diff --git a/dist b/dist index 37a6f9cba7a88cbcf8ab13c9187a23e686af9edd..1fe92cf0fdf9c2625d878a2ace258f64c1e8ca44 100644 --- a/dist +++ b/dist @@ -1 +1 @@ -an8_9 +an8_10 diff --git a/dotnet6.0.spec b/dotnet6.0.spec index 51cc10d9d54ae3bbc5bd18ab0a817f675d8a5039..7a78bc9bce299a6df42e42d8c54f6271404f3c33 100644 --- a/dotnet6.0.spec +++ b/dotnet6.0.spec @@ -23,10 +23,10 @@ # until that's done, disable LTO. This has to happen before setting the flags below. %define _lto_cflags %{nil} -%global host_version 6.0.29 -%global runtime_version 6.0.29 +%global host_version 6.0.32 +%global runtime_version 6.0.32 %global aspnetcore_runtime_version %{runtime_version} -%global sdk_version 6.0.129 +%global sdk_version 6.0.132 %global sdk_feature_band_version %(echo %{sdk_version} | sed -e 's|[[:digit:]][[:digit:]]$|00|') %global templates_version %{runtime_version} #%%global templates_version %%(echo %%{runtime_version} | awk 'BEGIN { FS="."; OFS="." } {print $1, $2, $3+1 }') @@ -657,29 +657,33 @@ echo "Testing build results for debug symbols..." %changelog -* Wed Apr 17 2024 Liwei Ge - 6.0.129-1.0.1 +* Wed Jul 31 2024 Liwei Ge - 6.0.132-1.0.1 - Fix sdk suffix for Anolis OS - Update netstandard-targeting-pack-2.1 acquisition method (Zhao Hang) -* Tue Apr 02 2024 Omair Majid - 6.0.129-1 +* Thu Jun 27 2024 Omair Majid - 6.0.132-1 +- Update to .NET SDK 6.0.132 and Runtime 6.0.32 +- Resolves: RHEL-45319 + +* Tue Apr 09 2024 Omair Majid - 6.0.129-2 - Update to .NET SDK 6.0.129 and Runtime 6.0.29 -- Resolves: RHEL-31196 +- Resolves: RHEL-31194 -* Thu Feb 29 2024 Omair Majid - 6.0.128-1 +* Tue Mar 19 2024 Omair Majid - 6.0.128-2 - Update to .NET SDK 6.0.128 and Runtime 6.0.28 -- Resolves: RHEL-27538 +- Resolves: RHEL-27539 -* Thu Feb 01 2024 Omair Majid - 6.0.127-1 +* Wed Feb 14 2024 Omair Majid - 6.0.127-2 - Update to .NET SDK 6.0.127 and Runtime 6.0.27 -- Resolves: RHEL-23786 +- Resolves: RHEL-23784 -* Wed Dec 20 2023 Omair Majid - 6.0.126-1 +* Mon Jan 15 2024 Omair Majid - 6.0.126-2 - Update to .NET SDK 6.0.126 and Runtime 6.0.26 -- Resolves: RHEL-19804 +- Resolves: RHEL-19798 -* Thu Nov 02 2023 Omair Majid - 6.0.125-1 +* Mon Dec 11 2023 Omair Majid - 6.0.125-2 - Update to .NET SDK 6.0.125 and Runtime 6.0.25 -- Resolves: RHEL-15360 +- Resolves: RHEL-15348 * Tue Oct 24 2023 Omair Majid - 6.0.124-2 - Update to .NET SDK 6.0.124 and Runtime 6.0.24 diff --git a/download b/download index 7253bff6cf0f1739d384e627394c87fd4b40eb7c..b5ae1062df168a29dd326062184710f365312a1c 100644 --- a/download +++ b/download @@ -1 +1 @@ -1568e87b39e88e29691f18d4c1219b62 dotnet-v6.0.129.tar.gz +0dfec067b54749217e63ac84c15d1b98 dotnet-v6.0.132.tar.gz diff --git a/runtime-re-enable-implicit-rejection.patch b/runtime-re-enable-implicit-rejection.patch index 0455ad0f32f88fd48a001918642dc2f5406c91e2..3e96a1eac671ca602a222d8a939d6ebaf5b1327a 100644 --- a/runtime-re-enable-implicit-rejection.patch +++ b/runtime-re-enable-implicit-rejection.patch @@ -47,33 +47,6 @@ index 55a044d62a6..e72d42e87d2 100644 using (RSA rsa = RSAFactory.Create(TestData.RSA2048Params)) { void RoundtripEmpty(RSAEncryptionPadding paddingMode) -@@ -692,26 +701,6 @@ public void NotSupportedValueMethods() - } - } - -- [ConditionalTheory] -- [InlineData(new byte[] { 1, 2, 3, 4 })] -- [InlineData(new byte[0])] -- public void Decrypt_Pkcs1_ErrorsForInvalidPadding(byte[] data) -- { -- if (data.Length == 0 && !PlatformSupportsEmptyRSAEncryption) -- { -- throw new SkipTestException("Platform does not support RSA encryption of empty data."); -- } -- -- using (RSA rsa = RSAFactory.Create(TestData.RSA2048Params)) -- { -- byte[] encrypted = Encrypt(rsa, data, RSAEncryptionPadding.Pkcs1); -- encrypted[1] ^= 0xFF; -- -- // PKCS#1, the data, and the key are all deterministic so this should always throw an exception. -- Assert.ThrowsAny(() => Decrypt(rsa, encrypted, RSAEncryptionPadding.Pkcs1)); -- } -- } -- - [Fact] - public void Decrypt_Pkcs1_BadPadding() - { @@ -726,23 +715,5 @@ public static IEnumerable OaepPaddingModes } }