/packages/archive +ln -s %{_libdir}/dotnet/source-built-artifacts/Private.SourceBuilt.Artifacts.*.tar.gz prereqs/packages/archive/ + +%else + +%setup -q -T -b 0 -n dotnet-%{upstream_tag}-x64-bootstrap + +%ifnarch x86_64 + +rm -rf .dotnet +%ifarch aarch64 +tar -x --strip-components=1 -f %{SOURCE1} -C prereqs/packages/prebuilt/ +%endif +%ifarch ppc64le +tar -x --strip-components=1 -f %{SOURCE2} -C prereqs/packages/prebuilt/ +%endif +%ifarch s390x +tar -x --strip-components=1 -f %{SOURCE3} -C prereqs/packages/prebuilt/ +%endif + +mkdir -p .dotnet +tar xf prereqs/packages/prebuilt/dotnet-sdk*.tar.gz -C .dotnet/ +rm prereqs/packages/prebuilt/dotnet-sdk*.tar.gz + +boot_sdk_version=$(ls -1 .dotnet/sdk/) +sed -i -E 's|"dotnet": "[^"]+"|"dotnet" : "'$boot_sdk_version'"|' global.json + +%ifarch ppc64le s390x +ilasm_version=$(ls prereqs/packages/prebuilt| grep -i ilasm | tr 'A-Z' 'a-z' | sed -E 's|runtime.linux-'%{runtime_arch}'.microsoft.netcore.ilasm.||' | sed -E 's|.nupkg$||') +echo $ilasm_version + +mkdir -p packages-customized-local +pushd packages-customized-local +tar xf ../prereqs/packages/archive/Private.SourceBuilt.Artifacts.*.tar.gz +sed -i -E 's|[^<]+|'$ilasm_version'|' PackageVersions.props +sed -i -E 's|[^<]+|'$ilasm_version'|' PackageVersions.props +tar czf ../prereqs/packages/archive/Private.SourceBuilt.Artifacts.*.tar.gz * +popd + +%endif + +%endif + +%endif + +# tar -x --strip-components=1 -f %%{SOURCE10} +# tar -x --strip-components=1 -f %%{SOURCE11} + +%autopatch -p1 -M 999 + +# Fix bad hardcoded path in build +sed -i 's|/usr/share/dotnet|%{_libdir}/dotnet|' src/runtime/src/native/corehost/hostmisc/pal.unix.cpp + +%if ! %{use_bundled_libunwind} +sed -i -E 's|( /p:BuildDebPackage=false)|\1 --cmakeargs -DCLR_CMAKE_USE_SYSTEM_LIBUNWIND=TRUE|' src/runtime/eng/SourceBuild.props +%endif + + +%build +cat /etc/os-release + +%if %{without bootstrap} +# We need to create a copy because we will mutate this +cp -a %{_libdir}/dotnet previously-built-dotnet +find previously-built-dotnet +%endif + +%if 0%{?fedora} || 0%{?rhel} >= 9 +# Setting this macro ensures that only clang supported options will be +# added to ldflags and cflags. +%global toolchain clang +%set_build_flags +%else +# Filter flags not supported by clang +%global dotnet_cflags %(echo %optflags | sed -re 's/-specs=[^ ]*//g') +%global dotnet_ldflags %(echo %{__global_ldflags} | sed -re 's/-specs=[^ ]*//g') +export CFLAGS="%{dotnet_cflags}" +export CXXFLAGS="%{dotnet_cflags}" +export LDFLAGS="%{dotnet_ldflags}" +%endif + +# -fstack-clash-protection breaks CoreCLR +CFLAGS=$(echo $CFLAGS | sed -e 's/-fstack-clash-protection//' ) +CXXFLAGS=$(echo $CXXFLAGS | sed -e 's/-fstack-clash-protection//' ) + +%ifarch aarch64 +# -mbranch-protection=standard breaks unwinding in CoreCLR through libunwind +CFLAGS=$(echo $CFLAGS | sed -e 's/-mbranch-protection=standard //') +CXXFLAGS=$(echo $CXXFLAGS | sed -e 's/-mbranch-protection=standard //') +%endif + +%ifarch s390x +# -march=z13 -mtune=z14 makes clang crash while compiling .NET +CFLAGS=$(echo $CFLAGS | sed -e 's/ -march=z13//') +CFLAGS=$(echo $CFLAGS | sed -e 's/ -mtune=z14//') +CXXFLAGS=$(echo $CXXFLAGS | sed -e 's/ -march=z13//') +CXXFLAGS=$(echo $CXXFLAGS | sed -e 's/ -mtune=z14//') +%endif + +export EXTRA_CFLAGS="$CFLAGS" +export EXTRA_CXXFLAGS="$CXXFLAGS" +export EXTRA_LDFLAGS="$LDFLAGS" + +# Disable tracing, which is incompatible with certain versions of +# lttng See https://github.com/dotnet/runtime/issues/57784. The +# suggested compile-time change doesn't work, unfortunately. +export COMPlus_LTTng=0 + +VERBOSE=1 ./build.sh \ +%if %{without bootstrap} + --with-sdk previously-built-dotnet \ +%endif +%ifarch %{mono_archs} + --use-mono-runtime \ +%endif + --release-manifest %{SOURCE5} \ + -- \ + /p:MinimalConsoleLogOutput=false \ + /p:ContinueOnPrebuiltBaselineError=true \ + /v:n \ + /p:LogVerbosity=n \ + + +sed -e 's|[@]LIBDIR[@]|%{_libdir}|g' %{SOURCE21} > dotnet.sh + + +%install +install -dm 0755 %{buildroot}%{_libdir}/dotnet +ls artifacts/%{runtime_arch}/Release +mkdir -p built-sdk +tar xf artifacts/%{runtime_arch}/Release/dotnet-sdk-%{sdk_version}-%{runtime_id}.tar.gz -C built-sdk/ + +# Convert hardlinks to actual copies. This takes up quite a bit of +# extra disk space, but works around RHEL issues in post-rpmbuild tools +# when they encounter hardlinks. +cp -r --preserve=mode,ownership,timestamps built-sdk/* %{buildroot}%{_libdir}/dotnet/ +ls %{buildroot}%{_libdir}/dotnet + +# Delete bundled certificates: we want to use the system store only, +# except for when we have no other choice and ca-certificates doesn't +# provide it. Currently ca-ceritificates has no support for +# timestamping certificates (timestamp.ctl). +find %{buildroot}%{_libdir}/dotnet -name 'codesignctl.pem' -delete +if [[ $(find %{buildroot}%{_libdir}/dotnet -name '*.pem' -print | wc -l) != 1 ]]; then + find %{buildroot}%{_libdir}/dotnet -name '*.pem' -print + echo "too many certificate bundles" + exit 2 +fi + +# Install managed symbols +tar xf artifacts/%{runtime_arch}/Release/dotnet-runtime-symbols-%{runtime_id}-%{runtime_version}.tar.gz \ + -C %{buildroot}%{_libdir}/dotnet/shared/Microsoft.NETCore.App/%{runtime_version}/ + +# Fix executable permissions on files +find %{buildroot}%{_libdir}/dotnet/ -type f -name 'apphost' -exec chmod +x {} \; +find %{buildroot}%{_libdir}/dotnet/ -type f -name 'singlefilehost' -exec chmod +x {} \; +find %{buildroot}%{_libdir}/dotnet/ -type f -name 'lib*so' -exec chmod +x {} \; +find %{buildroot}%{_libdir}/dotnet/ -type f -name '*.a' -exec chmod -x {} \; +find %{buildroot}%{_libdir}/dotnet/ -type f -name '*.dll' -exec chmod -x {} \; +find %{buildroot}%{_libdir}/dotnet/ -type f -name '*.h' -exec chmod 0644 {} \; +find %{buildroot}%{_libdir}/dotnet/ -type f -name '*.json' -exec chmod -x {} \; +find %{buildroot}%{_libdir}/dotnet/ -type f -name '*.pdb' -exec chmod -x {} \; +find %{buildroot}%{_libdir}/dotnet/ -type f -name '*.props' -exec chmod -x {} \; +find %{buildroot}%{_libdir}/dotnet/ -type f -name '*.pubxml' -exec chmod -x {} \; +find %{buildroot}%{_libdir}/dotnet/ -type f -name '*.targets' -exec chmod -x {} \; +find %{buildroot}%{_libdir}/dotnet/ -type f -name '*.txt' -exec chmod -x {} \; +find %{buildroot}%{_libdir}/dotnet/ -type f -name '*.xml' -exec chmod -x {} \; + +install -dm 0755 %{buildroot}%{_sysconfdir}/profile.d/ +install dotnet.sh %{buildroot}%{_sysconfdir}/profile.d/ + +install -dm 0755 %{buildroot}/%{_datadir}/bash-completion/completions +# dynamic completion needs the file to be named the same as the base command +install src/sdk/scripts/register-completions.bash %{buildroot}/%{_datadir}/bash-completion/completions/dotnet + +# TODO: the zsh completion script needs to be ported to use #compdef +#install -dm 755 %%{buildroot}/%%{_datadir}/zsh/site-functions +#install src/cli/scripts/register-completions.zsh %%{buildroot}/%%{_datadir}/zsh/site-functions/_dotnet + +install -dm 0755 %{buildroot}%{_bindir} +ln -s ../../%{_libdir}/dotnet/dotnet %{buildroot}%{_bindir}/ + +for section in 1 7; do + install -dm 0755 %{buildroot}%{_mandir}/man${section}/ + find -iname 'dotnet*'.${section} -type f -exec cp {} %{buildroot}%{_mandir}/man${section}/ \; +done + +install -dm 0755 %{buildroot}%{_sysconfdir}/dotnet +echo "%{_libdir}/dotnet" >> install_location +install install_location %{buildroot}%{_sysconfdir}/dotnet/ +echo "%{_libdir}/dotnet" >> install_location_%{runtime_arch} +install install_location_%{runtime_arch} %{buildroot}%{_sysconfdir}/dotnet/ + +install -dm 0755 %{buildroot}%{_libdir}/dotnet/source-built-artifacts +install -m 0644 artifacts/%{runtime_arch}/Release/Private.SourceBuilt.Artifacts.*.tar.gz %{buildroot}/%{_libdir}/dotnet/source-built-artifacts/ + + +# Quick and dirty check for https://github.com/dotnet/source-build/issues/2731 +test -f %{buildroot}%{_libdir}/dotnet/sdk/%{sdk_version}/Sdks/Microsoft.NET.Sdk/Sdk/Sdk.props + +# Check debug symbols in all elf objects. This is not in %%check +# because native binaries are stripped by rpm-build after %%install. +# So we need to do this check earlier. +echo "Testing build results for debug symbols..." +%{SOURCE20} -v %{buildroot}%{_libdir}/dotnet/ + + + +%check +%if 0%{?fedora} > 35 +# lttng in Fedora > 35 is incompatible with .NET +export COMPlus_LTTng=0 +%endif + +%{buildroot}%{_libdir}/dotnet/dotnet --info +%{buildroot}%{_libdir}/dotnet/dotnet --version + + +%if ( 0%{?fedora} && 0%{?fedora} < 38 ) || ( 0%{?rhel} && 0%{?rhel} < 9 ) +%files -n dotnet +# empty package useful for dependencies +%endif + +%files -n dotnet-host +%dir %{_libdir}/dotnet +%{_libdir}/dotnet/dotnet +%dir %{_libdir}/dotnet/host +%dir %{_libdir}/dotnet/host/fxr +%{_bindir}/dotnet +%license %{_libdir}/dotnet/LICENSE.txt +%license %{_libdir}/dotnet/ThirdPartyNotices.txt +%doc %{_mandir}/man1/dotnet*.1.* +%doc %{_mandir}/man7/dotnet*.7.* +%config(noreplace) %{_sysconfdir}/profile.d/dotnet.sh +%config(noreplace) %{_sysconfdir}/dotnet +%dir %{_datadir}/bash-completion +%dir %{_datadir}/bash-completion/completions +%{_datadir}/bash-completion/completions/dotnet + +%files -n dotnet-hostfxr-%{dotnetver} +%dir %{_libdir}/dotnet/host/fxr +%{_libdir}/dotnet/host/fxr/%{host_version} + +%files -n dotnet-runtime-%{dotnetver} +%dir %{_libdir}/dotnet/shared +%dir %{_libdir}/dotnet/shared/Microsoft.NETCore.App +%{_libdir}/dotnet/shared/Microsoft.NETCore.App/%{runtime_version} + +%files -n aspnetcore-runtime-%{dotnetver} +%dir %{_libdir}/dotnet/shared +%dir %{_libdir}/dotnet/shared/Microsoft.AspNetCore.App +%{_libdir}/dotnet/shared/Microsoft.AspNetCore.App/%{aspnetcore_runtime_version} + +%files -n dotnet-templates-%{dotnetver} +%dir %{_libdir}/dotnet/templates +%{_libdir}/dotnet/templates/%{templates_version} + +%files -n dotnet-sdk-%{dotnetver} +%dir %{_libdir}/dotnet/sdk +%{_libdir}/dotnet/sdk/%{sdk_version} +%dir %{_libdir}/dotnet/sdk-manifests +%{_libdir}/dotnet/sdk-manifests/%{sdk_feature_band_version}* +%{_libdir}/dotnet/metadata +%dir %{_libdir}/dotnet/packs +%{_libdir}/dotnet/packs/Microsoft.AspNetCore.App.Runtime.%{runtime_id}/%{aspnetcore_runtime_version} +%{_libdir}/dotnet/packs/Microsoft.NETCore.App.Runtime.%{runtime_id}/%{runtime_version} + +%files -n dotnet-sdk-%{dotnetver}-source-built-artifacts +%dir %{_libdir}/dotnet +%{_libdir}/dotnet/source-built-artifacts + + +%changelog +* Mon Oct 16 2023 Omair Majid - 8.0.100~rc.2-0.1 +- Update to .NET 8 RC 2 +- Resolves: RHEL-13790 + +* Thu Sep 28 2023 Omair Majid - 8.0.100~rc.1-0.4 +- Disable bootstrap +- Related: RHEL-4074 + +* Wed Sep 27 2023 Omair Majid - 8.0.100~rc.1-0.3 +- Add backported patches for additional s390x issues +- Related: RHEL-4074 + +* Mon Sep 18 2023 Omair Majid - 8.0.100~rc.1-0.2 +- Add patches to fix mono and arm64 issues +- Include libmono-*.a files in the SDK +- Fix CI configuration +- Related: RHEL-4074 + +* Fri Sep 15 2023 Omair Majid - 8.0.100~rc.1-0.1 +- Update to .NET SDK 8.0.100 RC 1 and Runtime 8.0.0 RC 1 +- Resolves: RHEL-4074 + +* Tue Aug 22 2023 Omair Majid - 8.0.100~preview.7-0.2 +- Add patch to work around TypeLoadException in Mono +- Related: RHBZ#2224124 + +* Fri Aug 11 2023 Omair Majid - 8.0.100~preview.7-0.1 +- Update to .NET SDK 8.0.100 Preview 7 and Runtime 8.0.0 Preview 7 + +* Tue Jul 18 2023 Omair Majid - 8.0.100~preview.6-0.2 +- Remove lttng and other tracing-specific dependencies from the runtime package + +* Mon Jul 17 2023 Omair Majid - 8.0.100~preview.6-0.1 +- Update to .NET SDK 8.0.100 Preview 6 and Runtime 8.0.0 Preview 6 + +* Fri Jun 23 2023 Omair Majid - 8.0.100~preview.5-0.2 +- Fix release.json and sourcelink references + +* Mon Jun 19 2023 Omair Majid - 8.0.100~preview.5-0.1 +- Update to .NET SDK 8.0.100 Preview 5 and Runtime 8.0.0 Preview 5 + +* Wed Apr 12 2023 Omair Majid - 8.0.100~preview.3-0.1 +- Update to .NET SDK 8.0.100 Preview 3 and Runtime 8.0.0 Preview 3 + +* Wed Mar 15 2023 Omair Majid - 8.0.100~preview.2-0.1 +- Update to .NET SDK 8.0.100 Preview 2 and Runtime 8.0.0 Preview 2 + +* Wed Feb 22 2023 Omair Majid - 8.0.100~preview.1-0.1 +- Update to .NET SDK 8.0.100 Preview 1 and Runtime 8.0.0 Preview 1 + +* Thu Jan 12 2023 Omair Majid - 7.0.102-1 +- Update to .NET SDK 7.0.102 and Runtime 7.0.2 + +* Wed Jan 11 2023 Omair Majid - 7.0.101-1 +- Update to .NET SDK 7.0.101 and Runtime 7.0.1 + +* Tue Jan 10 2023 Omair Majid - 7.0.100-1 +- Update to .NET SDK 7.0.100 and Runtime 7.0.0 + +* Thu Nov 10 2022 Omair Majid - 7.0.100-0.1 +- Update to .NET 7 RC 2 + +* Wed May 11 2022 Omair Majid - 6.0.105-1 +- Update to .NET SDK 6.0.105 and Runtime 6.0.5 + +* Tue Apr 12 2022 Omair Majid - 6.0.104-1 +- Update to .NET SDK 6.0.104 and Runtime 6.0.4 + +* Thu Mar 10 2022 Omair Majid - 6.0.103-1 +- Update to .NET SDK 6.0.103 and Runtime 6.0.3 + +* Mon Feb 14 2022 Omair Majid - 6.0.102-1 +- Update to .NET SDK 6.0.102 and Runtime 6.0.2 + +* Fri Jan 28 2022 Omair Majid - 6.0.101-3 +- Update to .NET SDK 6.0.101 and Runtime 6.0.1 + +* Thu Jan 20 2022 Fedora Release Engineering - 6.0.100-3 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_36_Mass_Rebuild + +* Mon Dec 20 2021 Omair Majid - 6.0.100-2 +- Disable bootstrap + +* Sun Dec 19 2021 Omair Majid - 6.0.100-1 +- Update to .NET 6 + +* Fri Oct 22 2021 Omair Majid - 6.0.0-0.7.rc2 +- Update to .NET 6 RC2 + +* Fri Oct 08 2021 Omair Majid - 6.0.0-0.6.28be3e9a006d90d8c6e87d4353b77882829df718 +- Enable building on arm64 +- Related: RHBZ#1986017 + +* Sun Oct 03 2021 Omair Majid - 6.0.0-0.5.28be3e9a006d90d8c6e87d4353b77882829df718 +- Enable building on s390x +- Related: RHBZ#1986017 + +* Sun Oct 03 2021 Omair Majid - 6.0.0-0.4.28be3e9a006d90d8c6e87d4353b77882829df718 +- Clean up tarball and add initial support for s390x +- Related: RHBZ#1986017 + +* Sun Sep 26 2021 Omair Majid - 6.0.0-0.3.28be3e9a006d90d8c6e87d4353b77882829df718 +- Update to work-in-progress RC2 release + +* Wed Aug 25 2021 Omair Majid - 6.0.0-0.2.preview6 +- Updated to build the latest source-build preview + +* Fri Jul 23 2021 Omair Majid - 6.0.0-0.1.preview6 +- Initial package for .NET 6 + +* Thu Jun 10 2021 Omair Majid - 5.0.204-1 +- Update to .NET SDK 5.0.204 and Runtime 5.0.7 + +* Wed May 12 2021 Omair Majid - 5.0.203-1 +- Update to .NET SDK 5.0.203 and Runtime 5.0.6 + +* Wed Apr 14 2021 Omair Majid - 5.0.202-1 +- Update to .NET SDK 5.0.202 and Runtime 5.0.5 + +* Tue Apr 06 2021 Omair Majid - 5.0.104-2 +- Mark files under /etc/ as config(noreplace) +- Add an rpm-inspect configuration file +- Add an rpmlintrc file +- Enable gating for release branches and ELN too + +* Tue Mar 16 2021 Omair Majid - 5.0.104-1 +- Update to .NET SDK 5.0.104 and Runtime 5.0.4 +- Drop unneeded/upstreamed patches + +* Wed Feb 17 2021 Omair Majid - 5.0.103-2 +- Add Fedora 35 RIDs + +* Thu Feb 11 2021 Omair Majid - 5.0.103-1 +- Update to .NET SDK 5.0.103 and Runtime 5.0.3 + +* Fri Jan 29 2021 Omair Majid - 5.0.102-2 +- Disable bootstrap + +* Fri Dec 18 2020 Omair Majid - 5.0.100-2 +- Update to .NET Core Runtime 5.0.0 and SDK 5.0.100 commit 9c4e5de + +* Fri Dec 04 2020 Omair Majid - 5.0.100-1 +- Update to .NET Core Runtime 5.0.0 and SDK 5.0.100 + +* Thu Dec 03 2020 Omair Majid - 5.0.100-0.4.20201202git337413b +- Update to latest 5.0 pre-GA commit + +* Tue Nov 24 2020 Omair Majid - 5.0.100-0.4.20201123gitdee899c +- Update to 5.0 pre-GA commit + +* Mon Sep 14 2020 Omair Majid - 5.0.100-0.3.preview8 +- Update to Preview 8 + +* Fri Jul 10 2020 Omair Majid - 5.0.100-0.2.preview4 +- Fix building with custom CFLAGS/CXXFLAGS/LDFLAGS +- Clean up patches + +* Mon Jul 06 2020 Omair Majid - 5.0.100-0.1.preview4 +- Initial build + +* Sat Jun 27 2020 Omair Majid - 3.1.105-4 +- Disable bootstrap + +* Fri Jun 26 2020 Omair Majid - 3.1.105-3 +- Re-bootstrap aarch64 + +* Fri Jun 19 2020 Omair Majid - 3.1.105-3 +- Disable bootstrap + +* Thu Jun 18 2020 Omair Majid - 3.1.105-1 +- Bootstrap aarch64 + +* Tue Jun 16 2020 Chris Rummel - 3.1.105-1 +- Update to .NET Core Runtime 3.1.5 and SDK 3.1.105 + +* Fri Jun 05 2020 Chris Rummel - 3.1.104-1 +- Update to .NET Core Runtime 3.1.4 and SDK 3.1.104 + +* Thu Apr 09 2020 Chris Rummel - 3.1.103-1 +- Update to .NET Core Runtime 3.1.3 and SDK 3.1.103 + +* Mon Mar 16 2020 Omair Majid - 3.1.102-1 +- Update to .NET Core Runtime 3.1.2 and SDK 3.1.102 + +* Fri Feb 28 2020 Omair Majid - 3.1.101-4 +- Disable bootstrap + +* Fri Feb 28 2020 Omair Majid - 3.1.101-3 +- Enable bootstrap +- Add Fedora 33 runtime ids + +* Thu Feb 27 2020 Omair Majid - 3.1.101-2 +- Disable bootstrap + +* Tue Jan 21 2020 Omair Majid - 3.1.101-1 +- Update to .NET Core Runtime 3.1.1 and SDK 3.1.101 + +* Thu Dec 05 2019 Omair Majid - 3.1.100-1 +- Update to .NET Core Runtime 3.1.0 and SDK 3.1.100 + +* Mon Nov 18 2019 Omair Majid - 3.1.100-0.4.preview3 +- Fix apphost permissions + +* Fri Nov 15 2019 Omair Majid - 3.1.100-0.3.preview3 +- Update to .NET Core Runtime 3.1.0-preview3.19553.2 and SDK + 3.1.100-preview3-014645 + +* Wed Nov 06 2019 Omair Majid - 3.1.100-0.2 +- Update to .NET Core 3.1 Preview 2 + +* Wed Oct 30 2019 Omair Majid - 3.1.100-0.1 +- Update to .NET Core 3.1 Preview 1 + +* Thu Oct 24 2019 Omair Majid - 3.0.100-5 +- Add cgroupv2 support to .NET Core + +* Wed Oct 16 2019 Omair Majid - 3.0.100-4 +- Include fix from coreclr for building on Fedora 32 + +* Wed Oct 16 2019 Omair Majid - 3.0.100-3 +- Harden built binaries to pass annocheck + +* Fri Oct 11 2019 Omair Majid - 3.0.100-2 +- Export DOTNET_ROOT in profile to make apphost lookup work + +* Fri Sep 27 2019 Omair Majid - 3.0.100-1 +- Update to .NET Core Runtime 3.0.0 and SDK 3.0.100 + +* Wed Sep 25 2019 Omair Majid - 3.0.100-0.18.rc1 +- Update to .NET Core Runtime 3.0.0-rc1-19456-20 and SDK 3.0.100-rc1-014190 + +* Tue Sep 17 2019 Omair Majid - 3.0.100-0.16.preview9 +- Fix files duplicated between dotnet-apphost-pack-3.0 and dotnet-targeting-pack-3.0 +- Fix dependencies between .NET SDK and the targeting packs + +* Mon Sep 16 2019 Omair Majid - 3.0.100-0.15.preview9 +- Update to .NET Core Runtime 3.0.0-preview 9 and SDK 3.0.100-preview9 + +* Mon Aug 19 2019 Omair Majid - 3.0.100-0.11.preview8 +- Update to .NET Core Runtime 3.0.0-preview8-28405-07 and SDK + 3.0.100-preview8-013656 + +* Tue Jul 30 2019 Omair Majid - 3.0.100-0.9.preview7 +- Update to .NET Core Runtime 3.0.0-preview7-27912-14 and SDK + 3.0.100-preview7-012821 + +* Fri Jul 26 2019 Omair Majid - 3.0.100-0.8.preview7 +- Update to .NET Core Runtime 3.0.0-preview7-27902-19 and SDK + 3.0.100-preview7-012802 + +* Wed Jun 26 2019 Omair Majid - 3.0.0-0.7.preview6 +- Obsolete dotnet-sdk-3.0.1xx +- Add supackages for targeting packs +- Add -fcf-protection to CFLAGS + +* Wed Jun 26 2019 Omair Majid - 3.0.0-0.6.preview6 +- Update to .NET Core Runtime 3.0.0-preview6-27804-01 and SDK 3.0.100-preview6-012264 +- Set dotnet installation location in /etc/dotnet/install_location +- Update targeting packs +- Install managed symbols +- Completely conditionalize libunwind bundling + +* Tue May 07 2019 Omair Majid - 3.0.0-0.3.preview4 +- Update to .NET Core 3.0 preview 4 + +* Tue Dec 18 2018 Omair Majid - 3.0.0-0.1.preview1 +- Update to .NET Core 3.0 preview 1 + +* Fri Dec 07 2018 Omair Majid - 2.2.100 +- Update to .NET Core 2.2.0 + +* Wed Nov 07 2018 Omair Majid - 2.2.100-0.2.preview3 +- Update to .NET Core 2.2.0-preview3 + +* Fri Nov 02 2018 Omair Majid - 2.1.403-3 +- Add host-fxr-2.1 subpackage + +* Mon Oct 15 2018 Omair Majid - 2.1.403-2 +- Disable telemetry by default +- Users have to manually export DOTNET_CLI_TELEMETRY_OPTOUT=0 to enable + +* Tue Oct 02 2018 Omair Majid - 2.1.403-1 +- Update to .NET Core Runtime 2.1.5 and SDK 2.1.403 + +* Wed Sep 26 2018 Omair Majid - 2.1.402-2 +- Add ~/.dotnet/tools to $PATH to make it easier to use dotnet tools + +* Thu Sep 13 2018 Omair Majid - 2.1.402-1 +- Update to .NET Core Runtime 2.1.4 and SDK 2.1.402 + +* Wed Sep 05 2018 Omair Majid - 2.1.401-2 +- Use distro-standard flags when building .NET Core + +* Tue Aug 21 2018 Omair Majid - 2.1.401-1 +- Update to .NET Core Runtime 2.1.3 and SDK 2.1.401 + +* Mon Aug 20 2018 Omair Majid - 2.1.302-1 +- Update to .NET Core Runtime 2.1.2 and SDK 2.1.302 + +* Fri Jul 20 2018 Omair Majid - 2.1.301-1 +- Update to .NET Core 2.1 + +* Thu May 03 2018 Omair Majid - 2.0.7-1 +- Update to .NET Core 2.0.7 + +* Wed Mar 28 2018 Omair Majid - 2.0.6-2 +- Enable bash completion for dotnet +- Remove redundant buildrequires and requires + +* Wed Mar 14 2018 Omair Majid - 2.0.6-1 +- Update to .NET Core 2.0.6 + +* Fri Feb 23 2018 Omair Majid - 2.0.5-1 +- Update to .NET Core 2.0.5 + +* Wed Jan 24 2018 Omair Majid - 2.0.3-5 +- Don't apply corefx clang warnings fix on clang < 5 + +* Fri Jan 19 2018 Omair Majid - 2.0.3-4 +- Add a test script to sanity check debug and symbol info. +- Build with clang 5.0 +- Make main package real instead of using a virtual provides (see RHBZ 1519325) + +* Wed Nov 29 2017 Omair Majid - 2.0.3-3 +- Add a Provides for 'dotnet' +- Fix conditional macro + +* Tue Nov 28 2017 Omair Majid - 2.0.3-2 +- Fix build on Fedora 27 + +* Fri Nov 17 2017 Omair Majid - 2.0.3-1 +- Update to .NET Core 2.0.3 + +* Thu Oct 19 2017 Omair Majid - 2.0.0-4 +- Add a hack to let omnisharp work + +* Wed Aug 30 2017 Omair Majid - 2.0.0-3 +- Add a patch for building coreclr and core-setup correctly on Fedora >= 27 + +* Fri Aug 25 2017 Omair Majid - 2.0.0-2 +- Move libicu/libcurl/libunwind requires to runtime package +- Make sdk depend on the exact version of the runtime package + +* Thu Aug 24 2017 Omair Majid - 2.0.0-1 +- Update to 2.0.0 final release + +* Wed Jul 26 2017 Omair Majid - 2.0.0-0.3.preview2 +- Add man pages + +* Tue Jul 25 2017 Omair Majid - 2.0.0-0.2.preview2 +- Add Requires on libicu +- Split into multiple packages +- Do not repeat first-run message + +* Fri Jul 21 2017 Omair Majid - 2.0.0-0.1.preview2 +- Update to .NET Core 2.0 Preview 2 + +* Thu Mar 16 2017 Nemanja Milošević - 1.1.0-7 +- rebuilt with latest libldb +* Wed Feb 22 2017 Nemanja Milosevic - 1.1.0-6 +- compat-openssl 1.0 for F26 for now +* Sun Feb 19 2017 Nemanja Milosevic - 1.1.0-5 +- Fix wrong commit id's +* Sat Feb 18 2017 Nemanja Milosevic - 1.1.0-4 +- Use commit id's instead of branch names +* Sat Feb 18 2017 Nemanja Milosevic - 1.1.0-3 +- Improper patch5 fix +* Sat Feb 18 2017 Nemanja Milosevic - 1.1.0-2 +- SPEC cleanup +- git removal (using all tarballs for reproducible builds) +- more reasonable versioning +* Thu Feb 09 2017 Nemanja Milosevic - 1.1.0-1 +- Fixed debuginfo going to separate package (Patch1) +- Added F25/F26 RIL and fixed the version info (Patch2) +- Added F25/F26 RIL in Microsoft.NETCore.App suported runtime graph (Patch3) +- SPEC file cleanup +* Wed Jan 11 2017 Nemanja Milosevic - 1.1.0-0 +- Initial RPM for Fedora 25/26.