Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package ghc-crypton-connection for 
openSUSE:Factory checked in at 2024-12-20 23:10:29
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/ghc-crypton-connection (Old)
 and      /work/SRC/openSUSE:Factory/.ghc-crypton-connection.new.1881 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "ghc-crypton-connection"

Fri Dec 20 23:10:29 2024 rev:4 rq:1231433 version:0.4.3

Changes:
--------
--- 
/work/SRC/openSUSE:Factory/ghc-crypton-connection/ghc-crypton-connection.changes
    2024-07-22 17:17:01.778950396 +0200
+++ 
/work/SRC/openSUSE:Factory/.ghc-crypton-connection.new.1881/ghc-crypton-connection.changes
  2024-12-20 23:10:49.744988933 +0100
@@ -1,0 +2,28 @@
+Fri Dec  6 05:38:35 UTC 2024 - Peter Simons <[email protected]>
+
+- Update crypton-connection to version 0.4.3.
+  ## Version 0.4.3
+
+  * Creating the `Internal` module and export the `ConnectionContext` 
constructor.
+    [#7](https://github.com/kazu-yamamoto/crypton-connection/pull/7)
+
+-------------------------------------------------------------------
+Wed Nov  6 07:45:44 UTC 2024 - Peter Simons <[email protected]>
+
+- Update crypton-connection to version 0.4.2.
+  # CHANGELOG
+
+  ## Version 0.4.2
+
+  * Using data-default.
+
+  ## Version 0.4.1
+
+  * Preparing for tls v2.1
+
+  ## Version 0.4.0
+
+  * Add support for overriding the TLS clientSupported member in 
TLSSettingsSimple
+    [#3](https://github.com/kazu-yamamoto/crypton-connection/pull/3)
+
+-------------------------------------------------------------------

Old:
----
  crypton-connection-0.3.2.tar.gz
  crypton-connection.cabal

New:
----
  crypton-connection-0.4.3.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ ghc-crypton-connection.spec ++++++
--- /var/tmp/diff_new_pack.IZ2QJL/_old  2024-12-20 23:10:50.677027319 +0100
+++ /var/tmp/diff_new_pack.IZ2QJL/_new  2024-12-20 23:10:50.677027319 +0100
@@ -19,13 +19,12 @@
 %global pkg_name crypton-connection
 %global pkgver %{pkg_name}-%{version}
 Name:           ghc-%{pkg_name}
-Version:        0.3.2
+Version:        0.4.3
 Release:        0
-Summary:        Simple and easy network connections API
+Summary:        Simple and easy network connection API
 License:        BSD-3-Clause
 URL:            https://hackage.haskell.org/package/%{pkg_name}
 Source0:        
https://hackage.haskell.org/package/%{pkg_name}-%{version}/%{pkg_name}-%{version}.tar.gz
-Source1:        
https://hackage.haskell.org/package/%{pkg_name}-%{version}/revision/1.cabal#/%{pkg_name}.cabal
 BuildRequires:  ghc-Cabal-devel
 BuildRequires:  ghc-base-devel
 BuildRequires:  ghc-base-prof
@@ -43,8 +42,8 @@
 BuildRequires:  ghc-crypton-x509-system-prof
 BuildRequires:  ghc-crypton-x509-validation-devel
 BuildRequires:  ghc-crypton-x509-validation-prof
-BuildRequires:  ghc-data-default-class-devel
-BuildRequires:  ghc-data-default-class-prof
+BuildRequires:  ghc-data-default-devel
+BuildRequires:  ghc-data-default-prof
 BuildRequires:  ghc-network-devel
 BuildRequires:  ghc-network-prof
 BuildRequires:  ghc-rpm-macros
@@ -55,7 +54,7 @@
 ExcludeArch:    %{ix86}
 
 %description
-Simple network library for all your connection need.
+Simple network library for all your connection needs.
 
 Features: Really simple to use, SSL/TLS, SOCKS.
 
@@ -91,7 +90,6 @@
 
 %prep
 %autosetup -n %{pkg_name}-%{version}
-cp -p %{SOURCE1} %{pkg_name}.cabal
 
 %build
 %ghc_lib_build

++++++ crypton-connection-0.3.2.tar.gz -> crypton-connection-0.4.3.tar.gz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/crypton-connection-0.3.2/CHANGELOG.md 
new/crypton-connection-0.4.3/CHANGELOG.md
--- old/crypton-connection-0.3.2/CHANGELOG.md   2001-09-09 03:46:40.000000000 
+0200
+++ new/crypton-connection-0.4.3/CHANGELOG.md   2001-09-09 03:46:40.000000000 
+0200
@@ -1,3 +1,23 @@
+# CHANGELOG
+
+## Version 0.4.3
+
+* Creating the `Internal` module and export the `ConnectionContext` 
constructor.
+  [#7](https://github.com/kazu-yamamoto/crypton-connection/pull/7)
+
+## Version 0.4.2
+
+* Using data-default.
+
+## Version 0.4.1
+
+* Preparing for tls v2.1
+
+## Version 0.4.0
+
+* Add support for overriding the TLS clientSupported member in 
TLSSettingsSimple
+  [#3](https://github.com/kazu-yamamoto/crypton-connection/pull/3)
+
 ## Version 0.3.2
 
 * Supporting tls v2.0.0.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/crypton-connection-0.3.2/Network/Connection/Internal.hs 
new/crypton-connection-0.4.3/Network/Connection/Internal.hs
--- old/crypton-connection-0.3.2/Network/Connection/Internal.hs 1970-01-01 
01:00:00.000000000 +0100
+++ new/crypton-connection-0.4.3/Network/Connection/Internal.hs 2001-09-09 
03:46:40.000000000 +0200
@@ -0,0 +1,6 @@
+module Network.Connection.Internal
+    ( ConnectionContext (..)
+    )
+where
+
+import Network.Connection.Types (ConnectionContext (..))
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/crypton-connection-0.3.2/Network/Connection/Types.hs 
new/crypton-connection-0.4.3/Network/Connection/Types.hs
--- old/crypton-connection-0.3.2/Network/Connection/Types.hs    2001-09-09 
03:46:40.000000000 +0200
+++ new/crypton-connection-0.4.3/Network/Connection/Types.hs    2001-09-09 
03:46:40.000000000 +0200
@@ -6,26 +6,26 @@
 -- Portability : portable
 --
 -- connection types
---
 module Network.Connection.Types
-    where
+where
 
 import Control.Concurrent.MVar (MVar)
 
-import Data.Default.Class
-import Data.X509.CertificateStore
 import Data.ByteString (ByteString)
+import Data.Default
+import Data.X509.CertificateStore
 
 import Network.Socket (PortNumber, Socket)
 import qualified Network.TLS as TLS
+import qualified Network.TLS.Extra as TLS
 
 import System.IO (Handle)
 
 -- | Simple backend enumeration, either using a raw connection or a tls 
connection.
-data ConnectionBackend = ConnectionStream Handle
-                       | ConnectionSocket Socket
-                       | ConnectionTLS TLS.Context
-
+data ConnectionBackend
+    = ConnectionStream Handle
+    | ConnectionSocket Socket
+    | ConnectionTLS TLS.Context
 
 -- | Hostname This could either be a name string (punycode encoded) or an 
ipv4/ipv6
 type HostName = String
@@ -40,10 +40,14 @@
 -- If you need to connect through a SOCKS, you should make sure
 -- connectionUseSocks is correctly set.
 data ConnectionParams = ConnectionParams
-    { connectionHostname   :: HostName           -- ^ host name to connect to.
-    , connectionPort       :: PortNumber         -- ^ port number to connect 
to.
-    , connectionUseSecure  :: Maybe TLSSettings  -- ^ optional TLS parameters.
-    , connectionUseSocks   :: Maybe ProxySettings -- ^ optional Proxy/Socks 
configuration.
+    { connectionHostname :: HostName
+    -- ^ host name to connect to.
+    , connectionPort :: PortNumber
+    -- ^ port number to connect to.
+    , connectionUseSecure :: Maybe TLSSettings
+    -- ^ optional TLS parameters.
+    , connectionUseSocks :: Maybe ProxySettings
+    -- ^ optional Proxy/Socks configuration.
     }
 
 -- | Proxy settings for the connection.
@@ -54,8 +58,8 @@
 --
 -- That's for now the only settings in the SOCKS package,
 -- socks password, or any sort of other authentications is not yet implemented.
-data ProxySettings =
-      SockSettingsSimple HostName PortNumber
+data ProxySettings
+    = SockSettingsSimple HostName PortNumber
     | SockSettingsEnvironment (Maybe String)
     | OtherProxy HostName PortNumber
 
@@ -68,27 +72,43 @@
 -- simple settings, you should use TLSSettingsSimple.
 data TLSSettings
     = TLSSettingsSimple
-             { settingDisableCertificateValidation :: Bool -- ^ Disable 
certificate verification completely,
-                                                           --   this make 
TLS/SSL vulnerable to a MITM attack.
-                                                           --   not 
recommended to use, but for testing.
-             , settingDisableSession               :: Bool -- ^ Disable 
session management. TLS/SSL connections
-                                                           --   will always 
re-established their context.
-                                                           --   Not 
Implemented Yet.
-             , settingUseServerName                :: Bool -- ^ Use server 
name extension. Not Implemented Yet.
-             } -- ^ Simple TLS settings. recommended to use.
-    | TLSSettings TLS.ClientParams -- ^ full blown TLS Settings directly using 
TLS.Params. for power users.
+        { settingDisableCertificateValidation :: Bool
+        -- ^ Disable certificate verification completely,
+        --   this make TLS/SSL vulnerable to a MITM attack.
+        --   not recommended to use, but for testing.
+        , settingDisableSession :: Bool
+        -- ^ Disable session management. TLS/SSL connections
+        --   will always re-established their context.
+        --   Not Implemented Yet.
+        , settingUseServerName :: Bool
+        -- ^ Use server name extension. Not Implemented Yet.
+        , settingClientSupported :: TLS.Supported
+        -- ^ Used for the 'TLS.clientSupported'
+        --   member of 'TLS.ClientParams'.
+        }
+    | -- \^ Simple TLS settings. recommended to use.
+
+      -- | full blown TLS Settings directly using TLS.Params. for power users.
+      TLSSettings TLS.ClientParams
     deriving (Show)
 
 instance Default TLSSettings where
-    def = TLSSettingsSimple False False False
+    def =
+        TLSSettingsSimple
+            False
+            False
+            False
+            def{TLS.supportedCiphers = TLS.ciphersuite_default}
 
 type ConnectionID = (HostName, PortNumber)
 
 -- | This opaque type represent a connection to a destination.
 data Connection = Connection
     { connectionBackend :: MVar ConnectionBackend
-    , connectionBuffer  :: MVar (Maybe ByteString) -- ^ this is set to 
'Nothing' on EOF
-    , connectionID      :: ConnectionID  -- ^ return a simple tuple of the 
port and hostname that we're connected to.
+    , connectionBuffer :: MVar (Maybe ByteString)
+    -- ^ this is set to 'Nothing' on EOF
+    , connectionID :: ConnectionID
+    -- ^ return a simple tuple of the port and hostname that we're connected 
to.
     }
 
 -- | Shared values (certificate store, sessions, ..) between connections
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/crypton-connection-0.3.2/Network/Connection.hs 
new/crypton-connection-0.4.3/Network/Connection.hs
--- old/crypton-connection-0.3.2/Network/Connection.hs  2001-09-09 
03:46:40.000000000 +0200
+++ new/crypton-connection-0.4.3/Network/Connection.hs  2001-09-09 
03:46:40.000000000 +0200
@@ -57,7 +57,6 @@
 import qualified System.IO.Error as E (mkIOError, eofErrorType)
 
 import qualified Network.TLS as TLS
-import qualified Network.TLS.Extra as TLS
 
 import System.X509 (getSystemCertificateStore)
 
@@ -66,7 +65,7 @@
 import qualified Network.Socket.ByteString as N
 
 import Data.Tuple (swap)
-import Data.Default.Class
+import Data.Default
 import Data.Data
 import Data.ByteString (ByteString)
 import qualified Data.ByteString as B
@@ -97,7 +96,7 @@
 instance E.Exception HostCannotConnect
 
 connectionSessionManager :: Manager -> TLS.SessionManager
-connectionSessionManager mvar = TLS.SessionManager
+connectionSessionManager mvar = TLS.noSessionManager
     { TLS.sessionResume     = \sessionID -> withMVar mvar (return . M.lookup 
sessionID)
     , TLS.sessionEstablish  = \sessionID sessionData ->
                                modifyMVar_ mvar (return . M.insert sessionID 
sessionData)
@@ -123,7 +122,7 @@
 makeTLSParams :: ConnectionContext -> ConnectionID -> TLSSettings -> 
TLS.ClientParams
 makeTLSParams cg cid ts@(TLSSettingsSimple {}) =
     (TLS.defaultParamsClient (fst cid) portString)
-        { TLS.clientSupported = def { TLS.supportedCiphers = 
TLS.ciphersuite_default }
+        { TLS.clientSupported = settingClientSupported ts
         , TLS.clientShared    = def
             { TLS.sharedCAStore         = globalCertificateStore cg
             , TLS.sharedValidationCache = validationCache
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/crypton-connection-0.3.2/Setup.hs 
new/crypton-connection-0.4.3/Setup.hs
--- old/crypton-connection-0.3.2/Setup.hs       2001-09-09 03:46:40.000000000 
+0200
+++ new/crypton-connection-0.4.3/Setup.hs       2001-09-09 03:46:40.000000000 
+0200
@@ -1,2 +1,3 @@
 import Distribution.Simple
+
 main = defaultMain
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/crypton-connection-0.3.2/crypton-connection.cabal 
new/crypton-connection-0.4.3/crypton-connection.cabal
--- old/crypton-connection-0.3.2/crypton-connection.cabal       2001-09-09 
03:46:40.000000000 +0200
+++ new/crypton-connection-0.4.3/crypton-connection.cabal       2001-09-09 
03:46:40.000000000 +0200
@@ -1,7 +1,7 @@
 Name:                crypton-connection
-Version:             0.3.2
+Version:             0.4.3
 Description:
-    Simple network library for all your connection need.
+    Simple network library for all your connection needs.
     .
     Features: Really simple to use, SSL/TLS, SOCKS.
     .
@@ -12,7 +12,7 @@
 Copyright:           Vincent Hanquez <[email protected]>
 Author:              Vincent Hanquez <[email protected]>
 Maintainer:          Kazu Yamamoto <[email protected]>
-Synopsis:            Simple and easy network connections API
+Synopsis:            Simple and easy network connection API
 Build-Type:          Simple
 Category:            Network
 stability:           experimental
@@ -27,15 +27,16 @@
                    , basement
                    , bytestring
                    , containers
-                   , data-default-class
+                   , data-default
                    , network >= 2.6.3
-                   , tls >= 1.7
+                   , tls >= 1.7 && < 2.2
                    , socks >= 0.6
                    , crypton-x509 >= 1.5
                    , crypton-x509-store >= 1.5
                    , crypton-x509-system >= 1.5
                    , crypton-x509-validation >= 1.5
   Exposed-modules:   Network.Connection
+                     Network.Connection.Internal
   Other-modules:     Network.Connection.Types
   ghc-options:       -Wall
 

Reply via email to