Script 'mail_helper' called by obssrc
Hello community,
here is the log from the commit of package ghc-http-client-tls for
openSUSE:Factory checked in at 2022-02-11 23:09:11
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/ghc-http-client-tls (Old)
and /work/SRC/openSUSE:Factory/.ghc-http-client-tls.new.1956 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "ghc-http-client-tls"
Fri Feb 11 23:09:11 2022 rev:21 rq:953486 version:0.3.6
Changes:
--------
--- /work/SRC/openSUSE:Factory/ghc-http-client-tls/ghc-http-client-tls.changes
2020-12-22 11:41:00.429593868 +0100
+++
/work/SRC/openSUSE:Factory/.ghc-http-client-tls.new.1956/ghc-http-client-tls.changes
2022-02-11 23:11:06.199239909 +0100
@@ -1,0 +2,10 @@
+Fri Feb 4 14:24:47 UTC 2022 - Peter Simons <[email protected]>
+
+- Update http-client-tls to version 0.3.6.
+ # Changelog for http-client-tls
+
+ ## 0.3.6
+
+ * Allow making requests to raw IPv6 hosts
[#477](https://github.com/snoyberg/http-client/pull/477)
+
+-------------------------------------------------------------------
Old:
----
http-client-tls-0.3.5.3.tar.gz
http-client-tls.cabal
New:
----
http-client-tls-0.3.6.tar.gz
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ ghc-http-client-tls.spec ++++++
--- /var/tmp/diff_new_pack.4xab05/_old 2022-02-11 23:11:06.659241240 +0100
+++ /var/tmp/diff_new_pack.4xab05/_new 2022-02-11 23:11:06.663241251 +0100
@@ -1,7 +1,7 @@
#
# spec file for package ghc-http-client-tls
#
-# Copyright (c) 2020 SUSE LLC
+# Copyright (c) 2022 SUSE LLC
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
@@ -19,13 +19,12 @@
%global pkg_name http-client-tls
%bcond_with tests
Name: ghc-%{pkg_name}
-Version: 0.3.5.3
+Version: 0.3.6
Release: 0
Summary: Http-client backend using the connection package and tls
library
License: MIT
URL: https://hackage.haskell.org/package/%{pkg_name}
Source0:
https://hackage.haskell.org/package/%{pkg_name}-%{version}/%{pkg_name}-%{version}.tar.gz
-Source1:
https://hackage.haskell.org/package/%{pkg_name}-%{version}/revision/1.cabal#/%{pkg_name}.cabal
BuildRequires: ghc-Cabal-devel
BuildRequires: ghc-bytestring-devel
BuildRequires: ghc-case-insensitive-devel
@@ -65,7 +64,6 @@
%prep
%autosetup -n %{pkg_name}-%{version}
-cp -p %{SOURCE1} %{pkg_name}.cabal
%build
%ghc_lib_build
++++++ http-client-tls-0.3.5.3.tar.gz -> http-client-tls-0.3.6.tar.gz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/http-client-tls-0.3.5.3/ChangeLog.md
new/http-client-tls-0.3.6/ChangeLog.md
--- old/http-client-tls-0.3.5.3/ChangeLog.md 2018-02-05 22:28:18.000000000
+0100
+++ new/http-client-tls-0.3.6/ChangeLog.md 2022-02-04 15:24:11.000000000
+0100
@@ -1,3 +1,9 @@
+# Changelog for http-client-tls
+
+## 0.3.6
+
+* Allow making requests to raw IPv6 hosts
[#477](https://github.com/snoyberg/http-client/pull/477)
+
## 0.3.5.3
* Fix `newTlsManager`
[#325](https://github.com/snoyberg/http-client/issues/325)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/http-client-tls-0.3.5.3/Network/HTTP/Client/TLS.hs
new/http-client-tls-0.3.6/Network/HTTP/Client/TLS.hs
--- old/http-client-tls-0.3.5.3/Network/HTTP/Client/TLS.hs 2018-02-05
22:28:18.000000000 +0100
+++ new/http-client-tls-0.3.6/Network/HTTP/Client/TLS.hs 2022-01-31
16:09:24.000000000 +0100
@@ -121,7 +121,7 @@
context <- maybe NC.initConnectionContext return mcontext
return $ \_ha host port -> bracketOnError
(NC.connectTo context NC.ConnectionParams
- { NC.connectionHostname = host
+ { NC.connectionHostname = strippedHostName host
, NC.connectionPort = fromIntegral port
, NC.connectionUseSecure = tls
, NC.connectionUseSocks = sock
@@ -138,13 +138,13 @@
context <- maybe NC.initConnectionContext return mcontext
return $ \connstr checkConn serverName _ha host port -> bracketOnError
(NC.connectTo context NC.ConnectionParams
- { NC.connectionHostname = serverName
+ { NC.connectionHostname = strippedHostName serverName
, NC.connectionPort = fromIntegral port
, NC.connectionUseSecure = Nothing
, NC.connectionUseSocks =
case sock of
Just _ -> error "Cannot use SOCKS and TLS proxying
together"
- Nothing -> Just $ NC.OtherProxy host $ fromIntegral port
+ Nothing -> Just $ NC.OtherProxy (strippedHostName host) $
fromIntegral port
})
NC.connectionClose
$ \conn -> do
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/http-client-tls-0.3.5.3/http-client-tls.cabal
new/http-client-tls-0.3.6/http-client-tls.cabal
--- old/http-client-tls-0.3.5.3/http-client-tls.cabal 2018-02-05
22:28:18.000000000 +0100
+++ new/http-client-tls-0.3.6/http-client-tls.cabal 2022-02-04
15:22:59.000000000 +0100
@@ -1,5 +1,5 @@
name: http-client-tls
-version: 0.3.5.3
+version: 0.3.6
synopsis: http-client backend using the connection package and tls
library
description: Hackage documentation generation is not reliable. For up
to date documentation, please see:
<https://www.stackage.org/package/http-client-tls>.
homepage: https://github.com/snoyberg/http-client
@@ -16,7 +16,7 @@
library
exposed-modules: Network.HTTP.Client.TLS
other-extensions: ScopedTypeVariables
- build-depends: base >= 4 && < 5
+ build-depends: base >= 4.10 && < 5
, data-default-class
, http-client >= 0.5.0
, connection >= 0.2.5
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/http-client-tls-0.3.5.3/test/Spec.hs
new/http-client-tls-0.3.6/test/Spec.hs
--- old/http-client-tls-0.3.5.3/test/Spec.hs 2018-02-05 22:17:59.000000000
+0100
+++ new/http-client-tls-0.3.6/test/Spec.hs 2022-01-31 16:09:24.000000000
+0100
@@ -29,6 +29,26 @@
`shouldThrow` \(DigestAuthException _ _ det) ->
det == UnexpectedStatusCode
+ it "BadSSL: expired" $ do
+ manager <- newManager tlsManagerSettings
+ let action = withResponse "https://expired.badssl.com/" manager (const
(return ()))
+ action `shouldThrow` anyException
+
+ it "BadSSL: self-signed" $ do
+ manager <- newManager tlsManagerSettings
+ let action = withResponse "https://self-signed.badssl.com/" manager
(const (return ()))
+ action `shouldThrow` anyException
+
+ it "BadSSL: wrong.host" $ do
+ manager <- newManager tlsManagerSettings
+ let action = withResponse "https://wrong.host.badssl.com/" manager
(const (return ()))
+ action `shouldThrow` anyException
+
+ it "BadSSL: we do have case-insensitivity though" $ do
+ manager <- newManager $ tlsManagerSettings
+ withResponse "https://BADSSL.COM" manager $ \res ->
+ responseStatus res `shouldBe` status200
+
-- https://github.com/snoyberg/http-client/issues/289
it "accepts TLS settings" $ do
let