perl-IO-Socket-SSL/perl-IO-Socket-SSL.spec
Pedro Monreal Gonzalez 3641a27cb7 Accepting request 946047 from devel:languages:perl:autoupdate
- updated to 2.074
   see /usr/share/doc/packages/perl-IO-Socket-SSL/Changes
  2.074
  - add SSL_ciphersuites option for TLS 1.3 ciphers
  - no longer use own default for ciphers, instead use system default but disable
    some weak ciphers which might still be enabled on older systems

OBS-URL: https://build.opensuse.org/request/show/946047
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/perl-IO-Socket-SSL?expand=0&rev=132
2022-01-13 11:32:01 +00:00

96 lines
2.8 KiB
RPMSpec

#
# spec file for package perl-IO-Socket-SSL
#
# Copyright (c) 2022 SUSE LLC
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
# upon. The license for this file, and modifications and additions to the
# file, is the same license as for the pristine package itself (unless the
# license for the pristine package is not an Open Source License, in which
# case the license is the MIT License). An "Open Source License" is a
# license that conforms to the Open Source Definition (Version 1.9)
# published by the Open Source Initiative.
# Please submit bugfixes or comments via https://bugs.opensuse.org/
#
%define cpan_name IO-Socket-SSL
Name: perl-IO-Socket-SSL
Version: 2.074
Release: 0
Summary: Nearly transparent SSL encapsulation for IO::Socket::INET
License: Artistic-1.0 OR GPL-1.0-or-later
URL: https://metacpan.org/release/%{cpan_name}
Source0: https://cpan.metacpan.org/authors/id/S/SU/SULLR/%{cpan_name}-%{version}.tar.gz
Source1: cpanspec.yml
BuildArch: noarch
BuildRequires: perl
BuildRequires: perl-macros
#BuildRequires: perl(Mozilla::CA)
BuildRequires: perl(Net::SSLeay) >= 1.46
#Requires: perl(Mozilla::CA)
Requires: perl(Net::SSLeay) >= 1.46
%{perl_requires}
%description
IO::Socket::SSL makes using SSL/TLS much easier by wrapping the necessary
functionality into the familiar IO::Socket interface and providing secure
defaults whenever possible. This way, existing applications can be made
SSL-aware without much effort, at least if you do blocking I/O and don't
use select or poll.
But, under the hood, SSL is a complex beast. So there are lots of methods
to make it do what you need if the default behavior is not adequate.
Because it is easy to inadvertently introduce critical security bugs or
just hard to debug problems, I would recommend studying the following
documentation carefully.
The documentation consists of the following parts:
* * "Essential Information About SSL/TLS"
* * "Basic SSL Client"
* * "Basic SSL Server"
* * "Common Usage Errors"
* * "Common Problems with SSL"
* * "Using Non-Blocking Sockets"
* * "Advanced Usage"
* * "Integration Into Own Modules"
* * "Description Of Methods"
Additional documentation can be found in
* * IO::Socket::SSL::Intercept - Doing Man-In-The-Middle with SSL
* * IO::Socket::SSL::Utils - Useful functions for certificates etc
%prep
%autosetup -n %{cpan_name}-%{version}
find . -type f ! -path "*/t/*" ! -name "*.pl" ! -path "*/bin/*" ! -path "*/script/*" ! -name "configure" -print0 | xargs -0 chmod 644
%build
perl Makefile.PL INSTALLDIRS=vendor
%make_build
%check
make test
%install
%perl_make_install
%perl_process_packlist
%perl_gen_filelist
%files -f %{name}.files
%doc BUGS Changes docs example README README.Win32
%changelog