Path to this page:
./
www/neon,
HTTP and WebDAV client library
Branch: CURRENT,
Version: 0.33.0nb5,
Package name: neon-0.33.0nb5,
Maintainer: pkgsrc-usersneon is an HTTP and WebDAV client library. It provides lower-level
interfaces which directly implement new HTTP methods, and higher-level
interfaces so that you don't have to worry about the lower-level
stuff.
Required to run:[
security/gnutls]
Required to build:[
pkgtools/cwrappers]
Package options: gnutls
Master sites:
Filesize: 890.768 KB
Version history: (Expand)
- (2024-11-15) Updated to version: neon-0.33.0nb5
- (2024-11-01) Updated to version: neon-0.33.0nb4
- (2024-11-01) Updated to version: neon-0.33.0nb3
- (2024-05-29) Updated to version: neon-0.33.0nb2
- (2024-05-16) Updated to version: neon-0.33.0nb1
- (2024-02-14) Updated to version: neon-0.33.0
CVS history: (Expand)
2024-02-14 09:22:39 by Thomas Klausner | Files touched by this commit (3) | |
Log message:
neon: update to 0.33.0.
Changes in release 0.33.0:
* Interface changes:
- API and ABI backwards-compatible with 0.27.x and later
* Interface clarifications:
- ne_locks.h: note that returned lock may have a different URI
than the path passed to ne_lock_discover() due to added
support for RFC 4918 "lockroot" in lock discovery
- ne_request.h: ne_request_create() takes a "target" rather
than a path and this can also be an absolute-URI
- ne_request.h: never-used ne_free_hooks typedef removed
- ne_dates.h: clarified error cases (behaviour unchanged)
- ne_session.h: ne_session_create() 'host' must match RFC 3986
syntax; IPv6 literal addresses must use [] brackets
* New interfaces and features:
- added new configure flag --enable-auto-libproxy which enables
libproxy by default for new sessions (Jan-Michael Brummer)
- ne_locks.h: added DAV:lockroot support per RFC 4918
- ne_ssl.h: ne_ssl_trust_default_ca() now a no-op for non-SSL sessions
- ne_request.h: add ne_add_interim_handler() to handle interim
(1xx) responses; headers in interim responses are now accessible
- ne_basic.h: add ne_putbuf()
- ne_strhash: SHA-512/256 now supported for LibreSSL 3.8+ (orbea)
- response handling no longer applies a maximum limit on 1xx interim
responses; an overall timeout equal to the read timeout is now
applied if a read timeout is configured and 1XXTIMEOUT is enabled
- ne_request.h: add NE_REQFLAG_1XXTIMEOUT
* Bug fixes:
- test suite now works correctly on IPv6-only hosts (Jeremy Sowden)
- fixes for building against LibreSSL (orbea)
- ne_uri_parse() fixes for handling URI with no path and catch
some invalid URIs which were allowed (fasticc)
- retry requests after a 408 response on a persisted connection
- 207 error strings are cleaned and compressed to a single line
- fixed thread-safety in ne_rfc1123_date where gmtime_r is available
- ne_lock_refresh() fixed to use a non-idempotent request
- TLS name verification updated to match RFC 9110/6125, added strict
handling of IP literals vs DNS names
|
2023-11-08 14:21:43 by Thomas Klausner | Files touched by this commit (2377) |
Log message:
*: recursive bump for icu 74.1
|
2023-10-25 00:11:51 by Thomas Klausner | Files touched by this commit (2298) |
Log message:
*: bump for openssl 3
|
2023-04-19 10:12:01 by Adam Ciarcinski | Files touched by this commit (2359) | |
Log message:
revbump after textproc/icu update
|
2023-01-22 14:17:19 by Thomas Klausner | Files touched by this commit (3) | |
Log message:
neon: update to 0.32.5.
Changes in release 0.32.5:
* NOTE: Since 0.32.0 the "$KRB5_CONFIG" environment variable is ignored
when running configure. Use KRB5_CONF_TOOL instead to specify an
alternative to /usr/bin/krb5-config.
* Fail for configure --with-gssapi if GSSAPI can't be enabled (issue #102)
* Add Georgian translation (NorwayFun)
* Fixes for Windows MSYS2/MinGW build, including cross-build (Jim Klimov)
|
2022-10-28 11:25:26 by Thomas Klausner | Files touched by this commit (1) |
Log message:
neon: fix PLIST for previous
|
2022-10-28 02:19:25 by Emmanuel Dreyfus | Files touched by this commit (3) |
Log message:
Move the information of CA bundle path to installed documentation
|
2022-10-26 17:51:24 by Emmanuel Dreyfus | Files touched by this commit (3) |
Log message:
Enable certificate validation for www/cadaver
This requires a dependency on www/neon, which performs the validation.
The CA bundle path is advertised by www/neon/MESSSAGE and depends
whether openssl is native or from pkgsrc.
|