Accepting request 369963 from devel:languages:perl:autoupdate
automatic update OBS-URL: https://build.opensuse.org/request/show/369963 OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/perl-IO-Socket-SSL?expand=0&rev=87
This commit is contained in:
parent
84db6defeb
commit
252820815d
@ -1,3 +0,0 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:936268b3c152a4900f9c1762ab2e0aa3f84ed3a988e8e60aaad604beda7bfe41
|
||||
size 195529
|
3
IO-Socket-SSL-2.024.tar.gz
Normal file
3
IO-Socket-SSL-2.024.tar.gz
Normal file
@ -0,0 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:dab3125b004b24ff8dfc003aa81c00c0f976a1bc34a75e1d8d9de9de837ce6c9
|
||||
size 209567
|
@ -1,3 +1,57 @@
|
||||
-------------------------------------------------------------------
|
||||
Fri Mar 11 10:14:57 UTC 2016 - coolo@suse.com
|
||||
|
||||
- updated to 2.024
|
||||
see /usr/share/doc/packages/perl-IO-Socket-SSL/Changes
|
||||
|
||||
2.024 2016/02/06
|
||||
- Work around issue where the connect fails on systems having only a loopback
|
||||
interface and where IO::Socket::IP is used as super class (default when
|
||||
available). Since IO::Socket::IP sets AI_ADDRCONFIG by default connect to
|
||||
localhost would fail on this systems. This happened at least for the tests,
|
||||
see https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813796
|
||||
Workaround is to explicitely set GetAddrInfoFlags to 0 if no GetAddrInfoFlags
|
||||
is set but the Family/Domain is given. In this case AI_ADDRCONFIG would not
|
||||
be useful anyway but would cause at most harm.
|
||||
2.023 2016/01/30
|
||||
- OpenSSL 1.0.2f changed the behavior of SSL shutdown in case the TLS connection
|
||||
was not fully established (commit: f73c737c7ac908c5d6407c419769123392a3b0a9).
|
||||
This somehow resulted in Net::SSLeay::shutdown returning 0 (i.e. keep trying)
|
||||
which caused an endless loop. It will now ignore this result in case the TLS
|
||||
connection was not yet established and consider the TLS connection closed
|
||||
instead.
|
||||
2.022 2015/12/10
|
||||
- fix stringification of IPv6 inside subjectAltNames in Utils::CERT_asHash.
|
||||
Thanks to Mark.Martinec[AT]ijs[DOT]si for reporting in #110253
|
||||
2.021 2015/12/02
|
||||
- Fixes for documentation and typos thanks to DavsX and jwilk.
|
||||
- Update PublicSuffx with latest version from publicsuffix.org
|
||||
2.020 2015/09/20
|
||||
- support multiple directories in SSL_ca_path as proposed in RT#106711
|
||||
by dr1027[AT]evocat[DOT]ne. Directories can be given as array or as string
|
||||
with a path separator, see documentation.
|
||||
- typos fixed thanks to jwilk https://github.com/noxxi/p5-io-socket-ssl/pull/34
|
||||
2.019 2015/09/01
|
||||
- work around different behavior of getnameinfo from Socket and Socket6 by
|
||||
using a different wrapper depending on which module I use for IPv6.
|
||||
Thanks to bluhm for reporting.
|
||||
2.018 2015/08/27
|
||||
- RT#106687 - startssl.t failed on darwin with old openssl since server
|
||||
requested client certificate but offered also anon ciphers
|
||||
2.017 2015/08/24
|
||||
- checks for readability of files/dirs for certificates and CA no longer use
|
||||
-r because this is not safe when ACLs are used. Thanks to BBYRD, RT#106295
|
||||
- new method sock_certificate similar to peer_certificate based on idea of
|
||||
Paul Evans, RT#105733
|
||||
- get_fingerprint can now take optional certificate as argument and compute
|
||||
the fingerprint of it. Useful in connection with sock_certificate.
|
||||
- check for both EWOULDBLOCK and EAGAIN since these codes are different on
|
||||
some platforms. Thanks to Andy Grundman, RT#106573
|
||||
- enforce default verification scheme if none was specified, i.e. no longer
|
||||
just warn but accept. If really no verification is wanted a scheme of
|
||||
'none' must be explicitly specified.
|
||||
- support different cipher suites per SNI hosts
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Jul 7 18:54:46 UTC 2015 - coolo@suse.com
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
#
|
||||
# spec file for package perl-IO-Socket-SSL
|
||||
#
|
||||
# Copyright (c) 2015 SUSE LINUX GmbH, Nuernberg, Germany.
|
||||
# Copyright (c) 2016 SUSE LINUX GmbH, Nuernberg, Germany.
|
||||
#
|
||||
# All modifications and additions to the file contributed by third parties
|
||||
# remain the property of their copyright owners, unless otherwise agreed
|
||||
@ -17,7 +17,7 @@
|
||||
|
||||
|
||||
Name: perl-IO-Socket-SSL
|
||||
Version: 2.016
|
||||
Version: 2.024
|
||||
Release: 0
|
||||
%define cpan_name IO-Socket-SSL
|
||||
Summary: Nearly transparent SSL encapsulation for IO::Socket::INET
|
||||
@ -27,7 +27,6 @@ Url: http://search.cpan.org/dist/IO-Socket-SSL/
|
||||
Source0: http://www.cpan.org/authors/id/S/SU/SULLR/%{cpan_name}-%{version}.tar.gz
|
||||
Source1: cpanspec.yml
|
||||
Patch0: perl-IO-Socket-SSL_add_DHE-RSA_to_default_client_cipher_list.patch
|
||||
Patch1: perl-IO-Socket-SSL_fix_offline.patch
|
||||
BuildArch: noarch
|
||||
BuildRoot: %{_tmppath}/%{name}-%{version}-build
|
||||
BuildRequires: perl
|
||||
@ -38,10 +37,10 @@ Requires: perl(Net::SSLeay) >= 1.46
|
||||
|
||||
%description
|
||||
IO::Socket::SSL makes using SSL/TLS much easier by wrapping the necessary
|
||||
functionality into the familiar the IO::Socket manpage interface and
|
||||
providing secure defaults whenever possible. This way, existing
|
||||
applications can be made SSL-aware without much effort, at least if you do
|
||||
blocking I/O and don't use select or poll.
|
||||
functionality into the familiar IO::Socket interface and providing secure
|
||||
defaults whenever possible. This way, existing applications can be made
|
||||
SSL-aware without much effort, at least if you do blocking I/O and don't
|
||||
use select or poll.
|
||||
|
||||
But, under the hood, SSL is a complex beast. So there are lots of methods
|
||||
to make it do what you need if the default behavior is not adequate.
|
||||
@ -51,36 +50,34 @@ documentation carefully.
|
||||
|
||||
The documentation consists of the following parts:
|
||||
|
||||
* * the /"Essential Information About SSL/TLS" manpage
|
||||
* * "Essential Information About SSL/TLS"
|
||||
|
||||
* * the /"Basic SSL Client" manpage
|
||||
* * "Basic SSL Client"
|
||||
|
||||
* * the /"Basic SSL Server" manpage
|
||||
* * "Basic SSL Server"
|
||||
|
||||
* * the /"Common Usage Errors" manpage
|
||||
* * "Common Usage Errors"
|
||||
|
||||
* * the /"Common Problems with SSL" manpage
|
||||
* * "Common Problems with SSL"
|
||||
|
||||
* * the /"Using Non-Blocking Sockets" manpage
|
||||
* * "Using Non-Blocking Sockets"
|
||||
|
||||
* * the /"Advanced Usage" manpage
|
||||
* * "Advanced Usage"
|
||||
|
||||
* * the /"Integration Into Own Modules" manpage
|
||||
* * "Integration Into Own Modules"
|
||||
|
||||
* * the /"Description Of Methods" manpage
|
||||
* * "Description Of Methods"
|
||||
|
||||
Additional documentation can be found in
|
||||
|
||||
* * the IO::Socket::SSL::Intercept manpage - Doing Man-In-The-Middle with
|
||||
SSL
|
||||
* * IO::Socket::SSL::Intercept - Doing Man-In-The-Middle with SSL
|
||||
|
||||
* * the IO::Socket::SSL::Utils manpage - Useful functions for certificates
|
||||
etc
|
||||
* * IO::Socket::SSL::Utils - Useful functions for certificates etc
|
||||
|
||||
%prep
|
||||
%setup -q -n %{cpan_name}-%{version}
|
||||
find . -type f ! -name \*.pl -print0 | xargs -0 chmod 644
|
||||
%patch0 -p1
|
||||
%patch1 -p1
|
||||
|
||||
%build
|
||||
%{__perl} Makefile.PL INSTALLDIRS=vendor
|
||||
|
Loading…
x
Reference in New Issue
Block a user