pghmcfc pushed to perl-IO-Socket-SSL (master). "Update to 2.015 (..more)"
notifications at fedoraproject.org
notifications at fedoraproject.org
Thu May 14 12:43:20 UTC 2015
From 31561d8aa2a01ace3a1f0813188bbcd1f6c62a81 Mon Sep 17 00:00:00 2001
From: Paul Howarth <paul at city-fan.org>
Date: Thu, 14 May 2015 13:33:34 +0100
Subject: Update to 2.015
- New upstream release 2.015
- Work around problem with IO::Socket::INET6 on Windows, by explicitly using
Domain AF_INET in the tests (CPAN RT#104226)
diff --git a/IO-Socket-SSL-2.013-use-system-default-SSL-version.patch b/IO-Socket-SSL-2.013-use-system-default-SSL-version.patch
deleted file mode 100644
index 8db2ed0..0000000
--- a/IO-Socket-SSL-2.013-use-system-default-SSL-version.patch
+++ /dev/null
@@ -1,36 +0,0 @@
---- lib/IO/Socket/SSL.pm
-+++ lib/IO/Socket/SSL.pm
-@@ -85,7 +85,7 @@ my $algo2digest = do {
- # global defaults
- my %DEFAULT_SSL_ARGS = (
- SSL_check_crl => 0,
-- SSL_version => 'SSLv23:!SSLv3:!SSLv2', # consider both SSL3.0 and SSL2.0 as broken
-+ SSL_version => '',
- SSL_verify_callback => undef,
- SSL_verifycn_scheme => undef, # fallback cn verification
- SSL_verifycn_publicsuffix => undef, # fallback default list verification
-@@ -2119,7 +2119,7 @@ WARN
- $ssl_op |= &Net::SSLeay::OP_SINGLE_DH_USE;
- $ssl_op |= &Net::SSLeay::OP_SINGLE_ECDH_USE if $can_ecdh;
-
-- my $ver;
-+ my $ver = '';
- for (split(/\s*:\s*/,$arg_hash->{SSL_version})) {
- m{^(!?)(?:(SSL(?:v2|v3|v23|v2/3))|(TLSv1(?:_?[12])?))$}i
- or croak("invalid SSL_version specified");
---- lib/IO/Socket/SSL.pod
-+++ lib/IO/Socket/SSL.pod
-@@ -930,11 +930,12 @@ protocol to the specified version.
- All values are case-insensitive. Instead of 'TLSv1_1' and 'TLSv1_2' one can
- also use 'TLSv11' and 'TLSv12'. Support for 'TLSv1_1' and 'TLSv1_2' requires
- recent versions of Net::SSLeay and openssl.
-+The default SSL_version is defined by the underlying cryptographic library.
-
- Independent from the handshake format you can limit to set of accepted SSL
- versions by adding !version separated by ':'.
-
--The default SSL_version is 'SSLv23:!SSLv3:!SSLv2' which means, that the
-+For example, 'SSLv23:!SSLv3:!SSLv2' means that the
- handshake format is compatible to SSL2.0 and higher, but that the successful
- handshake is limited to TLS1.0 and higher, that is no SSL2.0 or SSL3.0 because
- both of these versions have serious security issues and should not be used
diff --git a/IO-Socket-SSL-2.015-use-system-default-SSL-version.patch b/IO-Socket-SSL-2.015-use-system-default-SSL-version.patch
new file mode 100644
index 0000000..051c4d5
--- /dev/null
+++ b/IO-Socket-SSL-2.015-use-system-default-SSL-version.patch
@@ -0,0 +1,36 @@
+--- lib/IO/Socket/SSL.pm
++++ lib/IO/Socket/SSL.pm
+@@ -85,7 +85,7 @@ my $algo2digest = do {
+ # global defaults
+ my %DEFAULT_SSL_ARGS = (
+ SSL_check_crl => 0,
+- SSL_version => 'SSLv23:!SSLv3:!SSLv2', # consider both SSL3.0 and SSL2.0 as broken
++ SSL_version => '',
+ SSL_verify_callback => undef,
+ SSL_verifycn_scheme => undef, # fallback cn verification
+ SSL_verifycn_publicsuffix => undef, # fallback default list verification
+@@ -2120,7 +2120,7 @@ WARN
+ $ssl_op |= &Net::SSLeay::OP_SINGLE_DH_USE;
+ $ssl_op |= &Net::SSLeay::OP_SINGLE_ECDH_USE if $can_ecdh;
+
+- my $ver;
++ my $ver = '';
+ for (split(/\s*:\s*/,$arg_hash->{SSL_version})) {
+ m{^(!?)(?:(SSL(?:v2|v3|v23|v2/3))|(TLSv1(?:_?[12])?))$}i
+ or croak("invalid SSL_version specified");
+--- lib/IO/Socket/SSL.pod
++++ lib/IO/Socket/SSL.pod
+@@ -930,11 +930,12 @@ protocol to the specified version.
+ All values are case-insensitive. Instead of 'TLSv1_1' and 'TLSv1_2' one can
+ also use 'TLSv11' and 'TLSv12'. Support for 'TLSv1_1' and 'TLSv1_2' requires
+ recent versions of Net::SSLeay and openssl.
++The default SSL_version is defined by the underlying cryptographic library.
+
+ Independent from the handshake format you can limit to set of accepted SSL
+ versions by adding !version separated by ':'.
+
+-The default SSL_version is 'SSLv23:!SSLv3:!SSLv2' which means, that the
++For example, 'SSLv23:!SSLv3:!SSLv2' means that the
+ handshake format is compatible to SSL2.0 and higher, but that the successful
+ handshake is limited to TLS1.0 and higher, that is no SSL2.0 or SSL3.0 because
+ both of these versions have serious security issues and should not be used
diff --git a/perl-IO-Socket-SSL.spec b/perl-IO-Socket-SSL.spec
index 704a5e6..e90f637 100644
--- a/perl-IO-Socket-SSL.spec
+++ b/perl-IO-Socket-SSL.spec
@@ -1,5 +1,5 @@
Name: perl-IO-Socket-SSL
-Version: 2.014
+Version: 2.015
Release: 1%{?dist}
Summary: Perl library for transparent SSL
Group: Development/Libraries
@@ -7,7 +7,7 @@ License: GPL+ or Artistic
URL: http://search.cpan.org/dist/IO-Socket-SSL/
Source0: http://search.cpan.org/CPAN/authors/id/S/SU/SULLR/IO-Socket-SSL-%{version}.tar.gz
Patch0: IO-Socket-SSL-2.013-use-system-default-cipher-list.patch
-Patch1: IO-Socket-SSL-2.013-use-system-default-SSL-version.patch
+Patch1: IO-Socket-SSL-2.015-use-system-default-SSL-version.patch
BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(id -nu)
BuildArch: noarch
# Module Build
@@ -112,6 +112,11 @@ rm -rf %{buildroot}
%{_mandir}/man3/IO::Socket::SSL::Utils.3*
%changelog
+* Thu May 14 2015 Paul Howarth <paul at city-fan.org> - 2.015-1
+- Update to 2.015
+ - Work around problem with IO::Socket::INET6 on Windows, by explicitly using
+ Domain AF_INET in the tests (CPAN RT#104226)
+
* Tue May 5 2015 Paul Howarth <paul at city-fan.org> - 2.014-1
- Update to 2.014
- Utils::CERT_create - work around problems with authorityInfoAccess, where
diff --git a/sources b/sources
index dabcedc..166d336 100644
--- a/sources
+++ b/sources
@@ -1 +1 @@
-b776bec337b83bbae2753647e0cdbf8c IO-Socket-SSL-2.014.tar.gz
+e66ba9c52143efb67cb3eea0f12ee5f8 IO-Socket-SSL-2.015.tar.gz
--
cgit v0.10.2
http://pkgs.fedoraproject.org/cgit/perl-IO-Socket-SSL.git/commit/?h=master&id=31561d8aa2a01ace3a1f0813188bbcd1f6c62a81
More information about the perl-devel
mailing list