Hello community,
here is the log from the commit of package perl-Net-SSLGlue for openSUSE:Factory
checked in at Wed Jun 1 10:37:56 CEST 2011.
--------
--- perl-Net-SSLGlue/perl-Net-SSLGlue.changes 2011-03-31 13:53:37.000000000 +0200
+++ /mounts/work_src_done/STABLE/perl-Net-SSLGlue/perl-Net-SSLGlue.changes 2011-05-04 13:03:59.000000000 +0200
@@ -1,0 +2,6 @@
+Wed May 4 10:56:06 UTC 2011 - coolo@opensuse.org
+
+- updated to 0.6
+ fixed english, thanks to dom, https://rt.cpan.org/Ticket/Display.html?id=46284
+
+-------------------------------------------------------------------
calling whatdependson for head-i586
Old:
----
Net-SSLGlue-0.5.tar.gz
New:
----
Net-SSLGlue-0.6.tar.gz
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ perl-Net-SSLGlue.spec ++++++
--- /var/tmp/diff_new_pack.xXnBYJ/_old 2011-06-01 10:37:31.000000000 +0200
+++ /var/tmp/diff_new_pack.xXnBYJ/_new 2011-06-01 10:37:31.000000000 +0200
@@ -18,15 +18,14 @@
Name: perl-Net-SSLGlue
-Version: 0.5
+Version: 0.6
Release: 1
-License: CHECK(Distributable)
+License: GPL+ or Artistic
%define cpan_name Net-SSLGlue
Summary: add/extend SSL support for common perl modules
Url: http://search.cpan.org/dist/Net-SSLGlue/
Group: Development/Libraries/Perl
-#Source: http://www.cpan.org/authors/id/S/SU/SULLR/Net-SSLGlue-%{version}.tar.gz
-Source: %{cpan_name}-%{version}.tar.gz
+Source: http://www.cpan.org/authors/id/S/SU/SULLR/%{cpan_name}-%{version}.tar.gz
BuildArch: noarch
BuildRoot: %{_tmppath}/%{name}-%{version}-build
BuildRequires: perl
@@ -37,11 +36,12 @@
%description
Some commonly used perl modules don't have SSL support at all, even if the
-protocol would support it. Others have SSL support, but most of them don't
-do proper checking of the servers certificate.
+protocol supports it. Others have SSL support, but most of them don't do
+proper checking of the server's certificate.
The 'Net::SSLGlue::*' modules try to add SSL support or proper certificate
-to these modules. Currently is support for the following modules available:
+checking to these modules. Currently support for the following modules is
+available:
* Net::SMTP - add SSL from beginning or using STARTTLS
@@ -68,7 +68,7 @@
%{__rm} -rf %{buildroot}
%files -f %{name}.files
-%defattr(644,root,root,755)
-%doc Changes COPYRIGHT README TODO
+%defattr(-,root,root,755)
+%doc Changes COPYRIGHT examples README TODO
%changelog
++++++ Net-SSLGlue-0.5.tar.gz -> Net-SSLGlue-0.6.tar.gz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/Net-SSLGlue-0.5/Changes new/Net-SSLGlue-0.6/Changes
--- old/Net-SSLGlue-0.5/Changes 2011-02-03 19:44:35.000000000 +0100
+++ new/Net-SSLGlue-0.6/Changes 2011-05-02 17:46:15.000000000 +0200
@@ -1,3 +1,6 @@
+0.6 2011/05/02
+fixed english, thanks to dom, https://rt.cpan.org/Ticket/Display.html?id=46284
+
0.5 2011/02/03
documentation fixes: http://rt.cpan.org/Ticket/Display.html?id=65258
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/Net-SSLGlue-0.5/META.yml new/Net-SSLGlue-0.6/META.yml
--- old/Net-SSLGlue-0.5/META.yml 2011-02-03 19:46:15.000000000 +0100
+++ new/Net-SSLGlue-0.6/META.yml 2011-05-02 19:30:05.000000000 +0200
@@ -1,6 +1,6 @@
--- #YAML:1.0
name: Net-SSLGlue
-version: 0.5
+version: 0.6
abstract: ~
author: []
license: unknown
@@ -15,7 +15,7 @@
directory:
- t
- inc
-generated_by: ExtUtils::MakeMaker version 6.54
+generated_by: ExtUtils::MakeMaker version 6.55_02
meta-spec:
url: http://module-build.sourceforge.net/META-spec-v1.4.html
version: 1.4
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/Net-SSLGlue-0.5/lib/Net/SSLGlue/LDAP.pm new/Net-SSLGlue-0.6/lib/Net/SSLGlue/LDAP.pm
--- old/Net-SSLGlue-0.5/lib/Net/SSLGlue/LDAP.pm 2009-01-02 22:59:21.000000000 +0100
+++ new/Net-SSLGlue-0.6/lib/Net/SSLGlue/LDAP.pm 2011-05-02 17:42:11.000000000 +0200
@@ -43,13 +43,13 @@
LNet::SSLGlue::LDAP modifies LNet::LDAP so that it does proper certificate
checking using the C<ldap> SSL_verify_scheme from LIO::Socket::SSL.
-Because LNet::LDAP does not have a mechanism to forward arbitrary parameter for
+Because LNet::LDAP does not have a mechanism to forward arbitrary parameters for
the construction of the underlying socket these parameters can be set globally
-when including the package or with local settings of the
+when including the package, or with local settings of the
C<%Net::SSLGlue::LDAP::SSLopts> variable.
-All of the C parameter from LIO::Socket::SSL can be used, especially
-the following parameter is useful:
+All of the C parameters from LIO::Socket::SSL can be used; the
+following parameter is especially useful:
=over 4
@@ -57,7 +57,7 @@
Usually the name given as the hostname in the constructor is used to verify the
identity of the certificate. If you want to check the certificate against
-another name you might specify it with this parameter.
+another name you can specify it with this parameter.
=back
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/Net-SSLGlue-0.5/lib/Net/SSLGlue/LWP.pm new/Net-SSLGlue-0.6/lib/Net/SSLGlue/LWP.pm
--- old/Net-SSLGlue-0.5/lib/Net/SSLGlue/LWP.pm 2010-05-13 21:58:35.000000000 +0200
+++ new/Net-SSLGlue-0.6/lib/Net/SSLGlue/LWP.pm 2011-05-02 17:42:11.000000000 +0200
@@ -160,35 +160,35 @@
=head1 DESCRIPTION
LNet::SSLGlue::LWP modifies LNet::HTTPS and LLWP::Protocol::https so that
-LNet::HTTPS is forced to use LIO::Socket::SSL instead of LCrypt::SSLeay
+LNet::HTTPS is forced to use LIO::Socket::SSL instead of LCrypt::SSLeay,
and that LLWP::Protocol::https does proper certificate checking using the
C<http> SSL_verify_scheme from LIO::Socket::SSL.
-Because L<LWP> does not have a mechanism to forward arbitrary parameter for
+Because L<LWP> does not have a mechanism to forward arbitrary parameters for
the construction of the underlying socket these parameters can be set globally
-when including the package or with local settings of the
+when including the package, or with local settings of the
C<%Net::SSLGlue::LWP::SSLopts> variable.
-All of the C parameter from LIO::Socket::SSL can be used, especially
-the following parameters are useful:
+All of the C parameter from LIO::Socket::SSL can be used; the
+following parameters are especially useful:
=over 4
=item SSL_ca_path, SSL_ca_file
Specifies the path or a file where the CAs used for checking the certificates
-are located. Typical for UNIX systems is L.
+are located. This is typically L on UNIX systems.
=item SSL_verify_mode
-If set to 0 disabled verification of the certificate. By default it is 1 which
-means, that the peer certificate is checked.
+If set to 0, verification of the certificate will be disabled. By default
+it is set to 1 which means that the peer certificate is checked.
=item SSL_verifycn_name
Usually the name given as the hostname in the constructor is used to verify the
identity of the certificate. If you want to check the certificate against
-another name you might specify it with this parameter.
+another name you can specify it with this parameter.
=back
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/Net-SSLGlue-0.5/lib/Net/SSLGlue/SMTP.pm new/Net-SSLGlue-0.6/lib/Net/SSLGlue/SMTP.pm
--- old/Net-SSLGlue-0.5/lib/Net/SSLGlue/SMTP.pm 2011-02-03 19:45:28.000000000 +0100
+++ new/Net-SSLGlue-0.6/lib/Net/SSLGlue/SMTP.pm 2011-05-02 17:45:02.000000000 +0200
@@ -121,10 +121,10 @@
=head1 DESCRIPTION
-LNet::SSLGlue::SMTP expands LNet::SMTP so one can either start directly with SSL
+LNet::SSLGlue::SMTP extends LNet::SMTP so one can either start directly with SSL
or switch later to SSL using the STARTTLS command.
-By default it will take care to verfify the certificate according to the rules
+By default it will take care to verify the certificate according to the rules
for SMTP implemented in LIO::Socket::SSL.
=head1 METHODS
@@ -153,26 +153,26 @@
=back
All of these methods can take the C parameter from LIO::Socket::SSL to
-change the behavior of the SSL connection. Especially the following parameter
-are useful:
+change the behavior of the SSL connection. The following parameters are
+especially useful:
=over 4
=item SSL_ca_path, SSL_ca_file
Specifies the path or a file where the CAs used for checking the certificates
-are located. Typical for UNIX systems is L.
+are located. This is typically L on UNIX systems.
=item SSL_verify_mode
-If set to 0 disabled verification of the certificate. By default it is 1 which
-means, that the peer certificate is checked.
+If set to 0, verification of the certificate will be disabled. By default
+it is set to 1 which means that the peer certificate is checked.
=item SSL_verifycn_name
Usually the name given as the hostname in the constructor is used to verify the
identity of the certificate. If you want to check the certificate against
-another name you might specify it with this parameter.
+another name you can specify it with this parameter.
=back
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/Net-SSLGlue-0.5/lib/Net/SSLGlue.pm new/Net-SSLGlue-0.6/lib/Net/SSLGlue.pm
--- old/Net-SSLGlue-0.5/lib/Net/SSLGlue.pm 2011-02-03 19:45:01.000000000 +0100
+++ new/Net-SSLGlue-0.6/lib/Net/SSLGlue.pm 2011-05-02 17:46:39.000000000 +0200
@@ -1,5 +1,5 @@
package Net::SSLGlue;
-our $VERSION = 0.5;
+our $VERSION = 0.6;
=head1 NAME
@@ -8,11 +8,12 @@
=head1 DESCRIPTION
Some commonly used perl modules don't have SSL support at all, even if the
-protocol would support it. Others have SSL support, but most of them don't do
-proper checking of the servers certificate.
+protocol supports it. Others have SSL support, but most of them don't do
+proper checking of the server's certificate.
-The CNet::SSLGlue::* modules try to add SSL support or proper certificate to
-these modules. Currently is support for the following modules available:
+The CNet::SSLGlue::* modules try to add SSL support or proper certificate
+checking to these modules. Currently support for the following modules is
+available:
=over 4
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Remember to have fun...
--
To unsubscribe, e-mail: opensuse-commit+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-commit+help@opensuse.org