Accepting request 369963 from devel:languages:perl:autoupdate

automatic update

OBS-URL: https://build.opensuse.org/request/show/369963
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/perl-IO-Socket-SSL?expand=0&rev=87
This commit is contained in:
Stephan Kulow 2016-03-11 21:33:35 +00:00 committed by Git OBS Bridge
parent 84db6defeb
commit 252820815d
4 changed files with 75 additions and 24 deletions

View File

@ -1,3 +0,0 @@
version https://git-lfs.github.com/spec/v1
oid sha256:936268b3c152a4900f9c1762ab2e0aa3f84ed3a988e8e60aaad604beda7bfe41
size 195529

View File

@ -0,0 +1,3 @@
version https://git-lfs.github.com/spec/v1
oid sha256:dab3125b004b24ff8dfc003aa81c00c0f976a1bc34a75e1d8d9de9de837ce6c9
size 209567

View File

@ -1,3 +1,57 @@
-------------------------------------------------------------------
Fri Mar 11 10:14:57 UTC 2016 - coolo@suse.com
- updated to 2.024
see /usr/share/doc/packages/perl-IO-Socket-SSL/Changes
2.024 2016/02/06
- Work around issue where the connect fails on systems having only a loopback
interface and where IO::Socket::IP is used as super class (default when
available). Since IO::Socket::IP sets AI_ADDRCONFIG by default connect to
localhost would fail on this systems. This happened at least for the tests,
see https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813796
Workaround is to explicitely set GetAddrInfoFlags to 0 if no GetAddrInfoFlags
is set but the Family/Domain is given. In this case AI_ADDRCONFIG would not
be useful anyway but would cause at most harm.
2.023 2016/01/30
- OpenSSL 1.0.2f changed the behavior of SSL shutdown in case the TLS connection
was not fully established (commit: f73c737c7ac908c5d6407c419769123392a3b0a9).
This somehow resulted in Net::SSLeay::shutdown returning 0 (i.e. keep trying)
which caused an endless loop. It will now ignore this result in case the TLS
connection was not yet established and consider the TLS connection closed
instead.
2.022 2015/12/10
- fix stringification of IPv6 inside subjectAltNames in Utils::CERT_asHash.
Thanks to Mark.Martinec[AT]ijs[DOT]si for reporting in #110253
2.021 2015/12/02
- Fixes for documentation and typos thanks to DavsX and jwilk.
- Update PublicSuffx with latest version from publicsuffix.org
2.020 2015/09/20
- support multiple directories in SSL_ca_path as proposed in RT#106711
by dr1027[AT]evocat[DOT]ne. Directories can be given as array or as string
with a path separator, see documentation.
- typos fixed thanks to jwilk https://github.com/noxxi/p5-io-socket-ssl/pull/34
2.019 2015/09/01
- work around different behavior of getnameinfo from Socket and Socket6 by
using a different wrapper depending on which module I use for IPv6.
Thanks to bluhm for reporting.
2.018 2015/08/27
- RT#106687 - startssl.t failed on darwin with old openssl since server
requested client certificate but offered also anon ciphers
2.017 2015/08/24
- checks for readability of files/dirs for certificates and CA no longer use
-r because this is not safe when ACLs are used. Thanks to BBYRD, RT#106295
- new method sock_certificate similar to peer_certificate based on idea of
Paul Evans, RT#105733
- get_fingerprint can now take optional certificate as argument and compute
the fingerprint of it. Useful in connection with sock_certificate.
- check for both EWOULDBLOCK and EAGAIN since these codes are different on
some platforms. Thanks to Andy Grundman, RT#106573
- enforce default verification scheme if none was specified, i.e. no longer
just warn but accept. If really no verification is wanted a scheme of
'none' must be explicitly specified.
- support different cipher suites per SNI hosts
-------------------------------------------------------------------
Tue Jul 7 18:54:46 UTC 2015 - coolo@suse.com

View File

@ -1,7 +1,7 @@
#
# spec file for package perl-IO-Socket-SSL
#
# Copyright (c) 2015 SUSE LINUX GmbH, Nuernberg, Germany.
# Copyright (c) 2016 SUSE LINUX GmbH, Nuernberg, Germany.
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
@ -17,7 +17,7 @@
Name: perl-IO-Socket-SSL
Version: 2.016
Version: 2.024
Release: 0
%define cpan_name IO-Socket-SSL
Summary: Nearly transparent SSL encapsulation for IO::Socket::INET
@ -27,7 +27,6 @@ Url: http://search.cpan.org/dist/IO-Socket-SSL/
Source0: http://www.cpan.org/authors/id/S/SU/SULLR/%{cpan_name}-%{version}.tar.gz
Source1: cpanspec.yml
Patch0: perl-IO-Socket-SSL_add_DHE-RSA_to_default_client_cipher_list.patch
Patch1: perl-IO-Socket-SSL_fix_offline.patch
BuildArch: noarch
BuildRoot: %{_tmppath}/%{name}-%{version}-build
BuildRequires: perl
@ -38,10 +37,10 @@ Requires: perl(Net::SSLeay) >= 1.46
%description
IO::Socket::SSL makes using SSL/TLS much easier by wrapping the necessary
functionality into the familiar the IO::Socket manpage interface and
providing secure defaults whenever possible. This way, existing
applications can be made SSL-aware without much effort, at least if you do
blocking I/O and don't use select or poll.
functionality into the familiar IO::Socket interface and providing secure
defaults whenever possible. This way, existing applications can be made
SSL-aware without much effort, at least if you do blocking I/O and don't
use select or poll.
But, under the hood, SSL is a complex beast. So there are lots of methods
to make it do what you need if the default behavior is not adequate.
@ -51,36 +50,34 @@ documentation carefully.
The documentation consists of the following parts:
* * the /"Essential Information About SSL/TLS" manpage
* * "Essential Information About SSL/TLS"
* * the /"Basic SSL Client" manpage
* * "Basic SSL Client"
* * the /"Basic SSL Server" manpage
* * "Basic SSL Server"
* * the /"Common Usage Errors" manpage
* * "Common Usage Errors"
* * the /"Common Problems with SSL" manpage
* * "Common Problems with SSL"
* * the /"Using Non-Blocking Sockets" manpage
* * "Using Non-Blocking Sockets"
* * the /"Advanced Usage" manpage
* * "Advanced Usage"
* * the /"Integration Into Own Modules" manpage
* * "Integration Into Own Modules"
* * the /"Description Of Methods" manpage
* * "Description Of Methods"
Additional documentation can be found in
* * the IO::Socket::SSL::Intercept manpage - Doing Man-In-The-Middle with
SSL
* * IO::Socket::SSL::Intercept - Doing Man-In-The-Middle with SSL
* * the IO::Socket::SSL::Utils manpage - Useful functions for certificates
etc
* * IO::Socket::SSL::Utils - Useful functions for certificates etc
%prep
%setup -q -n %{cpan_name}-%{version}
find . -type f ! -name \*.pl -print0 | xargs -0 chmod 644
%patch0 -p1
%patch1 -p1
%build
%{__perl} Makefile.PL INSTALLDIRS=vendor