Script 'mail_helper' called by obssrc
Hello community,
here is the log from the commit of package ghc-crypton-connection for
openSUSE:Factory checked in at 2024-12-20 23:10:29
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/ghc-crypton-connection (Old)
and /work/SRC/openSUSE:Factory/.ghc-crypton-connection.new.1881 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "ghc-crypton-connection"
Fri Dec 20 23:10:29 2024 rev:4 rq:1231433 version:0.4.3
Changes:
--------
---
/work/SRC/openSUSE:Factory/ghc-crypton-connection/ghc-crypton-connection.changes
2024-07-22 17:17:01.778950396 +0200
+++
/work/SRC/openSUSE:Factory/.ghc-crypton-connection.new.1881/ghc-crypton-connection.changes
2024-12-20 23:10:49.744988933 +0100
@@ -1,0 +2,28 @@
+Fri Dec 6 05:38:35 UTC 2024 - Peter Simons <[email protected]>
+
+- Update crypton-connection to version 0.4.3.
+ ## Version 0.4.3
+
+ * Creating the `Internal` module and export the `ConnectionContext`
constructor.
+ [#7](https://github.com/kazu-yamamoto/crypton-connection/pull/7)
+
+-------------------------------------------------------------------
+Wed Nov 6 07:45:44 UTC 2024 - Peter Simons <[email protected]>
+
+- Update crypton-connection to version 0.4.2.
+ # CHANGELOG
+
+ ## Version 0.4.2
+
+ * Using data-default.
+
+ ## Version 0.4.1
+
+ * Preparing for tls v2.1
+
+ ## Version 0.4.0
+
+ * Add support for overriding the TLS clientSupported member in
TLSSettingsSimple
+ [#3](https://github.com/kazu-yamamoto/crypton-connection/pull/3)
+
+-------------------------------------------------------------------
Old:
----
crypton-connection-0.3.2.tar.gz
crypton-connection.cabal
New:
----
crypton-connection-0.4.3.tar.gz
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ ghc-crypton-connection.spec ++++++
--- /var/tmp/diff_new_pack.IZ2QJL/_old 2024-12-20 23:10:50.677027319 +0100
+++ /var/tmp/diff_new_pack.IZ2QJL/_new 2024-12-20 23:10:50.677027319 +0100
@@ -19,13 +19,12 @@
%global pkg_name crypton-connection
%global pkgver %{pkg_name}-%{version}
Name: ghc-%{pkg_name}
-Version: 0.3.2
+Version: 0.4.3
Release: 0
-Summary: Simple and easy network connections API
+Summary: Simple and easy network connection API
License: BSD-3-Clause
URL: https://hackage.haskell.org/package/%{pkg_name}
Source0:
https://hackage.haskell.org/package/%{pkg_name}-%{version}/%{pkg_name}-%{version}.tar.gz
-Source1:
https://hackage.haskell.org/package/%{pkg_name}-%{version}/revision/1.cabal#/%{pkg_name}.cabal
BuildRequires: ghc-Cabal-devel
BuildRequires: ghc-base-devel
BuildRequires: ghc-base-prof
@@ -43,8 +42,8 @@
BuildRequires: ghc-crypton-x509-system-prof
BuildRequires: ghc-crypton-x509-validation-devel
BuildRequires: ghc-crypton-x509-validation-prof
-BuildRequires: ghc-data-default-class-devel
-BuildRequires: ghc-data-default-class-prof
+BuildRequires: ghc-data-default-devel
+BuildRequires: ghc-data-default-prof
BuildRequires: ghc-network-devel
BuildRequires: ghc-network-prof
BuildRequires: ghc-rpm-macros
@@ -55,7 +54,7 @@
ExcludeArch: %{ix86}
%description
-Simple network library for all your connection need.
+Simple network library for all your connection needs.
Features: Really simple to use, SSL/TLS, SOCKS.
@@ -91,7 +90,6 @@
%prep
%autosetup -n %{pkg_name}-%{version}
-cp -p %{SOURCE1} %{pkg_name}.cabal
%build
%ghc_lib_build
++++++ crypton-connection-0.3.2.tar.gz -> crypton-connection-0.4.3.tar.gz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/crypton-connection-0.3.2/CHANGELOG.md
new/crypton-connection-0.4.3/CHANGELOG.md
--- old/crypton-connection-0.3.2/CHANGELOG.md 2001-09-09 03:46:40.000000000
+0200
+++ new/crypton-connection-0.4.3/CHANGELOG.md 2001-09-09 03:46:40.000000000
+0200
@@ -1,3 +1,23 @@
+# CHANGELOG
+
+## Version 0.4.3
+
+* Creating the `Internal` module and export the `ConnectionContext`
constructor.
+ [#7](https://github.com/kazu-yamamoto/crypton-connection/pull/7)
+
+## Version 0.4.2
+
+* Using data-default.
+
+## Version 0.4.1
+
+* Preparing for tls v2.1
+
+## Version 0.4.0
+
+* Add support for overriding the TLS clientSupported member in
TLSSettingsSimple
+ [#3](https://github.com/kazu-yamamoto/crypton-connection/pull/3)
+
## Version 0.3.2
* Supporting tls v2.0.0.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/crypton-connection-0.3.2/Network/Connection/Internal.hs
new/crypton-connection-0.4.3/Network/Connection/Internal.hs
--- old/crypton-connection-0.3.2/Network/Connection/Internal.hs 1970-01-01
01:00:00.000000000 +0100
+++ new/crypton-connection-0.4.3/Network/Connection/Internal.hs 2001-09-09
03:46:40.000000000 +0200
@@ -0,0 +1,6 @@
+module Network.Connection.Internal
+ ( ConnectionContext (..)
+ )
+where
+
+import Network.Connection.Types (ConnectionContext (..))
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/crypton-connection-0.3.2/Network/Connection/Types.hs
new/crypton-connection-0.4.3/Network/Connection/Types.hs
--- old/crypton-connection-0.3.2/Network/Connection/Types.hs 2001-09-09
03:46:40.000000000 +0200
+++ new/crypton-connection-0.4.3/Network/Connection/Types.hs 2001-09-09
03:46:40.000000000 +0200
@@ -6,26 +6,26 @@
-- Portability : portable
--
-- connection types
---
module Network.Connection.Types
- where
+where
import Control.Concurrent.MVar (MVar)
-import Data.Default.Class
-import Data.X509.CertificateStore
import Data.ByteString (ByteString)
+import Data.Default
+import Data.X509.CertificateStore
import Network.Socket (PortNumber, Socket)
import qualified Network.TLS as TLS
+import qualified Network.TLS.Extra as TLS
import System.IO (Handle)
-- | Simple backend enumeration, either using a raw connection or a tls
connection.
-data ConnectionBackend = ConnectionStream Handle
- | ConnectionSocket Socket
- | ConnectionTLS TLS.Context
-
+data ConnectionBackend
+ = ConnectionStream Handle
+ | ConnectionSocket Socket
+ | ConnectionTLS TLS.Context
-- | Hostname This could either be a name string (punycode encoded) or an
ipv4/ipv6
type HostName = String
@@ -40,10 +40,14 @@
-- If you need to connect through a SOCKS, you should make sure
-- connectionUseSocks is correctly set.
data ConnectionParams = ConnectionParams
- { connectionHostname :: HostName -- ^ host name to connect to.
- , connectionPort :: PortNumber -- ^ port number to connect
to.
- , connectionUseSecure :: Maybe TLSSettings -- ^ optional TLS parameters.
- , connectionUseSocks :: Maybe ProxySettings -- ^ optional Proxy/Socks
configuration.
+ { connectionHostname :: HostName
+ -- ^ host name to connect to.
+ , connectionPort :: PortNumber
+ -- ^ port number to connect to.
+ , connectionUseSecure :: Maybe TLSSettings
+ -- ^ optional TLS parameters.
+ , connectionUseSocks :: Maybe ProxySettings
+ -- ^ optional Proxy/Socks configuration.
}
-- | Proxy settings for the connection.
@@ -54,8 +58,8 @@
--
-- That's for now the only settings in the SOCKS package,
-- socks password, or any sort of other authentications is not yet implemented.
-data ProxySettings =
- SockSettingsSimple HostName PortNumber
+data ProxySettings
+ = SockSettingsSimple HostName PortNumber
| SockSettingsEnvironment (Maybe String)
| OtherProxy HostName PortNumber
@@ -68,27 +72,43 @@
-- simple settings, you should use TLSSettingsSimple.
data TLSSettings
= TLSSettingsSimple
- { settingDisableCertificateValidation :: Bool -- ^ Disable
certificate verification completely,
- -- this make
TLS/SSL vulnerable to a MITM attack.
- -- not
recommended to use, but for testing.
- , settingDisableSession :: Bool -- ^ Disable
session management. TLS/SSL connections
- -- will always
re-established their context.
- -- Not
Implemented Yet.
- , settingUseServerName :: Bool -- ^ Use server
name extension. Not Implemented Yet.
- } -- ^ Simple TLS settings. recommended to use.
- | TLSSettings TLS.ClientParams -- ^ full blown TLS Settings directly using
TLS.Params. for power users.
+ { settingDisableCertificateValidation :: Bool
+ -- ^ Disable certificate verification completely,
+ -- this make TLS/SSL vulnerable to a MITM attack.
+ -- not recommended to use, but for testing.
+ , settingDisableSession :: Bool
+ -- ^ Disable session management. TLS/SSL connections
+ -- will always re-established their context.
+ -- Not Implemented Yet.
+ , settingUseServerName :: Bool
+ -- ^ Use server name extension. Not Implemented Yet.
+ , settingClientSupported :: TLS.Supported
+ -- ^ Used for the 'TLS.clientSupported'
+ -- member of 'TLS.ClientParams'.
+ }
+ | -- \^ Simple TLS settings. recommended to use.
+
+ -- | full blown TLS Settings directly using TLS.Params. for power users.
+ TLSSettings TLS.ClientParams
deriving (Show)
instance Default TLSSettings where
- def = TLSSettingsSimple False False False
+ def =
+ TLSSettingsSimple
+ False
+ False
+ False
+ def{TLS.supportedCiphers = TLS.ciphersuite_default}
type ConnectionID = (HostName, PortNumber)
-- | This opaque type represent a connection to a destination.
data Connection = Connection
{ connectionBackend :: MVar ConnectionBackend
- , connectionBuffer :: MVar (Maybe ByteString) -- ^ this is set to
'Nothing' on EOF
- , connectionID :: ConnectionID -- ^ return a simple tuple of the
port and hostname that we're connected to.
+ , connectionBuffer :: MVar (Maybe ByteString)
+ -- ^ this is set to 'Nothing' on EOF
+ , connectionID :: ConnectionID
+ -- ^ return a simple tuple of the port and hostname that we're connected
to.
}
-- | Shared values (certificate store, sessions, ..) between connections
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/crypton-connection-0.3.2/Network/Connection.hs
new/crypton-connection-0.4.3/Network/Connection.hs
--- old/crypton-connection-0.3.2/Network/Connection.hs 2001-09-09
03:46:40.000000000 +0200
+++ new/crypton-connection-0.4.3/Network/Connection.hs 2001-09-09
03:46:40.000000000 +0200
@@ -57,7 +57,6 @@
import qualified System.IO.Error as E (mkIOError, eofErrorType)
import qualified Network.TLS as TLS
-import qualified Network.TLS.Extra as TLS
import System.X509 (getSystemCertificateStore)
@@ -66,7 +65,7 @@
import qualified Network.Socket.ByteString as N
import Data.Tuple (swap)
-import Data.Default.Class
+import Data.Default
import Data.Data
import Data.ByteString (ByteString)
import qualified Data.ByteString as B
@@ -97,7 +96,7 @@
instance E.Exception HostCannotConnect
connectionSessionManager :: Manager -> TLS.SessionManager
-connectionSessionManager mvar = TLS.SessionManager
+connectionSessionManager mvar = TLS.noSessionManager
{ TLS.sessionResume = \sessionID -> withMVar mvar (return . M.lookup
sessionID)
, TLS.sessionEstablish = \sessionID sessionData ->
modifyMVar_ mvar (return . M.insert sessionID
sessionData)
@@ -123,7 +122,7 @@
makeTLSParams :: ConnectionContext -> ConnectionID -> TLSSettings ->
TLS.ClientParams
makeTLSParams cg cid ts@(TLSSettingsSimple {}) =
(TLS.defaultParamsClient (fst cid) portString)
- { TLS.clientSupported = def { TLS.supportedCiphers =
TLS.ciphersuite_default }
+ { TLS.clientSupported = settingClientSupported ts
, TLS.clientShared = def
{ TLS.sharedCAStore = globalCertificateStore cg
, TLS.sharedValidationCache = validationCache
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/crypton-connection-0.3.2/Setup.hs
new/crypton-connection-0.4.3/Setup.hs
--- old/crypton-connection-0.3.2/Setup.hs 2001-09-09 03:46:40.000000000
+0200
+++ new/crypton-connection-0.4.3/Setup.hs 2001-09-09 03:46:40.000000000
+0200
@@ -1,2 +1,3 @@
import Distribution.Simple
+
main = defaultMain
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/crypton-connection-0.3.2/crypton-connection.cabal
new/crypton-connection-0.4.3/crypton-connection.cabal
--- old/crypton-connection-0.3.2/crypton-connection.cabal 2001-09-09
03:46:40.000000000 +0200
+++ new/crypton-connection-0.4.3/crypton-connection.cabal 2001-09-09
03:46:40.000000000 +0200
@@ -1,7 +1,7 @@
Name: crypton-connection
-Version: 0.3.2
+Version: 0.4.3
Description:
- Simple network library for all your connection need.
+ Simple network library for all your connection needs.
.
Features: Really simple to use, SSL/TLS, SOCKS.
.
@@ -12,7 +12,7 @@
Copyright: Vincent Hanquez <[email protected]>
Author: Vincent Hanquez <[email protected]>
Maintainer: Kazu Yamamoto <[email protected]>
-Synopsis: Simple and easy network connections API
+Synopsis: Simple and easy network connection API
Build-Type: Simple
Category: Network
stability: experimental
@@ -27,15 +27,16 @@
, basement
, bytestring
, containers
- , data-default-class
+ , data-default
, network >= 2.6.3
- , tls >= 1.7
+ , tls >= 1.7 && < 2.2
, socks >= 0.6
, crypton-x509 >= 1.5
, crypton-x509-store >= 1.5
, crypton-x509-system >= 1.5
, crypton-x509-validation >= 1.5
Exposed-modules: Network.Connection
+ Network.Connection.Internal
Other-modules: Network.Connection.Types
ghc-options: -Wall