Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package ghc-http-client-tls for openSUSE:Factory checked in at 2022-02-11 23:09:11 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/ghc-http-client-tls (Old) and /work/SRC/openSUSE:Factory/.ghc-http-client-tls.new.1956 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "ghc-http-client-tls" Fri Feb 11 23:09:11 2022 rev:21 rq:953486 version:0.3.6 Changes: -------- --- /work/SRC/openSUSE:Factory/ghc-http-client-tls/ghc-http-client-tls.changes 2020-12-22 11:41:00.429593868 +0100 +++ /work/SRC/openSUSE:Factory/.ghc-http-client-tls.new.1956/ghc-http-client-tls.changes 2022-02-11 23:11:06.199239909 +0100 @@ -1,0 +2,10 @@ +Fri Feb 4 14:24:47 UTC 2022 - Peter Simons <psim...@suse.com> + +- Update http-client-tls to version 0.3.6. + # Changelog for http-client-tls + + ## 0.3.6 + + * Allow making requests to raw IPv6 hosts [#477](https://github.com/snoyberg/http-client/pull/477) + +------------------------------------------------------------------- Old: ---- http-client-tls-0.3.5.3.tar.gz http-client-tls.cabal New: ---- http-client-tls-0.3.6.tar.gz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ ghc-http-client-tls.spec ++++++ --- /var/tmp/diff_new_pack.4xab05/_old 2022-02-11 23:11:06.659241240 +0100 +++ /var/tmp/diff_new_pack.4xab05/_new 2022-02-11 23:11:06.663241251 +0100 @@ -1,7 +1,7 @@ # # spec file for package ghc-http-client-tls # -# Copyright (c) 2020 SUSE LLC +# Copyright (c) 2022 SUSE LLC # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed @@ -19,13 +19,12 @@ %global pkg_name http-client-tls %bcond_with tests Name: ghc-%{pkg_name} -Version: 0.3.5.3 +Version: 0.3.6 Release: 0 Summary: Http-client backend using the connection package and tls library License: MIT URL: https://hackage.haskell.org/package/%{pkg_name} Source0: https://hackage.haskell.org/package/%{pkg_name}-%{version}/%{pkg_name}-%{version}.tar.gz -Source1: https://hackage.haskell.org/package/%{pkg_name}-%{version}/revision/1.cabal#/%{pkg_name}.cabal BuildRequires: ghc-Cabal-devel BuildRequires: ghc-bytestring-devel BuildRequires: ghc-case-insensitive-devel @@ -65,7 +64,6 @@ %prep %autosetup -n %{pkg_name}-%{version} -cp -p %{SOURCE1} %{pkg_name}.cabal %build %ghc_lib_build ++++++ http-client-tls-0.3.5.3.tar.gz -> http-client-tls-0.3.6.tar.gz ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/http-client-tls-0.3.5.3/ChangeLog.md new/http-client-tls-0.3.6/ChangeLog.md --- old/http-client-tls-0.3.5.3/ChangeLog.md 2018-02-05 22:28:18.000000000 +0100 +++ new/http-client-tls-0.3.6/ChangeLog.md 2022-02-04 15:24:11.000000000 +0100 @@ -1,3 +1,9 @@ +# Changelog for http-client-tls + +## 0.3.6 + +* Allow making requests to raw IPv6 hosts [#477](https://github.com/snoyberg/http-client/pull/477) + ## 0.3.5.3 * Fix `newTlsManager` [#325](https://github.com/snoyberg/http-client/issues/325) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/http-client-tls-0.3.5.3/Network/HTTP/Client/TLS.hs new/http-client-tls-0.3.6/Network/HTTP/Client/TLS.hs --- old/http-client-tls-0.3.5.3/Network/HTTP/Client/TLS.hs 2018-02-05 22:28:18.000000000 +0100 +++ new/http-client-tls-0.3.6/Network/HTTP/Client/TLS.hs 2022-01-31 16:09:24.000000000 +0100 @@ -121,7 +121,7 @@ context <- maybe NC.initConnectionContext return mcontext return $ \_ha host port -> bracketOnError (NC.connectTo context NC.ConnectionParams - { NC.connectionHostname = host + { NC.connectionHostname = strippedHostName host , NC.connectionPort = fromIntegral port , NC.connectionUseSecure = tls , NC.connectionUseSocks = sock @@ -138,13 +138,13 @@ context <- maybe NC.initConnectionContext return mcontext return $ \connstr checkConn serverName _ha host port -> bracketOnError (NC.connectTo context NC.ConnectionParams - { NC.connectionHostname = serverName + { NC.connectionHostname = strippedHostName serverName , NC.connectionPort = fromIntegral port , NC.connectionUseSecure = Nothing , NC.connectionUseSocks = case sock of Just _ -> error "Cannot use SOCKS and TLS proxying together" - Nothing -> Just $ NC.OtherProxy host $ fromIntegral port + Nothing -> Just $ NC.OtherProxy (strippedHostName host) $ fromIntegral port }) NC.connectionClose $ \conn -> do diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/http-client-tls-0.3.5.3/http-client-tls.cabal new/http-client-tls-0.3.6/http-client-tls.cabal --- old/http-client-tls-0.3.5.3/http-client-tls.cabal 2018-02-05 22:28:18.000000000 +0100 +++ new/http-client-tls-0.3.6/http-client-tls.cabal 2022-02-04 15:22:59.000000000 +0100 @@ -1,5 +1,5 @@ name: http-client-tls -version: 0.3.5.3 +version: 0.3.6 synopsis: http-client backend using the connection package and tls library description: Hackage documentation generation is not reliable. For up to date documentation, please see: <https://www.stackage.org/package/http-client-tls>. homepage: https://github.com/snoyberg/http-client @@ -16,7 +16,7 @@ library exposed-modules: Network.HTTP.Client.TLS other-extensions: ScopedTypeVariables - build-depends: base >= 4 && < 5 + build-depends: base >= 4.10 && < 5 , data-default-class , http-client >= 0.5.0 , connection >= 0.2.5 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/http-client-tls-0.3.5.3/test/Spec.hs new/http-client-tls-0.3.6/test/Spec.hs --- old/http-client-tls-0.3.5.3/test/Spec.hs 2018-02-05 22:17:59.000000000 +0100 +++ new/http-client-tls-0.3.6/test/Spec.hs 2022-01-31 16:09:24.000000000 +0100 @@ -29,6 +29,26 @@ `shouldThrow` \(DigestAuthException _ _ det) -> det == UnexpectedStatusCode + it "BadSSL: expired" $ do + manager <- newManager tlsManagerSettings + let action = withResponse "https://expired.badssl.com/" manager (const (return ())) + action `shouldThrow` anyException + + it "BadSSL: self-signed" $ do + manager <- newManager tlsManagerSettings + let action = withResponse "https://self-signed.badssl.com/" manager (const (return ())) + action `shouldThrow` anyException + + it "BadSSL: wrong.host" $ do + manager <- newManager tlsManagerSettings + let action = withResponse "https://wrong.host.badssl.com/" manager (const (return ())) + action `shouldThrow` anyException + + it "BadSSL: we do have case-insensitivity though" $ do + manager <- newManager $ tlsManagerSettings + withResponse "https://BADSSL.COM" manager $ \res -> + responseStatus res `shouldBe` status200 + -- https://github.com/snoyberg/http-client/issues/289 it "accepts TLS settings" $ do let