Update to 2.044
- New upstream release 2.044 - Protect various 'eval'-based capability detections at startup with a localized __DIE__ handler; this way, dynamically requiring IO::Socket::SSL as done by various third party software should cause less problems even if there is a global __DIE__ handler that does not properly deal with 'eval' - Update patches as needed
This commit is contained in:
parent
6a30f8ffc4
commit
157e4fc48f
@ -1,6 +1,6 @@
|
||||
--- lib/IO/Socket/SSL.pm
|
||||
+++ lib/IO/Socket/SSL.pm
|
||||
@@ -97,7 +97,7 @@ my $algo2digest = do {
|
||||
@@ -99,7 +99,7 @@ my $algo2digest = do {
|
||||
# global defaults
|
||||
my %DEFAULT_SSL_ARGS = (
|
||||
SSL_check_crl => 0,
|
||||
@ -9,7 +9,7 @@
|
||||
SSL_verify_callback => undef,
|
||||
SSL_verifycn_scheme => undef, # fallback cn verification
|
||||
SSL_verifycn_publicsuffix => undef, # fallback default list verification
|
||||
@@ -2219,7 +2219,7 @@ sub new {
|
||||
@@ -2227,7 +2227,7 @@ sub new {
|
||||
|
||||
my $ssl_op = $DEFAULT_SSL_OP;
|
||||
|
@ -1,6 +1,6 @@
|
||||
--- lib/IO/Socket/SSL.pm
|
||||
+++ lib/IO/Socket/SSL.pm
|
||||
@@ -105,10 +105,10 @@ my %DEFAULT_SSL_ARGS = (
|
||||
@@ -107,10 +107,10 @@ my %DEFAULT_SSL_ARGS = (
|
||||
SSL_npn_protocols => undef, # meaning depends whether on server or client side
|
||||
SSL_alpn_protocols => undef, # list of protocols we'll accept/send, for example ['http/1.1','spdy/3.1']
|
||||
|
||||
@ -15,7 +15,7 @@
|
||||
);
|
||||
|
||||
my %DEFAULT_SSL_CLIENT_ARGS = (
|
||||
@@ -118,63 +118,6 @@ my %DEFAULT_SSL_CLIENT_ARGS = (
|
||||
@@ -120,63 +120,6 @@ my %DEFAULT_SSL_CLIENT_ARGS = (
|
||||
SSL_ca_file => undef,
|
||||
SSL_ca_path => undef,
|
||||
|
@ -1,13 +1,13 @@
|
||||
Name: perl-IO-Socket-SSL
|
||||
Version: 2.043
|
||||
Version: 2.044
|
||||
Release: 1%{?dist}
|
||||
Summary: Perl library for transparent SSL
|
||||
Group: Development/Libraries
|
||||
License: GPL+ or Artistic
|
||||
URL: http://search.cpan.org/dist/IO-Socket-SSL/
|
||||
Source0: http://search.cpan.org/CPAN/authors/id/S/SU/SULLR/IO-Socket-SSL-%{version}.tar.gz
|
||||
Patch0: IO-Socket-SSL-2.042-use-system-default-cipher-list.patch
|
||||
Patch1: IO-Socket-SSL-2.042-use-system-default-SSL-version.patch
|
||||
Patch0: IO-Socket-SSL-2.044-use-system-default-cipher-list.patch
|
||||
Patch1: IO-Socket-SSL-2.044-use-system-default-SSL-version.patch
|
||||
BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(id -nu)
|
||||
BuildArch: noarch
|
||||
# Module Build
|
||||
@ -116,6 +116,14 @@ rm -rf %{buildroot}
|
||||
%{_mandir}/man3/IO::Socket::SSL::Utils.3*
|
||||
|
||||
%changelog
|
||||
* Thu Jan 26 2017 Paul Howarth <paul@city-fan.org> - 2.044-1
|
||||
- Update to 2.044
|
||||
- Protect various 'eval'-based capability detections at startup with a
|
||||
localized __DIE__ handler; this way, dynamically requiring IO::Socket::SSL
|
||||
as done by various third party software should cause less problems even if
|
||||
there is a global __DIE__ handler that does not properly deal with 'eval'
|
||||
- Update patches as needed
|
||||
|
||||
* Fri Jan 6 2017 Paul Howarth <paul@city-fan.org> - 2.043-1
|
||||
- Update to 2.043
|
||||
- Enable session ticket callback with Net::SSLeay ≥ 1.80
|
||||
|
2
sources
2
sources
@ -1 +1 @@
|
||||
SHA512 (IO-Socket-SSL-2.043.tar.gz) = 91a49211c8aea107bdcfd886b276e3329f3e62fccce94c1700cd881d2282236b1f5714263dd4a9a3192c9f0bac0b73e11a0e19d18949855252994ed400462886
|
||||
SHA512 (IO-Socket-SSL-2.044.tar.gz) = 2c92494f795a6dbad8636636e69131689512d6a4c5da68ee19f2fc807b9e7a368b62936a772c3b9aa0d3a1c6bbb7dcf118bb501a30ba91830edeb768b1ce556e
|
||||
|
Loading…
Reference in New Issue
Block a user