Releases: apple/swift-nio
Releases · apple/swift-nio
SwiftNIO 2.47.0
SemVer Patch
- Remove useless instance variables in the SelectableEventLoop (#2338, patch credit to @thomas-gill-0xff)
- Repair the Windows build of NIOCore (#2339, patch credit to @compnerd)
- Allow writing and reading empty datagrams (#2341, patch credit to @hashemi)
- Prepare mmsghdr structure properly. (#2346, patch credit to @ser-0xff)
- Implement
remoteAddress0
andlocalAddress0
onEmbeddedChannel
(#2345)
Other Changes
SwiftNIO 2.46.0
SemVer Minor
- Add
NIORawSocketBootstrap
(#2320, #2317) - Make EventLoopFuture.wait() unavailable from async (#2331)
- Add easier async to future conversion (#2334)
SemVer Patch
- Cap read+pread POSIX read sizes at Int32.max (#2323)
- Fix non Darwin/Linux builds (#2328)
- Remove implicit ByteBuffer copy in copyMemory (#2330)
Other Changes
SwiftNIO 2.45.0
SemVer Minor
- Add missing
Sendable
requirements (#2305) - Add
NIOAsyncTestingChannel.waitForOut/InboundWrite()
(#2307) - MPTCP support on Linux (#2308)
- Make
NIOHTTP1TestServer
Sendable (#2318)
SemVer Patch
- add witnesses for
ByteBufferView.reserveCapacity(_:)
,append(_:)
, andappend(contentsOf:)
(#2309, patch credit to @Kelvin13) - Use
#fileID
/#filePath
instead of#file
(#2306) - Correctly include netinet/in.h (#2315)
Other Changes
SwiftNIO 2.44.0
SemVer Minor
- Add utilties for reading and writing UUIDs (#2045)
- Implement additional file operation in NonBlockingFileIO (#2244)
- Mark types explicitly non sendable (#2290)
- Replace
NIOSendable
withSendable
(#2291) - Add create directory method (#2296)
- Add support for removing channel options (#2297)
- Move 5.7 beta APIs to NIOCore (#2300)
- Make
NIOWebSocketServerUpgrader
Sendable
(#2304)
SemVer Patch
- Improve diagnostics for deprecated
Lock
. (#2285, patch credit to @ffried) - Add correct C directory function declarations for Android (#2302, patch credit to @buttaface)
- Don't unconditionally remove the HTTPServerUpgradeHandler (#2303)
Other Changes
SwiftNIO 2.42.1
SemVer Patch
- Correctly manage Content-Length on HEAD responses (#2289)
SwiftNIO 2.43.1
SwiftNIO 2.43.0
SwiftNIO 2.42.0
Security
- This update fixes CVE-2022-3215: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting') . For more details please see the security advisory. Please update to 2.42.0 as rapidly as possible.
SemVer Minor
- Implement a back-pressure aware
AsyncSequence
source (#2230) - Add throwing version of
NIOAsyncSequenceProducer
(#2237) - Conform
NIOTooManyBytesError
toHashable
(#2246) - Functions passed to non-
Sendable
ChannelHandler
s do not need to conform toSendable
(#2249) - Implement a
NIOAsyncWriter
(#2251) - Add EventLoopFuture.makeCompletedFuture(withResultOf:) (#2253)
- HTTPResponseStatus should print code and reason (#2257)
- Provide NIOAsyncTestingChannel (#2238)
- NIOConcurrency: add NIOLockedValueBox (#2265)
- rename class Lock to struct NIOLock (#2266)
SemVer Patch
- Small changes for the
NIOAsyncSequenceProducer
(#2254) - Call finish once the Source is deinited (#2258)
- Add availability requirements to NIOAsyncSequenceProducer extension (#2236)
- Update HTTP parser to LLHTTP (#2263)
- Add support for newer LLHTTP status codes (#2269)
Other Changes
- Define
Array
element type explicitly to fix nightly CI (#2250) - Fix typo in the name of a constant (#2262, patch credit to @heldersrvio)
- Fixup docs for the
NIOAsyncWriter
(#2271) - initial adoption of DocC based documentaiton (#2235)
- Update soundness.sh (#2240)
- Validate missing imports in CI (#2245)
- Widen the tolerance on testSystemCallWrapperPerformance in debug mode (#2259)
- helpful error message when compiling without test discovery on >= 5.5 (#2264)
- address additional NIOLockedValueBox review comments (#2270)
SwiftNIO 2.39.1
Security
- This update fixes CVE-2022-3215: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting') . For more details please see the security advisory. Please update to 2.42.0 if possible, otherwise update to 2.39.1 as rapidly as possible.
SwiftNIO 2.29.1
Security
- This update fixes CVE-2022-3215: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting') . For more details please see the security advisory. Please update to 2.42.0 if possible, otherwise update to 2.39.1, otherwise update to 2.29.1 as rapidly as possible.