Hello community,

here is the log from the commit of package wget for openSUSE:Factory checked in 
at 2013-05-03 13:52:48
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/wget (Old)
 and      /work/SRC/openSUSE:Factory/.wget.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "wget"

Changes:
--------
--- /work/SRC/openSUSE:Factory/wget/wget.changes        2013-05-03 
07:40:54.000000000 +0200
+++ /work/SRC/openSUSE:Factory/.wget.new/wget.changes   2013-05-03 
13:52:50.000000000 +0200
@@ -1,0 +2,24 @@
+Thu May  2 17:50:50 UTC 2013 - [email protected]
+
+- Update to version 1.14
+  + add support for content-on-error.  It allows to store the HTTP
+    payload on 4xx or 5xx errors.
+  + add support for WARC files.
+  + fix a memory leak problem in the GNU TLS backend.
+  + autoreconf works again for distributed tarballs.
+  + print some diagnostic messages to stderr not to stdout.
+  + report stdout close errors.
+  + accept the --report-speed option.
+  + enable client certificates when GNU TLS is used.
+  + add support for TLS Server Name Indication.
+  + accept the arguments --accept-reject and --reject-regex.
+  + the GNU TLS backend honors correctly the timeout value.
+  + add support for RFC 2617 Digest Access Authentication.
+- Drop patchs obsoleted by upstream
+  + wget-sni.patch
+  + wget-stdio.h.patch
+- Rebase patchs to work with upstream
+  + wget-openssl-no-intern.patch > wget-1.14-openssl-no-intern.patch
+  + wget-no-ssl-comp.patch > wget-1.14-no-ssl-comp.patch
+
+-------------------------------------------------------------------

Old:
----
  wget-1.13.4.tar.bz2
  wget-no-ssl-comp.patch
  wget-openssl-no-intern.patch
  wget-sni.patch
  wget-stdio.h.patch

New:
----
  wget-1.14-no-ssl-comp.patch
  wget-1.14-openssl-no-intern.patch
  wget-1.14.tar.xz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ wget.spec ++++++
--- /var/tmp/diff_new_pack.KzGonQ/_old  2013-05-03 13:52:52.000000000 +0200
+++ /var/tmp/diff_new_pack.KzGonQ/_new  2013-05-03 13:52:52.000000000 +0200
@@ -17,20 +17,18 @@
 
 
 Name:           wget
-Version:        1.13.4
+Version:        1.14
 Release:        0
 Summary:        A Tool for Mirroring FTP and HTTP Servers
 License:        GPL-3.0+
 Group:          Productivity/Networking/Web/Utilities
 Url:            http://www.gnu.org/software/wget/
-Source:         http://ftp.gnu.org/gnu/wget/%name-%version.tar.bz2
+Source:         http://ftp.gnu.org/gnu/wget/%name-%version.tar.xz
 Patch0:         wgetrc.patch
 # PATCH-FEATURE-UPSTREAM wget-libproxy.patch [email protected] -- Add 
libproxy support to wget
 Patch1:         wget-libproxy.patch
-Patch3:         wget-sni.patch
-Patch4:         wget-stdio.h.patch
-Patch5:         wget-openssl-no-intern.patch
-Patch6:         wget-no-ssl-comp.patch
+Patch5:         wget-1.14-openssl-no-intern.patch
+Patch6:         wget-1.14-no-ssl-comp.patch
 BuildRequires:  libpng-devel
 %if 0%{suse_version} > 1110
 BuildRequires:  libproxy-devel
@@ -40,6 +38,7 @@
 BuildRequires:  makeinfo
 BuildRequires:  openssl-devel
 BuildRequires:  pkg-config
+BuildRequires:  xz
 PreReq:         %install_info_prereq
 BuildRoot:      %{_tmppath}/%{name}-%{version}-build
 
@@ -53,8 +52,6 @@
 %if 0%{suse_version} > 1110
 %patch1
 %endif
-%patch3
-%patch4 -p1
 %patch5
 %patch6
 

++++++ wget-1.14-no-ssl-comp.patch ++++++
--- src/openssl.c.orig
+++ src/openssl.c
@@ -241,7 +241,9 @@
   /* The OpenSSL library can handle renegotiations automatically, so
      tell it to do so.  */
   SSL_CTX_set_mode (ssl_ctx, SSL_MODE_AUTO_RETRY);
-
+#ifdef SSL_OP_NO_COMPRESSION
+  SSL_CTX_set_options(ssl_ctx, SSL_OP_NO_COMPRESSION);
+#endif
   return true;
 
  error:
++++++ wget-1.14-openssl-no-intern.patch ++++++
--- src/openssl.c.orig
+++ src/openssl.c
@@ -29,6 +29,7 @@
 shall include the source code for the parts of OpenSSL used as well
 as that of the covered work.  */
 
+#define OPENSSL_NO_SSL_INTERN
 #include "wget.h"
 
 #include <assert.h>
@@ -425,7 +426,7 @@
   if (!SSL_set_fd (conn, FD_TO_SOCKET (fd)))
     goto error;
   SSL_set_connect_state (conn);
-  if (SSL_connect (conn) <= 0 || conn->state != SSL_ST_OK)
+  if (SSL_connect (conn) <= 0 || SSL_get_state(conn) != SSL_ST_OK)
     goto error;
 
   ctx = xnew0 (struct openssl_transport_context);
-- 
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to