Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package perl-IO-Socket-SSL for 
openSUSE:Factory checked in at 2022-01-11 21:17:05
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/perl-IO-Socket-SSL (Old)
 and      /work/SRC/openSUSE:Factory/.perl-IO-Socket-SSL.new.1892 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "perl-IO-Socket-SSL"

Tue Jan 11 21:17:05 2022 rev:90 rq:943744 version:2.073

Changes:
--------
--- /work/SRC/openSUSE:Factory/perl-IO-Socket-SSL/perl-IO-Socket-SSL.changes    
2021-08-25 20:57:15.701235750 +0200
+++ 
/work/SRC/openSUSE:Factory/.perl-IO-Socket-SSL.new.1892/perl-IO-Socket-SSL.changes
  2022-01-11 21:20:24.801007096 +0100
@@ -1,0 +2,10 @@
+Thu Dec 23 03:07:08 UTC 2021 - Tina M??ller <timueller+p...@suse.de>
+
+- updated to 2.073
+   see /usr/share/doc/packages/perl-IO-Socket-SSL/Changes
+
+  2.073
+  - fix behavior and tests for openssl 3.0.1
+  - fix #110 - prevent internal error warning in some cases
+
+-------------------------------------------------------------------

Old:
----
  IO-Socket-SSL-2.072.tar.gz

New:
----
  IO-Socket-SSL-2.073.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ perl-IO-Socket-SSL.spec ++++++
--- /var/tmp/diff_new_pack.A0EoXw/_old  2022-01-11 21:20:26.157008049 +0100
+++ /var/tmp/diff_new_pack.A0EoXw/_new  2022-01-11 21:20:26.165008055 +0100
@@ -18,7 +18,7 @@
 
 %define cpan_name IO-Socket-SSL
 Name:           perl-IO-Socket-SSL
-Version:        2.072
+Version:        2.073
 Release:        0
 Summary:        Nearly transparent SSL encapsulation for IO::Socket::INET
 License:        Artistic-1.0 OR GPL-1.0-or-later

++++++ IO-Socket-SSL-2.072.tar.gz -> IO-Socket-SSL-2.073.tar.gz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/IO-Socket-SSL-2.072/Changes 
new/IO-Socket-SSL-2.073/Changes
--- old/IO-Socket-SSL-2.072/Changes     2021-08-16 15:03:36.000000000 +0200
+++ new/IO-Socket-SSL-2.073/Changes     2021-12-22 20:24:38.000000000 +0100
@@ -1,3 +1,6 @@
+2.073
+- fix behavior and tests for openssl 3.0.1
+- fix #110 - prevent internal error warning in some cases
 2.072
 - add PEM_certs2file and PEM_file2certs in IO::Socket::SSL::Utils based
   on idea by rovo89 in #101
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/IO-Socket-SSL-2.072/META.json 
new/IO-Socket-SSL-2.073/META.json
--- old/IO-Socket-SSL-2.072/META.json   2021-08-16 15:05:23.000000000 +0200
+++ new/IO-Socket-SSL-2.073/META.json   2021-12-22 20:29:50.000000000 +0100
@@ -52,6 +52,6 @@
          "url" : "https://github.com/noxxi/p5-io-socket-ssl";
       }
    },
-   "version" : "2.072",
+   "version" : "2.073",
    "x_serialization_backend" : "JSON::PP version 4.02"
 }
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/IO-Socket-SSL-2.072/META.yml 
new/IO-Socket-SSL-2.073/META.yml
--- old/IO-Socket-SSL-2.072/META.yml    2021-08-16 15:05:23.000000000 +0200
+++ new/IO-Socket-SSL-2.073/META.yml    2021-12-22 20:29:50.000000000 +0100
@@ -27,5 +27,5 @@
   homepage: https://github.com/noxxi/p5-io-socket-ssl
   license: http://dev.perl.org/licenses/
   repository: https://github.com/noxxi/p5-io-socket-ssl
-version: '2.072'
+version: '2.073'
 x_serialization_backend: 'CPAN::Meta::YAML version 0.018'
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/IO-Socket-SSL-2.072/lib/IO/Socket/SSL.pm 
new/IO-Socket-SSL-2.073/lib/IO/Socket/SSL.pm
--- old/IO-Socket-SSL-2.072/lib/IO/Socket/SSL.pm        2021-08-16 
15:03:59.000000000 +0200
+++ new/IO-Socket-SSL-2.073/lib/IO/Socket/SSL.pm        2021-12-22 
20:24:53.000000000 +0100
@@ -13,7 +13,7 @@
 
 package IO::Socket::SSL;
 
-our $VERSION = '2.072';
+our $VERSION = '2.073';
 
 use IO::Socket;
 use Net::SSLeay 1.46;
@@ -39,6 +39,7 @@
 my $Net_SSLeay_ERROR_WANT_READ   = Net::SSLeay::ERROR_WANT_READ();
 my $Net_SSLeay_ERROR_WANT_WRITE  = Net::SSLeay::ERROR_WANT_WRITE();
 my $Net_SSLeay_ERROR_SYSCALL     = Net::SSLeay::ERROR_SYSCALL();
+my $Net_SSLeay_ERROR_SSL         = Net::SSLeay::ERROR_SSL();
 my $Net_SSLeay_VERIFY_NONE       = Net::SSLeay::VERIFY_NONE();
 my $Net_SSLeay_VERIFY_PEER       = Net::SSLeay::VERIFY_PEER();
 
@@ -1174,7 +1175,7 @@
 if ($auto_retry) {
     *blocking = sub {
        my $self = shift;
-       { @_ && $auto_retry->($self->_get_ssl_object || last, @_); }
+       { @_ && $auto_retry->(${*$self}{_SSL_object} || last, @_); }
        return $self->SUPER::blocking(@_);
     };
 }
@@ -1188,13 +1189,12 @@
     my ($data,$rwerr) = $read_func->($ssl, $length);
     while ( ! defined($data)) {
        if ( my $err = $self->_skip_rw_error( $ssl, defined($rwerr) ? $rwerr:-1 
)) {
-           if ($err == $Net_SSLeay_ERROR_SYSCALL) {
-               # OpenSSL 1.1.0c+ : EOF can now result in SSL_read returning -1
-               if (not $!) {
-                   # SSL_ERROR_SYSCALL but not errno -> treat as EOF
-                   $data = '';
-                   last;
-               }
+           # OpenSSL 1.1.0c+ : EOF can now result in SSL_read returning -1 and 
SSL_ERROR_SYSCALL
+           # OpenSSL 3.0 : EOF can now result in SSL_read returning -1 and 
SSL_ERROR_SSL
+           if (not $! and $err == $Net_SSLeay_ERROR_SSL || $err == 
$Net_SSLeay_ERROR_SYSCALL) {
+               # treat as EOF
+               $data = '';
+               last;
            }
            $self->error("SSL read error");
        }
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/IO-Socket-SSL-2.072/t/core.t 
new/IO-Socket-SSL-2.073/t/core.t
--- old/IO-Socket-SSL-2.072/t/core.t    2021-01-22 17:48:39.000000000 +0100
+++ new/IO-Socket-SSL-2.073/t/core.t    2021-12-22 20:17:12.000000000 +0100
@@ -130,7 +130,6 @@
                    4.0,
                    ord("y"),
                    "Test\nBeaver\nBeaver\n");
-    shutdown($client, 1);
 
     my $buffer="\0\0aaaaaaaaaaaaaaaaaaaa";
     $client->sysread($buffer, 7, 2);
@@ -247,7 +246,7 @@
 
 is( getc($client), "\$", "Server Getc Check");
 
-@array = <$client>;
+@array = map { scalar <$client> } (0..5);
 is( scalar @array, 6, "Server Getlines Check 1");
 
 is( $array[0], "1.04\n", "Server Getlines Check 2");
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/IO-Socket-SSL-2.072/t/external/fingerprint.pl 
new/IO-Socket-SSL-2.073/t/external/fingerprint.pl
--- old/IO-Socket-SSL-2.072/t/external/fingerprint.pl   2020-02-14 
15:23:13.000000000 +0100
+++ new/IO-Socket-SSL-2.073/t/external/fingerprint.pl   2021-12-22 
10:34:33.000000000 +0100
@@ -1,5 +1,5 @@
 # to update fingerprints in this file:
-# perl -e 'do q[t/external/fingerprint.pl]; update_fingerprints()'
+# perl -e 'do q[./t/external/fingerprint.pl]; update_fingerprints()'
 
 use strict;
 use warnings;
@@ -18,17 +18,17 @@
   },
   {
     _ => 'no OCSP stapling',
-    fingerprint => 'sha1$pub$f8c51d37c070c423ccc5f6065e080b94ce03494c',
+    fingerprint => 'sha1$pub$c8ba0806b887fc15e9d98e73107a17150f847bbf',
     host => 'www.bild.de',
     ocsp => {
               staple => 0
             },
     port => 443,
-    subject_hash_ca => 'e2799e36'
+    subject_hash_ca => '3513523f'
   },
   {
     _ => 'this is revoked',
-    fingerprint => 'sha1$pub$75f8bfe5feac656c894c06011422b6455854b4e5',
+    fingerprint => 'sha1$pub$f0f0c49b8a04a2dd2110e10f7806c97d87d0b26f',
     host => 'revoked.grc.com',
     ocsp => {
               revoked => 1
@@ -36,40 +36,40 @@
     port => 443
   },
   {
-    fingerprint => 'sha1$pub$56f745d484d13c95ad58142ef4d1cc2f11c073f6',
+    fingerprint => 'sha1$pub$06d0540a8a17d0b794793830811985d821833ce0',
     host => 'www.yahoo.com',
     port => 443,
     subject_hash_ca => '244b5494'
   },
   {
-    fingerprint => 'sha1$pub$52509cfecdc8264c21da6279360e89c1be1bc30a',
+    fingerprint => 'sha1$pub$c40d9bc2496fa2db198b27b6c1f94d1c703e7039',
     host => 'www.comdirect.de',
     port => 443,
-    subject_hash_ca => '02265526'
+    subject_hash_ca => '062cdee6'
   },
   {
-    fingerprint => 'sha1$pub$c2ee1cc0963c55286bcd549f1d782c5557602f4c',
+    fingerprint => 'sha1$pub$c78493da803e190c202f103049c74b02ef0a68be',
     host => 'meine.deutsche-bank.de',
     port => 443,
-    subject_hash_ca => 'c01cdfa2'
+    subject_hash_ca => '607986c7'
   },
   {
-    fingerprint => 'sha1$pub$5414c379b16298b2352812d7f5c7f4b576da9efa',
+    fingerprint => 'sha1$pub$5ae9284e67d6e91db39f1f7e10cfab2e987ef1f2',
     host => 'www.twitter.com',
     port => 443,
-    subject_hash_ca => '244b5494'
+    subject_hash_ca => '3513523f'
   },
   {
-    fingerprint => 'sha1$pub$7b89d1ee6a48e3abc504ee1642dbc7d0fc74965b',
+    fingerprint => 'sha1$pub$2003390d568988d918b40a10e2d32cf297d22117',
     host => 'www.facebook.com',
     port => 443,
     subject_hash_ca => '244b5494'
   },
   {
-    fingerprint => 'sha1$pub$9c070a464b2eb1ee315120bcd0a0ba82e711be9c',
+    fingerprint => 'sha1$pub$0a9d53f5c6f85aa0b759c7430c83ce4afb88caf6',
     host => 'www.live.com',
     port => 443,
-    subject_hash_ca => '653b494a'
+    subject_hash_ca => '3513523f'
   }
 ]
 ;

Reply via email to