summaryrefslogtreecommitdiff
path: root/net/hs-resolv
AgeCommit message (Collapse)AuthorFilesLines
2022-02-26Bump all Haskell packages after enabling "split sections" in mk/haskell.mkpho2-4/+4
2022-02-12revbump after changing the default Haskell compilerpho2-4/+4
2022-02-11Fix build with GHC 9.2pho2-5/+8
2022-01-18Bump packages that depends on GHCpho2-4/+4
2021-10-26net: Replace RMD160 checksums with BLAKE2s checksumsnia1-2/+2
All checksums have been double-checked against existing RMD160 and SHA512 hashes Not committed (merge conflicts...): net/radsecproxy/distinfo The following distfiles could not be fetched (fetched conditionally?): ./net/citrix_ica/distinfo citrix_ica-10.6.115659/en.linuxx86.tar.gz ./net/djbdns/distinfo dnscache-1.05-multiple-ip.patch ./net/djbdns/distinfo djbdns-1.05-test28.diff.xz ./net/djbdns/distinfo djbdns-1.05-ignoreip2.patch ./net/djbdns/distinfo djbdns-1.05-multiip.diff ./net/djbdns/distinfo djbdns-cachestats.patch
2021-10-07net: Remove SHA1 hashes for distfilesnia1-2/+1
2021-05-03*: Bump PKGREVISION for ghc-9.0.1pho2-3/+4
2021-04-24Update to resolv-0.1.2.0pho5-41/+58
* Add new high-level API functions queryPTR, arpaIPv4, and arpaIPv6 for performing reverse address lookups.
2021-02-28(net/hs-resolv) insist on ghc-8.*, fix buildmef1-2/+3
2021-02-13(*/hs-*) fix build, not adapted to ghc90 versionmef1-1/+2
2020-05-11hs-*: add PLIST filesrillig1-0/+30
These PLIST files have been autogenerated by mk/haskell.mk using HS_UPDATE_PLIST=yes during a bulk build. They will help to track changes to the packages. The Haskell packages didn't have PLIST files because their paths contained package hashes. These hashes are now determined by mk/haskell.mk, which makes it easy to generate easy to read PLIST files.
2020-01-19Import hackage-security-0.6.0.0pho4-0/+39
The hackage security library provides both server and client utilities for securing the Hackage package server (http://hackage.haskell.org/). It is based on The Update Framework (http://theupdateframework.com/), a set of recommendations developed by security researchers at various universities in the US as well as developers on the Tor project (https://www.torproject.org/). The current implementation supports only index signing, thereby enabling untrusted mirrors. It does not yet provide facilities for author package signing.