11
0

Accepting request 304994 from devel:languages:perl:autoupdate

automatic update

OBS-URL: https://build.opensuse.org/request/show/304994
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/perl-IO-Socket-SSL?expand=0&rev=78
This commit is contained in:
Stephan Kulow
2015-05-02 08:04:16 +00:00
committed by Git OBS Bridge
parent d2e34d78bd
commit 38d252340c
4 changed files with 21 additions and 15 deletions

View File

@@ -1,3 +0,0 @@
version https://git-lfs.github.com/spec/v1
oid sha256:02bd7f17ceb492e396eca6627f50aaa2a3ddfcb5bfa3889ddf145383b0b179d9
size 193636

View File

@@ -0,0 +1,3 @@
version https://git-lfs.github.com/spec/v1
oid sha256:ff6887fc38e34dbaa9e077921724599c3e065e36e6cfd24be21f7ffe4faa9f51
size 194395

View File

@@ -1,3 +1,9 @@
-------------------------------------------------------------------
Sat May 2 05:55:10 UTC 2015 - coolo@suse.com
- updated to 2.013
see /usr/share/doc/packages/perl-IO-Socket-SSL/Changes
-------------------------------------------------------------------
Fri Apr 17 12:32:39 UTC 2015 - vcizek@suse.com

View File

@@ -17,16 +17,16 @@
Name: perl-IO-Socket-SSL
Version: 2.012
Version: 2.013
Release: 0
%define cpan_name IO-Socket-SSL
Summary: Nearly transparent SSL encapsulation for IO::Socket::INET
License: Artistic-1.0 or GPL-1.0+
Group: Development/Libraries/Perl
Url: http://search.cpan.org/dist/IO-Socket-SSL/
Source: http://www.cpan.org/authors/id/S/SU/SULLR/%{cpan_name}-%{version}.tar.gz
Source0: http://www.cpan.org/authors/id/S/SU/SULLR/%{cpan_name}-%{version}.tar.gz
Source1: cpanspec.yml
Patch: perl-IO-Socket-SSL_add_DHE-RSA_to_default_client_cipher_list.patch
Patch0: perl-IO-Socket-SSL_add_DHE-RSA_to_default_client_cipher_list.patch
BuildArch: noarch
BuildRoot: %{_tmppath}/%{name}-%{version}-build
BuildRequires: perl
@@ -38,14 +38,14 @@ Requires: perl(Net::SSLeay) >= 1.46
%description
IO::Socket::SSL makes using SSL/TLS much easier by wrapping the necessary
functionality into the familiar the IO::Socket manpage interface and
providing secure defaults whenever possible. This way existing applications
can be made SSL-aware without much effort, at least if you do blocking I/O
and don't use select or poll.
providing secure defaults whenever possible. This way, existing
applications can be made SSL-aware without much effort, at least if you do
blocking I/O and don't use select or poll.
But, under the hood SSL is a complex beast. So there are lots of methods to
make it do what you need if the default behavior is not adequate. Because
it is easy to inadvertently introduce critical security bugs or just
getting hard to debug problems, I would recommend to study the following
But, under the hood, SSL is a complex beast. So there are lots of methods
to make it do what you need if the default behavior is not adequate.
Because it is easy to inadvertently introduce critical security bugs or
just hard to debug problems, I would recommend studying the following
documentation carefully.
The documentation consists of the following parts:
@@ -78,7 +78,7 @@ Additional documentation can be found in
%prep
%setup -q -n %{cpan_name}-%{version}
%patch -p1
%patch0 -p1
%build
%{__perl} Makefile.PL INSTALLDIRS=vendor
@@ -94,6 +94,6 @@ Additional documentation can be found in
%files -f %{name}.files
%defattr(-,root,root,755)
%doc BUGS Changes example README README.Win32
%doc BUGS Changes docs example README README.Win32
%changelog