Commit graph

10 commits

Author SHA1 Message Date
pho
eda754ca5a Bump all Haskell packages after enabling "split sections" in mk/haskell.mk 2022-02-26 03:57:43 +00:00
pho
dc3a63e008 revbump after changing the default Haskell compiler 2022-02-12 08:50:25 +00:00
pho
4623b9119a Update to hackage-security-0.6.2.0
0.6.2.0
* Safely prepare for when cabal factors out Cabal-syntax

0.6.1.0
* Support basic auth in package-indices (#252)
* Fix tests due to new aeson handling of unescaped control sequences (#256)
* Bump a lot of bounds on packages we depend on
2022-02-11 13:15:07 +00:00
pho
75588a9d5d Bump packages that depends on GHC 2022-01-18 02:48:01 +00:00
nia
3df0f20e22 security: Replace RMD160 checksums with BLAKE2s checksums
All checksums have been double-checked against existing RMD160 and
SHA512 hashes

Unfetchable distfiles (fetched conditionally?):
./security/cyrus-sasl/distinfo cyrus-sasl-dedad73e5e7a75d01a5f3d5a6702ab8ccd2ff40d.patch.v2
2021-10-26 11:16:56 +00:00
nia
fa4b2904a6 security: Remove SHA1 hashes for distfiles 2021-10-07 14:53:40 +00:00
pho
4d74cf7192 *: Bump PKGREVISION for ghc-9.0.1 2021-05-03 19:00:52 +00:00
pho
09f2fa703e Update to hackage-security-0.6.0.1
* Fix bug in non-default -lukko build-configuration (#242)
* Add support for template-haskell-2.16.0.0 (#240)
2021-04-24 13:32:21 +00:00
rillig
15fe9894e6 hs-*: add PLIST files
These PLIST files have been autogenerated by mk/haskell.mk using
HS_UPDATE_PLIST=yes during a bulk build.  They will help to track changes
to the packages.  The Haskell packages didn't have PLIST files because
their paths contained package hashes.  These hashes are now determined by
mk/haskell.mk, which makes it easy to generate easy to read PLIST files.
2020-05-11 17:51:58 +00:00
pho
3505ea90b1 Import hackage-security-0.6.0.0
The hackage security library provides both server and client utilities
for securing the Hackage package server
(http://hackage.haskell.org/). It is based on The Update Framework
(http://theupdateframework.com/), a set of recommendations developed
by security researchers at various universities in the US as well as
developers on the Tor project (https://www.torproject.org/).

The current implementation supports only index signing, thereby
enabling untrusted mirrors. It does not yet provide facilities for
author package signing.
2020-01-19 01:54:46 +00:00