-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[new release] http, cohttp, cohttp-top, cohttp-server-lwt-unix, cohttp-mirage, cohttp-lwt, cohttp-lwt-unix, cohttp-lwt-jsoo, cohttp-eio, cohttp-curl, cohttp-curl-lwt, cohttp-curl-async and cohttp-async (6.0.0~beta 1) #24699
Conversation
CHANGES: - cohttp-eio: Complete rewrite to follow common interfaces and behaviors. (mefyl mirage/ocaml-cohttp#984) - cohttp-eio: Add Client.make_generic and HTTPS support. (talex5 mirage/ocaml-cohttp#1002)
Signed-off-by: Marcello Seri <[email protected]>
from the changelog, there's only "cohttp-eio" being changed -- why not publish only that package then? |
It is a very good point. Mostly because of the locked version constraints.
I can double check that is only eio and modify the pr and the version locks to reflect this (it will be weird that cohttp-eio beta will use cohttp alpha but life is such I guess :P)
|
that's what I did in tls-eio 0.15.5 #22366 and tls-eio 0.17.2 #24515 ... looks weird, but it saves quite some computation on CI machines and opam clients (I understand this only partially fits this PR, as you mark it as avoid-version (which works for opam 2.1.0+ clients)). |
I actually cannot do it. There are some changes in cohttp to make the client and server interfaces generic and suitable for all packages. The change should be backward compatible though. I edited the message and will add a mention also in cohttp's CHANGELOG |
In any case you make a very good point. I will be more careful with future PRs |
A lot of 404s on the archives; did the rearrangement of the PR delete the beta1 tbzs? |
Ah you are right. Updated |
There seems to be a regression
Please don't merge |
@samoht do you understand why irmin is failing now? The signature of IO should not have changed in cohttp |
A diff between module type Server = sig
- module IO : IO This explains why this is breaking |
Seems like it is useful to have it there, what do you think? Should I try to have it back there or just add an upper bound to irmin? |
I think it'd be best not to break that API if possible - enough changes in the rest already :-) |
Closing in favour of the upcoming beta 2 |
CHANGES: