Skip to content

Releases: apple/swift-nio

SwiftNIO 2.47.0

16 Jan 17:32
4ad2c37
Compare
Choose a tag to compare

SemVer Patch

  • Remove useless instance variables in the SelectableEventLoop (#2338, patch credit to @thomas-gill-0xff)
  • Repair the Windows build of NIOCore (#2339, patch credit to @compnerd)
  • Allow writing and reading empty datagrams (#2341, patch credit to @hashemi)
  • Prepare mmsghdr structure properly. (#2346, patch credit to @ser-0xff)
  • Implement remoteAddress0 and localAddress0 on EmbeddedChannel (#2345)

Other Changes

  • Fix main nightly CI (#2337)
  • 2023 is real, we should support it (#2342)
  • Avoid actually allocating a giant buffer (#2347)
  • Avoid integer literals that won't fit. (#2348)

SwiftNIO 2.46.0

20 Dec 15:19
7e3b50b
Compare
Choose a tag to compare

SemVer Minor

  • Add NIORawSocketBootstrap (#2320, #2317)
  • Make EventLoopFuture.wait() unavailable from async (#2331)
  • Add easier async to future conversion (#2334)

SemVer Patch

  • Cap read+pread POSIX read sizes at Int32.max (#2323)
  • Fix non Darwin/Linux builds (#2328)
  • Remove implicit ByteBuffer copy in copyMemory (#2330)

Other Changes

  • Remove _NIOBeta product (#2319)
  • Remove obsolete information from the README (#2321)
  • Add .spi.yml for Swift Package Index DocC support (#2324, #2329)
  • Measure allocations applying WS mask (#2333)
  • Improve performance of tests (#2336)

SwiftNIO 2.45.0

21 Nov 13:27
e855380
Compare
Choose a tag to compare

SemVer Minor

  • Add missing Sendable requirements (#2305)
  • Add NIOAsyncTestingChannel.waitForOut/InboundWrite() (#2307)
  • MPTCP support on Linux (#2308)
  • Make NIOHTTP1TestServer Sendable (#2318)

SemVer Patch

  • add witnesses for ByteBufferView.reserveCapacity(_:), append(_:), and append(contentsOf:) (#2309, patch credit to @Kelvin13)
  • Use #fileID/#filePath instead of #file (#2306)
  • Correctly include netinet/in.h (#2315)

Other Changes

  • Fix failing build on MacOS (#2313)
  • Fix testTaskCancel_whenStreaming_andNotSuspended flakiness (#2314)

SwiftNIO 2.44.0

02 Nov 11:58
edfceec
Compare
Choose a tag to compare

SemVer Minor

  • Add utilties for reading and writing UUIDs (#2045)
  • Implement additional file operation in NonBlockingFileIO (#2244)
  • Mark types explicitly non sendable (#2290)
  • Replace NIOSendable with Sendable (#2291)
  • Add create directory method (#2296)
  • Add support for removing channel options (#2297)
  • Move 5.7 beta APIs to NIOCore (#2300)
  • Make NIOWebSocketServerUpgrader Sendable (#2304)

SemVer Patch

  • Improve diagnostics for deprecated Lock. (#2285, patch credit to @ffried)
  • Add correct C directory function declarations for Android (#2302, patch credit to @buttaface)
  • Don't unconditionally remove the HTTPServerUpgradeHandler (#2303)

Other Changes

  • Improve NIOAsyncSequenceProducer docs (#2287)
  • Fix Nightly Build to work with new Swift versions (#2288)
  • Remove #if compiler(>=5.5) (#2292)
  • Clarify version support in README (#2293)
  • Add benchmarks for NIOAsyncWriter and NIOAsyncSequenceProducer (#2301)

SwiftNIO 2.42.1

13 Oct 10:17
110992e
Compare
Choose a tag to compare

SemVer Patch

  • Correctly manage Content-Length on HEAD responses (#2289)

SwiftNIO 2.43.1

07 Oct 10:48
bc4c55b
Compare
Choose a tag to compare

SemVer Patch

  • Ensure fatalError for the NIOAsyncSequenceProducer when finished (#2282)
  • Get NIO compiling with GM Xcode (#2284)

SwiftNIO 2.43.0

06 Oct 12:22
cdeffe8
Compare
Choose a tag to compare

SemVer Minor

  • Add withLockVoid(_:) to NIOLock (#2276, patch credit to @MahdiBM)
  • Raise minimum supported Swift version from 5.4 to 5.5 (#2267)

SemVer Patch

  • Fixed compile errors on windows (#2278, patch credit to @toluRV)
  • Correctly manage Content-Length on HEAD responses (#2277)

Other Changes

  • Remove wrong comment about performance (#2281)
  • Update allocation limits (#2272)
  • Move ISSUE_TEMPLATE.md to ISSUE_TEMPLATE/bug-report.md (#2273)

SwiftNIO 2.42.0

27 Sep 12:18
a16e2f5
Compare
Choose a tag to compare

Security

  • This update fixes CVE-2022-3215: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting') . For more details please see the security advisory. Please update to 2.42.0 as rapidly as possible.

SemVer Minor

  • Implement a back-pressure aware AsyncSequence source (#2230)
  • Add throwing version of NIOAsyncSequenceProducer (#2237)
  • Conform NIOTooManyBytesError to Hashable (#2246)
  • Functions passed to non-Sendable ChannelHandlers do not need to conform to Sendable (#2249)
  • Implement a NIOAsyncWriter (#2251)
  • Add EventLoopFuture.makeCompletedFuture(withResultOf:) (#2253)
  • HTTPResponseStatus should print code and reason (#2257)
  • Provide NIOAsyncTestingChannel (#2238)
  • NIOConcurrency: add NIOLockedValueBox (#2265)
  • rename class Lock to struct NIOLock (#2266)

SemVer Patch

  • Small changes for the NIOAsyncSequenceProducer (#2254)
  • Call finish once the Source is deinited (#2258)
  • Add availability requirements to NIOAsyncSequenceProducer extension (#2236)
  • Update HTTP parser to LLHTTP (#2263)
  • Add support for newer LLHTTP status codes (#2269)

Other Changes

  • Define Array element type explicitly to fix nightly CI (#2250)
  • Fix typo in the name of a constant (#2262, patch credit to @heldersrvio)
  • Fixup docs for the NIOAsyncWriter (#2271)
  • initial adoption of DocC based documentaiton (#2235)
  • Update soundness.sh (#2240)
  • Validate missing imports in CI (#2245)
  • Widen the tolerance on testSystemCallWrapperPerformance in debug mode (#2259)
  • helpful error message when compiling without test discovery on >= 5.5 (#2264)
  • address additional NIOLockedValueBox review comments (#2270)

SwiftNIO 2.39.1

27 Sep 12:24
d0f261d
Compare
Choose a tag to compare

Security

  • This update fixes CVE-2022-3215: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting') . For more details please see the security advisory. Please update to 2.42.0 if possible, otherwise update to 2.39.1 as rapidly as possible.

SwiftNIO 2.29.1

27 Sep 12:24
aa5be1d
Compare
Choose a tag to compare

Security

  • This update fixes CVE-2022-3215: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting') . For more details please see the security advisory. Please update to 2.42.0 if possible, otherwise update to 2.39.1, otherwise update to 2.29.1 as rapidly as possible.