Hello community,

here is the log from the commit of package perl-IO-Socket-SSL for 
openSUSE:Factory checked in at 2017-09-25 13:49:05
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/perl-IO-Socket-SSL (Old)
 and      /work/SRC/openSUSE:Factory/.perl-IO-Socket-SSL.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "perl-IO-Socket-SSL"

Mon Sep 25 13:49:05 2017 rev:74 rq:528222 version:2.051

Changes:
--------
--- /work/SRC/openSUSE:Factory/perl-IO-Socket-SSL/perl-IO-Socket-SSL.changes    
2016-04-11 09:11:35.000000000 +0200
+++ 
/work/SRC/openSUSE:Factory/.perl-IO-Socket-SSL.new/perl-IO-Socket-SSL.changes   
    2017-09-25 13:49:09.165478348 +0200
@@ -1,0 +2,84 @@
+Thu Sep 21 15:37:34 UTC 2017 - [email protected]
+
+- update to 2.051
+  - syswrite: if SSL_write sets SSL_ERROR_SYSCALL but no $! (as seen with
+    OpenSSL 1.1.0 on Windows) set $! to EPIPE to propagate a useful error up
+    https://github.com/noxxi/p5-io-socket-ssl/issues/62
+  - removed unecessary settings of SSL_version and SSL_cipher_list from tests
+  - protocol_version.t can now deal when TLS 1.0 and/or TLS 1.1 are not 
supported
+    as is the case with openssl versions in latest Debian (buster)
+  - fixed problem caused by typo in the context of session cache
+    https://github.com/noxxi/p5-io-socket-ssl/issues/60
+  - update PublicSuffix information from publicsuffix.org
+  - fixed small memory leaks during destruction of socket and context, 
RT#120643
+  - better fix for problem which 2.046 tried to fix but broke LWP this way
+  - cleanup everything in DESTROY and make sure to start with a fresh %{*self}
+    in configure_SSL because it can happen that a GLOB gets used again without
+    calling DESTROY (https://github.com/noxxi/p5-io-socket-ssl/issues/56)
+  - fixed memory leak caused by not destroying CREATED_IN_THIS_THREAD for SSL
+    objects -> github pull#55
+  - optimization: don't track SSL objects and CTX in *CREATED_IN_THIS_THREAD
+    if perl is compiled w/o thread support
+  - small fix in t/protocol_version.t to use older versions of Net::SSLeay
+    with openssl build w/o SSLv3 support
+  - when setting SSL_keepSocketOnError to true the socket will not be closed
+    on fatal error. This is a modified version of
+    https://github.com/noxxi/p5-io-socket-ssl/pull/53/
+  - protect various 'eval'-based capability detections at startup with a 
localized
+    __DIE__ handler. This way dynamically requiring IO::Socket::SSL as done by
+    various third party software should cause less problems even if there is a
+    global __DIE__ handler which does not properly deal with 'eval'.
+  - make t/session_ticket.t work with OpenSSL 1.1.0. With this version the
+    session does not get reused any longer if it was not properly closed which
+    is now done using an explicit close by the client which causes a
+    proper SSL_shutdown
+  - enable session ticket callback with Net::SSLeay>=1.80
+  - leave session ticket callback off for now until the needed patch is
+    included in Net::SSLeay. See
+    https://rt.cpan.org/Ticket/Display.html?id=116118#txn-1696146
+  - fix detection of default CA path for OpenSSL 1.1.x
+  - Utils::CERT_asHash now includes the signature algorithm used
+  - Utils::CERT_asHash can now deal with large serial numbers
+  - OpenSSL 1.1.0c changed the behavior of SSL_read so that it now returns -1 
on
+    EOF without proper SSL shutdown. Since it looks like that this behavior 
will
+    be kept at least for 1.1.1+ adapt to the changed API by treating 
errno=NOERR
+    on SSL_ERROR_SYSCALL as EOF.
+  - restrict session ticket callback to Net::SSLeay 1.79+ since version before
+    contains bug. Add test for session reuse
+  - extend SSL fingerprint to pubkey digest, i.e. 'sha1$pub$xxxxxx....'
+  - fix t/external/ocsp.t to use different server (under my control) to check 
+    OCSP stapling
+  - fix session cache del_session: it freed the session but did not properly
+    remove it from the cache. Further reuse causes crash.
+  - disable OCSP support when Net::SSLeay 1.75..1.77 is used, see RT#116795
+  - move handling of global SSL arguments into creation of context, so that 
these
+    get also applied when creating a context only.
+  - support for session ticket reuse over multiple contexts and processes
+    (if supported by Net::SSLeay)
+  - small optimizations, like saving various Net::SSLeay constants into 
variables
+    and access variables instead of calling the constant sub all the time
+  - make t/dhe.t work with openssl 1.1.0
+  - Set session id context only on the server side. Even if the documentation 
for
+    SSL_CTX_set_session_id_context makes clear that this function is server 
side
+    only it actually affects hndling of session reuse on the client side too 
and
+    can result in error "SSL3_GET_SERVER_HELLO:attempt to reuse session in
+    different context" at the client.
+  - Utils::CERT_create - don't add given extensions again if they were already
+    added. Firefox croaks with sec_error_extension_value_invalid if (specific?)
+    extensions are given twice.
+  - assume that Net::SSLeay::P_PKCS12_load_file will return the CA certificates
+    with the reverse order as in the PKCS12 file, because that's what it does.
+  - support for creating ECC keys in Utils once supported by Net::SSLeay
+  - remove internal sub session_cache and access cache directly (faster)
+  - fix del_session method in case a single item was in the cache
+  - use SSL_session_key as the real key for the cache and not some derivate of 
it,
+    so that it works to remove the entry using the same key
+  - add del_session method to session cache
+  - only added Changes for 2.026
+  - update default server and client ciphers based on recommendation of
+    Mozilla and what the current browsers use. Notably this finally disables
+    RC4 for the client (was disabled for server long ago) and adds CHACHA20.
+- drop perl-IO-Socket-SSL_add_DHE-RSA_to_default_client_cipher_list.patch
+  (upstream)
+
+-------------------------------------------------------------------

Old:
----
  IO-Socket-SSL-2.025.tar.gz
  perl-IO-Socket-SSL_add_DHE-RSA_to_default_client_cipher_list.patch

New:
----
  IO-Socket-SSL-2.051.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ perl-IO-Socket-SSL.spec ++++++
--- /var/tmp/diff_new_pack.UQnm1w/_old  2017-09-25 13:49:10.097347246 +0200
+++ /var/tmp/diff_new_pack.UQnm1w/_new  2017-09-25 13:49:10.097347246 +0200
@@ -1,7 +1,7 @@
 #
 # spec file for package perl-IO-Socket-SSL
 #
-# Copyright (c) 2016 SUSE LINUX GmbH, Nuernberg, Germany.
+# Copyright (c) 2017 SUSE LINUX GmbH, Nuernberg, Germany.
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -17,7 +17,7 @@
 
 
 Name:           perl-IO-Socket-SSL
-Version:        2.025
+Version:        2.051
 Release:        0
 %define cpan_name IO-Socket-SSL
 Summary:        Nearly transparent SSL encapsulation for IO::Socket::INET
@@ -26,7 +26,6 @@
 Url:            http://search.cpan.org/dist/IO-Socket-SSL/
 Source0:        
http://www.cpan.org/authors/id/S/SU/SULLR/%{cpan_name}-%{version}.tar.gz
 Source1:        cpanspec.yml
-Patch0:         
perl-IO-Socket-SSL_add_DHE-RSA_to_default_client_cipher_list.patch
 BuildArch:      noarch
 BuildRoot:      %{_tmppath}/%{name}-%{version}-build
 BuildRequires:  perl
@@ -77,7 +76,6 @@
 %prep
 %setup -q -n %{cpan_name}-%{version}
 find . -type f ! -name \*.pl -print0 | xargs -0 chmod 644
-%patch0 -p1
 
 %build
 %{__perl} Makefile.PL INSTALLDIRS=vendor

++++++ IO-Socket-SSL-2.025.tar.gz -> IO-Socket-SSL-2.051.tar.gz ++++++
++++ 5788 lines of diff (skipped)

++++++ cpanspec.yml ++++++
--- /var/tmp/diff_new_pack.UQnm1w/_old  2017-09-25 13:49:10.233328116 +0200
+++ /var/tmp/diff_new_pack.UQnm1w/_new  2017-09-25 13:49:10.233328116 +0200
@@ -1,3 +1,2 @@
 ---
 patches:
- perl-IO-Socket-SSL_add_DHE-RSA_to_default_client_cipher_list.patch: -p1


Reply via email to