-
Notifications
You must be signed in to change notification settings - Fork 40
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Package Update Request] - libzip 1.10.1 #506
Comments
Are there specific features or bug fixes in the newer version that you're looking for? We are careful around version updates and compatibility, so we want to make sure we're looking at an update for good reasons. |
Yes, the version of libzip here I assume is built against openssl 1, rather than openssl 3, and there are various other bug fixes that are useful to us. What's the blocker for grabbing the latest version? |
We don't ship OpenSSL 1.x at all on AL2023, it's all OpenSSL 3, so it won't be OpenSSL related. There may not be a blocker, but compatibility for existing workloads is something we have to consider, as well as if there are broader communities coalescing around a specific version for an extended period of support (which means we can share security backports). The question was aimed at being input to determine where looking at this should sit on a priority list. The list is roughly sorted by: security fix, migration blocker, adoption blocker, nice to have. |
Is the version of libzip you have built without any encryption support, then? That could be a blocker for bref, in that case. |
The version we ship is what was in Fedora 34, and incidentally seems to match what is in RHEL9. It was built against OpenSSL 3 and the build log shows that the encryption self-tests passed successfully. Is there anything specific that you are missing ? Bumping a library version is risky as it can introduce suble ABI breakage with software built against the earlier version unless we have a very high confidence that this specific library is extremely well maintained and avoids these common pitfalls. And even then, it means that software built against the newer version might not be deployable on systems running the earlier one which in the context of a distribution like ours could be problematic for our customers and ISVs. So we would need a VERY GOOD reason to bump it before AL2023 at this stage. |
Note: If there are specific bug fixes you are after, we can consider backporting them individually. |
In this case for example:
That is a LOT of change to very carefully audit |
Would you consider the bump in 2023.3? |
2023.3 would be where we consider making the change that we're pretty sure is safe. |
Will Lambda give a choice of 2023.2 or 2023.3 as the base image, when the time comes? |
We aren't even considering updating it at this point. You haven't responded about which specific features or issues you have with the version we are shipping and we don't really have the bandwidth to do the full analysis of all the changes that went in between those two versions. What we ship today is built against openssl 3 and has crypto enabled (and passes the crypto test as part of the build-time self-test of libzip). |
There are lots of important changes that are useful, such as handling 4GB files, fixes to |
What package is missing from Amazon Linux 2023? Please describe and include package name.
libzip 1.10.1
Is this an update to existing package or new package request?
Update. Current version is very old.
Is this package available in Amazon Linux 2? If it is available via external sources such as EPEL, please specify.
N/A
Any additional information you'd like to include. (use-cases, etc)
Needed by bref: brefphp/aws-lambda-layers#122 (comment).
The text was updated successfully, but these errors were encountered: