aboutsummaryrefslogtreecommitdiffstats
path: root/meta-perl
AgeCommit message (Collapse)Author
2018-11-02adduser: 3.117 -> 3.118Kai Kang
Upgrade adduser from 3.117 to 3.118. * set S Signed-off-by: Kai Kang <kai.kang@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
2018-11-02libio-socket-ssl-perl: 2.059 -> 2.060Kai Kang
Signed-off-by: Kai Kang <kai.kang@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
2018-10-23adduser: Update SRC_URIMingli Yu
Update SRC_URI for adduser as the previous one is invalid. Signed-off-by: Mingli Yu <Mingli.Yu@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
2018-10-16libnet-dns-perl: upgrade 1.17 -> 1.18; enable ptestTim Orling
* Add UPSTREAM_CHECK_REGEX to ignore DEV releases * Add RDEPENDS that were missing * Enable ptest and add RDEPENDS for tests * Add RRECOMMENDS for libnet-dns-sec-perl * Upstream release notes: """ **** 1.18 Sep 21, 2018 Documentation revised to remove ambigous use of "answer" which has been used to refer to both the answer section of a packet and the entire reply packet received from a nameserver. Fix rt.cpan.org #127018 Net::DNS::ZoneFile->parse() fails if include directory specified. Fix rt.cpan.org #127012 DNS resolution broken when options ndots used in /etc/resolv.conf """ Signed-off-by: Tim Orling <timothy.t.orling@linux.intel.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
2018-10-16libnet-dns-sec-perl: add recipe for 1.10Tim Orling
Net::DNS::SEC is installed as an extension to an existing Net::DNS installation providing packages to support DNSSEC as specified in RFC4033, RFC4034, RFC4035 and related documents. It also provides support for SIG0 which is useful for dynamic updates. Implements cryptographic signature generation and verification functions using RSA, DSA, ECDSA, and Edwards curve algorithms. The extended features are made available by replacing Net::DNS by Net::DNS::SEC in the use declaration. Signed-off-by: Tim Orling <timothy.t.orling@linux.intel.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
2018-09-30layers: Update layer compatibility to thudKhem Raj
Signed-off-by: Khem Raj <raj.khem@gmail.com> Cc: Andreas Müller <schnitzeltony@googlemail.com> Cc: Derek Straka <derek@asterius.io> Cc: Tim Orling <TicoTimo@gmail.com> Cc: Hongxu Jia <hongxu.jia@windriver.com> Cc: Armin Kuster <akuster808@gmail.com> Cc: Joe MacDonald <joe_macdonald@mentor.com> Cc: Andrea Adami <andrea.adami@gmail.com>
2018-08-28libnet-ssleay-perl: Fix configure issueJens Rehsack
Fix libnet-ssleay-perl tries to execute found openssl binaries at the place of ${OPENSSL_PREFIX} and bailing out when either binaries are missing or can't be executed. From cross-compiling perspective, both is insane. Signed-off-by: Jens Rehsack <sno@netbsd.org> Signed-off-by: Khem Raj <raj.khem@gmail.com>
2018-08-28libcrypt-openssl-rsa-perl: Update to 0.30Jens Rehsack
Update recipe for CPAN hosted Perl5 module Crypt::OpenSSL::RSA from 0.28 to 0.30 to fix build issues when using openssl 1.1 and to express our love to the Perl Programming Language. LICENSE checksum updated because of: f0a2ed2 Purge trailing whitespace Changes since 0.28: https://metacpan.org/changes/release/TODDR/Crypt-OpenSSL-RSA-0.30 Signed-off-by: Jens Rehsack <sno@netbsd.org> Signed-off-by: Khem Raj <raj.khem@gmail.com>
2018-08-28libcrypt-openssl-guess: Add recipeJens Rehsack
Add recipe for CPAN hosted Perl5 module Crypt::OpenSSL::Guess version 0.11 as prerequisite for libcrypt-openssl-rsa-perl update to express our love for the Perl Programming Language. Signed-off-by: Jens Rehsack <sno@netbsd.org> Signed-off-by: Khem Raj <raj.khem@gmail.com>
2018-08-24libio-socket-ssl-perl: 2.058 -> 2.059Kai Kang
Signed-off-by: Kai Kang <kai.kang@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
2018-08-08logcheck: 1.3.18 -> 1.3.19Kang Kai
Upgrade logcheck from 1.3.18 to 1.3.19. * update SRC_URI to replace git repo with tarball that saves some space Signed-off-by: Kai Kang <kai.kang@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
2018-08-08libio-socket-ssl-perl: 2.054 -> 2.508Kang Kai
Signed-off-by: Kai Kang <kai.kang@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
2018-08-08libnet-ssleay-perl: 1.84 -> 1.85Kang Kai
Signed-off-by: Kai Kang <kai.kang@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
2018-08-08libnet-dns-perl: 1.14 -> 1.17Kang Kai
Upgrade libnet-dns-perl from 1.14 to 1.17. * correct LICENSE which should be MIT Signed-off-by: Kai Kang <kai.kang@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
2018-08-08adduser: 3.116 -> 3.117Kang Kai
Upgrade adduser from 3.116 to 3.117. * remove redefine of S Signed-off-by: Kai Kang <kai.kang@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
2018-06-27logcheck: Update the repo linkLiu Haitao
The https://anonscm.debian.org and https://alioth.debian.org service have been discontinued. They are replaced by salsa.debian.org. Signed-off-by: Liu Haitao <haitao.liu@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
2018-06-05adduser: fix HOMEPAGEOleksandr Kravchuk
Signed-off-by: Oleksandr Kravchuk <dev@sashko.rv.ua> Signed-off-by: Khem Raj <raj.khem@gmail.com>
2018-04-13meta-*: add LAYERSERIES_COMPAT to layer.conf filesMartin Jansa
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
2018-04-08libtest-harness-perl: upgrade v3.39 -> v3.42; inherit ptest-perlTim Orling
* Remove tests which require "-T" (taint) command line option * Remove tests which are inappropriate for on-target testing * Install "prove" to /usr/local/bin to avoid conflict with perl-misc Upstream release notes: 3.42 19-03-2018 - Enable rulesfile.t to run in core 3.41 27-02-2018 - Released 3.40_01 without code modifications 3.40_01 23-07-2017 - Return handle for pipes and sockets #58 (Erik Huelsmann) - TAP v13 plan allows trailing whitespace (Steffen Schwigon) - prove: add a --statefile=<path> option to customize the .prove file (Ævar Arnfjörð Bjarmason) - Avoid non-deterministic source handling, make a SourceHandler tie an error. (Michael Schwern, Leon Timmermans) - Fix and simplify MSWin32 colorization (Roy Ivy III) - Fix file source handler to accept single extensions option (Tomoki Aonuma) - Spelling fixes (Brian Wightman) Signed-off-by: Tim Orling <timothy.t.orling@linux.intel.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
2018-03-01libmodule-runtime-perl: upgrade to 0.016, use upstreamTim Orling
Upstream has fixed build system to use EUMM, so we no longer need the fix on github.com/moto-timo. Add UPSTREAM_CHECK_REGEX to ensure we catch future updates. Extended the license checksum to include the Copyright. The length of the README file has changed, so the checksum has changed. Verified that the license remains the same. Signed-off-by: Tim Orling <timothy.t.orling@linux.intel.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
2018-03-01libmodule-pluggable-perl: use upstream instead of github.com/moto-timoTim Orling
Upstream has updated the build system to use EUMM, so the fix on github.com/moto-timo is no longer needed. Because the versions where out of sync, reflect the bump in PR. Add UPSTREAM_CHECK_REGEX to properly catch upstream updates. Signed-off-by: Tim Orling <timothy.t.orling@linux.intel.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
2018-02-11libmime-types-perl: upgrade 2.14 -> 2.17Tim Orling
* Fix RDEPENDS * Install bin/collect-types Signed-off-by: Tim Orling <timothy.t.orling@linux.intel.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
2018-02-11libio-socket-ssl-perl: upgrade from 2.052 -> 2.054Tim Orling
Changes: 2.054 2018/01/22 - added missing test certificates to MANIFEST 2.053 2018/01/21 - small behavior fixes - if SSL_fingerprint is used and matches don't check for OCSP - Utils::CERT_create - small fixes to properly specific purpose, ability to use predefined complex purpose but disable some features - update PublicSuffix - updates for documentation, especially regarding pitfalls with forking or using non-blocking sockets. Spelling fixes. - test fixes and improvements - stability improvements for live tests - regenerate certificate in certs/ and make sure they are limited to the correct purpose. Checkin program used to generate certificates. - adjust tests since certificates have changed and some tests used certificates intended for client authentication as server certificates, which now no longer works Signed-off-by: Tim Orling <timothy.t.orling@linux.intel.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
2018-02-11libencode-perl: upgrade 2.83 -> 2.94Tim Orling
* Fix RDEPENDS * RCONFLICTS with perl-misc * LIC_FILES_CHKSUM is based on META.json, which has changed but license remains the same Changes: 2.94 2018/01/09 05:53:00 ! lib/Encode/Alias.pm Fixed: deep recursion in Encode::find_encoding when decoding bad MIME header https://github.com/dankogai/p5-encode/pull/127 ! Encode.pm Pulled: Include more information about Encode::is_utf8() that it should not be normally used https://github.com/dankogai/p5-encode/pull/126 Pulled: Remove misleading documentation about UTF8 flag https://github.com/dankogai/p5-encode/pull/125 2.93 2017/10/06 22:21:53 ! lib/Encode/MIME/Name.pm t/mime-name.t Pulled: Add "euc-cn" => "EUC-CN" alias to Encode::MIME::Name https://github.com/dankogai/p5-encode/pull/124 ! encoding.pm Pulled: Propagate fatal errors from the encoding pragma back to the caller Resolves rt #100427 https://github.com/dankogai/p5-encode/pull/123 https://rt.cpan.org/Ticket/Display.html?id=100427 ! lib/Encode/CN/HZ.pm lib/Encode/JP/JIS7.pm lib/Encode/MIME/Header.pm t/decode.t Pulled: Uninitialized value fixes #122 https://github.com/dankogai/p5-encode/pull/122 ! Makefile.PL Pulled: Fix -Werror=declaration-after-statement for gcc 4.1.2 https://github.com/dankogai/p5-encode/pull/121 2.92 2017/07/18 07:15:29 ! Encode.pm MANIFEST lib/Encode/Alias.pm + t/use-Encode-Alias.t Pulled: Fix loading Encode::Alias before Encode https://github.com/dankogai/p5-encode/pull/118 ! Makefile.PL Pulled: Fix gccversion Argument "630 20170516" isn't numeric https://github.com/dankogai/p5-encode/pull/118 ! lib/Encode/MIME/Header.pm t/mime-header.t Pulled: Encode::MIME::Header: Fix parsing quoted-printable text in strict mode https://github.com/dankogai/p5-encode/pull/115 ! Encode.pm use define_encoding() instead of tweaking $Encode::Encoding{utf8}. https://github.com/dankogai/p5-encode/commit/208d094b8cf82da488495400ea9a518841fd007a#commitcomment-22698036 2.91 2017/06/22 08:11:05 ! Encode.pm Addressed: RT#122167: use parent q{Encode::Encoding}; fails: Can't locate object https://rt.cpan.org/Ticket/Display.html?id=122167 ! Makefile.PL Pulled: fix gcc warnings for older gcc < 4.0 https://github.com/dankogai/p5-encode/pull/114 2.90 2017/06/10 17:23:50 ! Makefile.PL Pulled: Include all contributors into META https://github.com/dankogai/p5-encode/pull/111 ! bin/enc2xs bin/ucmlint encoding.pm lib/Encode/Encoding.pm lib/Encode/GSM0338.pm t/CJKT.t Pulled: Where possible do not depend on value of $@, instead use return value of eval https://github.com/dankogai/p5-encode/pull/110 ! Encode.xs Pulled: Fix more XS problems in Encode.xs file https://github.com/dankogai/p5-encode/pull/109 ! encoding.pm lib/Encode/Encoding.pm t/guess.t Pulled: Small fixes https://github.com/dankogai/p5-encode/pull/108 ! Encode.pm Makefile.PL Pulled: Load modules Encode::MIME::Name and Storable normally https://github.com/dankogai/p5-encode/pull/107 ! Unicode/Unicode.pm lib/Encode/Alias.pm lib/Encode/Encoding.pm lib/Encode/Unicode/UTF7.pm Pulled: Remove no warnings 'redefine'; and correctly loaddependences https://github.com/dankogai/p5-encode/pull/106 ! Encode.pm Encode.xs Unicode/Unicode.pm Unicode/Unicode.xs Pulled: Remove PP stubs and reformat predefine_encodings() https://github.com/dankogai/p5-encode/pull/104 ! Encode.pm Encode.xs Pulled: Run Encode XS BOOT code at compile time https://github.com/dankogai/p5-encode/pull/103 ! Encode.pm Unicode/Unicode.pm lib/Encode/Encoding.pm lib/Encode/Guess.pm lib/Encode/JP/JIS7.pm lib/Encode/MIME/Header.pm lib/Encode/MIME/Header/ISO_2022_JP.pm Pulled: Use Encode::define_encoding and propagate carp/croak message https://github.com/dankogai/p5-encode/pull/102 ! t/truncated_utf8.t t/utf8messages.t Pulled: Fixes for older perl versions https://github.com/dankogai/p5-encode/pull/101 ! Encode.xs encoding.pm t/enc_eucjp.t t/enc_utf8.t Pulled: cperl fixes: encoding undeprecated, no strict hashpairs https://github.com/dankogai/p5-encode/pull/100 ! MANIFEST Pulled: Add missing tests into MANIFEST file https://github.com/dankogai/p5-encode/pull/99 ! Encode.xs t/fallback.t Pulled: Cleanup code for handling fallback/replacement characters https://github.com/dankogai/p5-encode/pull/98 2.89 2017/04/21 05:20:14 ! Encode.pm Encode.xs MANIFEST t/enc_eucjp.t t/enc_utf8.t + t/utf8messages.t Pulled: Fixes for Encode::utf8 https://github.com/dankogai/p5-encode/pull/97 ! Encode.pm Pulled: Fix documentation about CHECK coderef https://github.com/dankogai/p5-encode/pull/96 ! Encode.xs Pulled: For efficiency use newSVpvn() instead of newSVpv() in do_fallback_cb() https://github.com/dankogai/p5-encode/pull/95 ! Encode.xs Pulled Call Encode callback function with integer argument correctly https://github.com/dankogai/p5-encode/pull/94 ! lib/Encode/CN/HZ.pm lib/Encode/GSM0338.pm lib/Encode/JP/JIS7.pm lib/Encode/KR/2022_KR.pm lib/Encode/MIME/Header.pm lib/Encode/MIME/Header/ISO_2022_JP.pm lib/Encode/Unicode/UTF7.pm t/undef.t Pulled: Fix all Encode modules so their encode(undef) and decode(undef) calls returns undef https://github.com/dankogai/p5-encode/pull/93 + t/whatwg-aliases.json t/whatwg-aliases.t Pulled: New (failing) tests for aliases defined in WHATWG Encoding spec #92 https://github.com/dankogai/p5-encode/pull/92 ! Encode.pm Pulled: Update documentation for UTF-8 https://github.com/dankogai/p5-encode/pull/91 ! Encode.xs t/truncated_utf8.t Pulled: Consume correct number of bytes on malformed ! Encode.pm Unicode/Unicode.pm Pulled: document str2bytes and bytes2str https://github.com/dankogai/p5-encode/pull/86 ! Encode.xs t/fallback.t t/truncated_utf8.t Pulled: Fix appending correct number of Unicode replacement characters https://github.com/dankogai/p5-encode/pull/84 2.88 2016/11/29 23:29:23 ! t/taint.t Pulled: Fix test t/taint.t to pass when Encode::ConfigLocal is present https://github.com/dankogai/p5-encode/pull/83 ! Makefile.PL Unicode/Makefile.PL bin/enc2xs lib/Encode/Alias.pm t/Aliases.t t/enc_data.t t/enc_module.t t/encoding.t t/jperl.t Pulled: various fixes https://github.com/dankogai/p5-encode/pull/82 ! t/mime-header.t Pulled: Fix test t/mime-header.t to pass on HP-UX 11.23/64 U with perl v5.8.3 https://github.com/dankogai/p5-encode/pull/81 ! t/Encode.t Pulled: Extend COW tests for UTF-8 and Latin1 https://github.com/dankogai/p5-encode/pull/80 ! Encode.xs Unicode/Unicode.xs Pulled: Rmv impediment to compiling under C++11 https://github.com/dankogai/p5-encode/pull/78 ! Encode.xs Unicode/Unicode.xs Pulled: Do not use expressions in macros SvTRUE, SvPV, SvIV, attr and attr_true https://github.com/dankogai/p5-encode/pull/77 ! Unicode/Unicode.xs t/magic.t Pulled: Fix handling of undef, COW and magic scalar argument in Unicode.xs https://github.com/dankogai/p5-encode/pull/76 ! Encode.xs encoding.pm Fix 2 of 3 problems Steve Hay found. 1. C89 compiler failures (patch attached). 2. encoding.pm has changed slightly but has no $VERSION++ Message-Id: <CADED=K6ve_DAzRXPX=EsjtUDnZppAaw+BP1Ziw_fU5f32k+Wyg@mail.gmail.com> 2.87 2016/10/28 05:03:52 ! Encode.xs t/taint.t Pulled: Disable _utf8_on and _utf8_off for tainted values https://github.com/dankogai/p5-encode/pull/74 ! Encode.xs MANIFEST t/rt65541.t t/rt76824.t t/rt86327.t Pulled: Fix crash 'panic: sv_setpvn called with negative strlen' https://github.com/dankogai/p5-encode/pull/73 ! Encode.xs MANIFEST t/rt113164.t Pulled: Fix crash caused by undefined behaviour between two sequence points https://github.com/dankogai/p5-encode/pull/72 ! Encode.xs MANIFEST lib/Encode/CN/HZ.pm lib/Encode/Encoder.pm t/decode.t t/magic.t t/rt85489.t t/utf8ref.t Pulled: Fix handling of undef, ref, typeglob, UTF8, COW and magic scalar argument in all XS functions https://github.com/dankogai/p5-encode/pull/70 ! Encode/_T.e2x t/at-cn.t t/at-tw.t t/enc_data.t t/enc_module.t t/encoding-locale.t t/encoding.t t/jperl.t t/mime-name.t t/undef.t Pulled: Fix unit tests https://github.com/dankogai/p5-encode/pull/69 ! Encode.pm lib/Encode/MIME/Header.pm lib/Encode/MIME/Name.pm t/mime-header.t t/mime-name.t t/taint.t Pulled: Encode::MIME::Header clean up https://github.com/dankogai/p5-encode/pull/68 ! Encode.xs Pulled: Generate CHECK value functions with newCONSTSUB() instead with direct XS https://github.com/dankogai/p5-encode/pull/67 ! Encode.xs Pulled: Encode::utf8: Fix count of replacement characters for overflowed and overlong UTF-8 sequences https://github.com/dankogai/p5-encode/pull/65 ! Encode.xs t/fallback.t t/utf8strict.t Pulled: Encode::utf8: Fix processing invalid UTF-8 subsequences https://github.com/dankogai/p5-encode/pull/63 ! Encode.pm t/utf8ref.t Pulled: Fix return value of Encode::encode_utf8(undef) https://rt.cpan.org/Ticket/Display.html?id=116904 https://github.com/dankogai/p5-encode/pull/62 2.86 2016/08/10 18:08:45 ! encoding.pm t/enc_data.t t/enc_eucjp.t t/enc_module.t t/enc_utf8.t t/encoding.t t/jperl.t Fixed: #116196: [PATCH] Synchronize encoding.pm with blead https://rt.cpan.org/Ticket/Display.html?id=116196 ! Byte/Makefile.PL Patched: #111421: Won't build with statically built perls https://rt.cpan.org/Public/Bug/Display.html?id=111421 ! Encode.xs encoding.pm Pulled: Fixes for 5.8.x compilation failures https://github.com/dankogai/p5-encode/pull/60 ! Encode.xs Patched: RT#116817 [PATCH] Avoid a C++ comment https://rt.cpan.org/Ticket/Display.html?id=116817 2.85 2016/08/04 03:15:58 ! Encode.pm bin/enc2xs bin/encguess bin/piconv bin/ucmlint bin/unidump Pulled: CVE-2016-1238: avoid loading optional modules from . https://github.com/dankogai/p5-encode/pull/58 ! Encode.pm t/utf8warnings.t Pulled: Rethrow 'utf8' warnings in from_to as well #57 https://github.com/dankogai/p5-encode/pull/57 ! Encode.xs Pulled and fixed: Encode::utf8: Performance optimization for strict UTF-8 encoder #56 https://github.com/dankogai/p5-encode/pull/56 ! t/Encode.t s/use Test/use Test::More/ ! t/Encode.t t/decode.t Skip tests that pass typeglobs to decode if perl < v5.16 ! Encode.xs t/cow.t Patched: #115540 (from_to affecting COW strings) https://rt.cpan.org/Ticket/Display.html?id=115540 ! Encode.xs t/Encode.t t/decode.t Merged: RT#115168: [PATCH] Passing regex globals to decode() results in wrong result https://rt.cpan.org/Ticket/Display.html?id=115168 ! Makefile.pl Pulled: t/encoding-locale.t fails with Test::More@0.80 or before. https://github.com/dankogai/p5-encode/pull/55 ! Encode.pm Pulled: In-place modifications made explicit in docs for encode(), decode() and decode_utf8() https://github.com/dankogai/p5-encode/pull/54 2.84 2016/04/11 07:17:02 ! lib/Encode/MIME/Header.pm Pulled: Encode::MIME::Header: Update description that this module is only for unstructured header https://github.com/dankogai/p5-encode/pull/53 ! lib/Encode/MIME/Header.pm t/mime-header.t Pulled: Encode::MIME::Header: Fix valid_q_chars, '-' needs to be escaped https://github.com/dankogai/p5-encode/pull/52 Signed-off-by: Tim Orling <timothy.t.orling@linux.intel.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
2018-01-26libxml-libxml-perl: upgrade 2.0131 -> 2.0132Tim Orling
* Fix RDEPENDS Changes: 2.0132 2017-10-28 - Revert setNamespace() enhancements that broke some dependent tests: - commit df9fdc6659cb2e4e9bc896e58c02dfd79b430fbb - add t/48_rt123379_setNamespace.t . - Thanks to Alexander Bluhm and Slaven Rezic for the reports and the test. Signed-off-by: Tim Orling <timothy.t.orling@linux.intel.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
2018-01-26libtest-harness-perl: upgrade 3.36 -> 3.39Tim Orling
* Fix RDEPENDS * Add note that perl-module-test-harness should be preferred unless a newer version is needed than provided by perl Changes: 3.39 06-04-2017 - Make tests pass when PERL_USE_UNSAFE_INC=0 3.38 13-03-2017 - Released 3.37_01 without changes 3.37_01 - Set PERL_USE_UNSAFE_INC when running tests using Test::Harness (Leon Timmermans) - Avoid loading optional modules from . in prove Signed-off-by: Tim Orling <timothy.t.orling@linux.intel.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
2018-01-26librole-tiny-perl: upgrade 2.000005 -> 2.000006Tim Orling
Changes: 2.000006 - 2017-11-08 - account for code references stored directly in stash (for perl 5.28) - work around hint leakage when loading modules in perl 5.8 and 5.10.1 Signed-off-by: Tim Orling <timothy.t.orling@linux.intel.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
2018-01-26libnet-ssleay-perl: upgrade 1.81 -> 1.84Tim Orling
* Fix RDEPENDS * Use OPENSSL_PREFIX to pick up proper OpenSSL * Fix mangled .so by rearranging EXTRA_CPANFLAGS Changes: 1.84 2018-01-17 * Fixed an error in t/local/04_basic.t causing a test failure if * Test::Exception not installed. Reported by Joel Berger. 1.83 2018-01-16 * Fixed a problem with exporting OPENSSL_NO_NEXTPROTONEG even though they are not availble on LibreSSL * Patch patch-SSLeay_xs-NO_NPN from Alexander Bluhm. * Patch from Heikki Vatiainen adds support for SSL_set_default_passwd_cb* for * OpenSSL 1.1.0f and later. LibreSSL does not support these functions, at least yet. * Patch from Heikki Vatiainen adds new functions related to SSL_CTX_new. * Patch from Heikki Vatiainen adds two new functions introduced in OpenSSL 1.1.0, a number of constants and a couple of const qualifiers to SSLeay.xs. Tests and documentation .pod were also updated. * Patch from Heikki Vatiainen adds one new OpenSSL 1.1.0 function and has a minor fix for * LibreSSL version detection: - Added support for SSL_use_certificate_chain_file function introduced in OpenSSL 1.1.0. - Fixed LibreSSL version detection to correctly parse * LibreSSL minor version. * Patch from Steffen Ulrich to fix memory leaks in OCSP handling. Thanks. * Patch from Heikki Vatiainen adds new functions for certificate verification introduced in * OpenSSL 1.02, a number of constants, new test data files, new tests and updates to .pod documentation. * The new functions provide access to the built-in wildcard check functionality available in OpenSSL 1.0.2 and later. * The patch also adds new tests for the new functions and updates some of the current tests for CTX_set_default_passwd_cb* functions. * Added X509_STORE_CTX_new and X509_verify_cert. * SSL_OCSP_response_verify now clears the error queue if OCSP_basic_verify fails but the intermediate certificate succeeds. Patch from Stefan Ullrich. 1.82 2017-10-31 * Added support for building under Linuxbrew (a linuxbrew version of MacOS Homebrew) * Patch from Matthew Altus, that implements SSL_CTX_set_psk_client_callback() and SSL_set_psk_client_callback(). * Patch to build with LibreSSL has no support for NPN * Also skip the NPN test if the SSL library is LibreSSL. * Fixed a problem with a variable declaration in ssleay_session_secret_cb_invoke reported by Graham Ollis. * Significant patch set from Open System Consultants: - Bugfix: tlsext_status_cb_invoke(...): free ocsp_response only when allocated. - The same callback is used on a server side for OCSP stapling and in that case ocsp_response is NULL and not used. - New feature: Added a binding SSL_set_session_ticket_ext_cb(ssl,callback,data) - A callback used by EAP-FAST/EAP-TEAT to parse and process TLS session ticket. - Tests are in t/local/65_ticket_sharing_2.t - New feature: Added a binding SSL_set_session_ticket_ext(ssl,ticket) - Used by EAP-FAST/EAP-TEAP to define TLS session ticket value. - Tests are in t/local/65_ticket_sharing_2.t - Bugfix: tlsext_ticket_key_cb_invoke(...): allow SHA256 HMAC key to be 32 bytes instead of 16 bytes (which OpenSSL will pad with zeros up to 32 bytes). - New feature: Added following bindings: = X509_get_ex_data(cert,idx) = X509_get_ex_new_index(argl,argp,new_func,dup_funL,free_func) = X509_get_app_data(cert) = X509_set_ex_data(cert,idx,data) = X509_set_app_data(cert,arg) = X509_STORE_CTX_get_ex_new_index(argl,argp,new_func,dup_func,free_func) = X509_STORE_CTX_get_app_data(x509_store_ctx) = X509_STORE_CTX_set_app_data(x509_store_ctx,arg) - New feature: Added an implementation for SSL_get_finished(ssl,buf,count=2*EVP_MAX_MD_SIZE) - Tests are in t/local/43_misc_functions.t - New feature: Added an implementation for SSL_get_peer_finished(ssl,buf,count=2*EVP_MAX_MD_SIZE) - Tests are in t/local/43_misc_functions.t - Bugfix: SSL_get_keyblock_size(s): Calculate key block size correctly also with AEAD ciphers which don’t use digest functions. - New feature: Added a binding SSL_set_tlsext_status_ocsp_resp(ssl,staple) - Used by a server side to include OCSP staple in ServerHello. - Bugfix: SSL_OCSP_response_verify(ssl,rsp,svreq,flags): check that chain and last are not NULL before trying to use them. - Bugfix: inc/Module/Install/PRIVATE/Net/SSLeay.pm: Don’t quote include and lib paths. Signed-off-by: Tim Orling <timothy.t.orling@linux.intel.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
2018-01-26libnet-dns-perl: upgrade 1.13 -> 1.14Tim Orling
* Fix RDEPENDS Changes: **** 1.14 Dec 15, 2017 Fix rt.cpan.org #123702 'use base' should not be used in packages with several subpackages defined Fix rt.cpan.org #123676 Net::DNS::Nameserver malformed message on big axfr Signed-off-by: Tim Orling <timothy.t.orling@linux.intel.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
2018-01-26libmoo-perl: upgrade 2.003002 -> 2.003004Tim Orling
Changes: 2.003004 - 2017-12-01 - re-allow stubs for attribute parameters like isa or coerce (RT#123753) - fix accidentally removed space in coderef error message (GH#33) - fix test errors with old Carp versions 2.003003 - 2017-11-16 - test tweaks - fix handling of code refs stored directly in the stash (for perl 5.28) - consider inline packages with constants in them as being loaded - stubs will be treated as methods that exist when inflating to Moose - avoid loading overload.pm unless required Signed-off-by: Tim Orling <timothy.t.orling@linux.intel.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
2018-01-26libmime-types-perl: upgrade 2.13 -> 2.14Tim Orling
Changes: version 2.14: Wed 8 Nov 17:45:22 CET 2017 Fixes: - MojoX should not die on missing types. rt.cpan.org#123298 [Dmitry Latin] Signed-off-by: Tim Orling <timothy.t.orling@linux.intel.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
2018-01-26libio-socket-ssl-perl: upgrade 1.997 -> 2.052Tim Orling
* Fix RDEPENDS Changes: 2.052 2017/10/22 - disable NPN support if LibreSSL>=2.6.1 is detected since they've replaced the functions with dummies instead of removing NPN completly or setting OPENSSL_NO_NEXTPROTONEG - t/01loadmodule.t shows more output helpful in debugging problems - update fingerprints for extenal tests - update documentation to make behavior of syswrite more clear 2.051 2017/09/05 - syswrite: if SSL_write sets SSL_ERROR_SYSCALL but no $! (as seen with OpenSSL 1.1.0 on Windows) set $! to EPIPE to propagate a useful error up https://github.com/noxxi/p5-io-socket-ssl/issues/62 2.050 2017/08/18 - removed unecessary settings of SSL_version and SSL_cipher_list from tests - protocol_version.t can now deal when TLS 1.0 and/or TLS 1.1 are not supported as is the case with openssl versions in latest Debian (buster) 2.049 2017/06/12 - fixed problem caused by typo in the context of session cache https://github.com/noxxi/p5-io-socket-ssl/issues/60 - update PublicSuffix information from publicsuffix.org 2.048 2017/04/16 - fixed small memory leaks during destruction of socket and context, RT#120643 2.047 2017/02/16 - better fix for problem which 2.046 tried to fix but broke LWP this way 2.046 2017/02/15 - cleanup everything in DESTROY and make sure to start with a fresh %{*self} in configure_SSL because it can happen that a GLOB gets used again without calling DESTROY (https://github.com/noxxi/p5-io-socket-ssl/issues/56) 2.045 2017/02/13 - fixed memory leak caused by not destroying CREATED_IN_THIS_THREAD for SSL objects -> github pull#55 - optimization: don't track SSL objects and CTX in *CREATED_IN_THIS_THREAD if perl is compiled w/o thread support - small fix in t/protocol_version.t to use older versions of Net::SSLeay with openssl build w/o SSLv3 support - when setting SSL_keepSocketOnError to true the socket will not be closed on fatal error. This is a modified version of https://github.com/noxxi/p5-io-socket-ssl/pull/53/ 2.044 2017/01/26 - protect various 'eval'-based capability detections at startup with a localized __DIE__ handler. This way dynamically requiring IO::Socket::SSL as done by various third party software should cause less problems even if there is a global __DIE__ handler which does not properly deal with 'eval'. 2.043 2017/01/06 - make t/session_ticket.t work with OpenSSL 1.1.0. With this version the session does not get reused any longer if it was not properly closed which is now done using an explicit close by the client which causes a proper SSL_shutdown 2.042 2017/01/05 - enable session ticket callback with Net::SSLeay>=1.80 2.041 2017/01/04 - leave session ticket callback off for now until the needed patch is included in Net::SSLeay. See https://rt.cpan.org/Ticket/Display.html?id=116118#txn-1696146 2.040 2016/12/17 - fix detection of default CA path for OpenSSL 1.1.x - Utils::CERT_asHash now includes the signature algorithm used - Utils::CERT_asHash can now deal with large serial numbers 2.039 2016/11/20 - OpenSSL 1.1.0c changed the behavior of SSL_read so that it now returns -1 on EOF without proper SSL shutdown. Since it looks like that this behavior will be kept at least for 1.1.1+ adapt to the changed API by treating errno=NOERR on SSL_ERROR_SYSCALL as EOF. 2.038 2016/09/17 - restrict session ticket callback to Net::SSLeay 1.79+ since version before contains bug. Add test for session reuse - extend SSL fingerprint to pubkey digest, i.e. 'sha1$pub$xxxxxx....' - fix t/external/ocsp.t to use different server (under my control) to check OCSP stapling 2.037 2016/08/22 - fix session cache del_session: it freed the session but did not properly remove it from the cache. Further reuse causes crash. 2.036 2016/08/11 - disable OCSP support when Net::SSLeay 1.75..1.77 is used, see RT#116795 2.035 2016/08/11 - fixes for issues introduced in 2.034 - return with error in configure_SSL if context creation failed. This might otherwise result in a segmentation fault later. - apply builtin defaults before any (user configurable) global settings (i.e. done with set_defaults, set_default_context...) so that builtins don't replace user settings Thanks to joel[DOT]a[DOT]berger[AT]gmail[DOT]com for reporting 2.034 2016/08/08 - move handling of global SSL arguments into creation of context, so that these get also applied when creating a context only. 2.033 2016/07/15 - support for session ticket reuse over multiple contexts and processes (if supported by Net::SSLeay) - small optimizations, like saving various Net::SSLeay constants into variables and access variables instead of calling the constant sub all the time - make t/dhe.t work with openssl 1.1.0 2.032 2016/07/12 - Set session id context only on the server side. Even if the documentation for SSL_CTX_set_session_id_context makes clear that this function is server side only it actually affects hndling of session reuse on the client side too and can result in error "SSL3_GET_SERVER_HELLO:attempt to reuse session in different context" at the client. 2.031 2016/07/08 - fix for bug in session handling introduced in 2.031, RT#115975 Thanks to paul[AT]city-fan[DOT]org for reporting 2.030 2016/07/08 - Utils::CERT_create - don't add given extensions again if they were already added. Firefox croaks with sec_error_extension_value_invalid if (specific?) extensions are given twice. - assume that Net::SSLeay::P_PKCS12_load_file will return the CA certificates with the reverse order as in the PKCS12 file, because that's what it does. - support for creating ECC keys in Utils once supported by Net::SSLeay - remove internal sub session_cache and access cache directly (faster) 2.029 2016/06/26 - fix del_session method in case a single item was in the cache - use SSL_session_key as the real key for the cache and not some derivate of it, so that it works to remove the entry using the same key 2.028 2016/06/26 - add del_session method to session cache 2.027 2016/04/20 - only added Changes for 2.026 2.026 2016/04/20 - update default server and client ciphers based on recommendation of Mozilla and what the current browsers use. Notably this finally disables RC4 for the client (was disabled for server long ago) and adds CHACHA20. 2.025 2016/04/04 - Resolved memleak if SSL_crl_file was used: RT#113257, RT#113530 Thanks to avi[DOT]maslati[AT]forescout[DOT]com and mark[DOT]kurman[AT]gmail[DOT]com for reporting the problem 2.024 2016/02/06 - Work around issue where the connect fails on systems having only a loopback interface and where IO::Socket::IP is used as super class (default when available). Since IO::Socket::IP sets AI_ADDRCONFIG by default connect to localhost would fail on this systems. This happened at least for the tests, see https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813796 Workaround is to explicitly set GetAddrInfoFlags to 0 if no GetAddrInfoFlags is set but the Family/Domain is given. In this case AI_ADDRCONFIG would not be useful anyway but would cause at most harm. 2.023 2016/01/30 - OpenSSL 1.0.2f changed the behavior of SSL shutdown in case the TLS connection was not fully established (commit: f73c737c7ac908c5d6407c419769123392a3b0a9). This somehow resulted in Net::SSLeay::shutdown returning 0 (i.e. keep trying) which caused an endless loop. It will now ignore this result in case the TLS connection was not yet established and consider the TLS connection closed instead. 2.022 2015/12/10 - fix stringification of IPv6 inside subjectAltNames in Utils::CERT_asHash. Thanks to Mark.Martinec[AT]ijs[DOT]si for reporting in #110253 2.021 2015/12/02 - Fixes for documentation and typos thanks to DavsX and jwilk. - Update PublicSuffix with latest version from publicsuffix.org 2.020 2015/09/20 - support multiple directories in SSL_ca_path as proposed in RT#106711 by dr1027[AT]evocat[DOT]ne. Directories can be given as array or as string with a path separator, see documentation. - typos fixed thanks to jwilk https://github.com/noxxi/p5-io-socket-ssl/pull/34 2.019 2015/09/01 - work around different behavior of getnameinfo from Socket and Socket6 by using a different wrapper depending on which module I use for IPv6. Thanks to bluhm for reporting. 2.018 2015/08/27 - RT#106687 - startssl.t failed on darwin with old openssl since server requested client certificate but offered also anon ciphers 2.017 2015/08/24 - checks for readability of files/dirs for certificates and CA no longer use -r because this is not safe when ACLs are used. Thanks to BBYRD, RT#106295 - new method sock_certificate similar to peer_certificate based on idea of Paul Evans, RT#105733 - get_fingerprint can now take optional certificate as argument and compute the fingerprint of it. Useful in connection with sock_certificate. - check for both EWOULDBLOCK and EAGAIN since these codes are different on some platforms. Thanks to Andy Grundman, RT#106573 - enforce default verification scheme if none was specified, i.e. no longer just warn but accept. If really no verification is wanted a scheme of 'none' must be explicitly specified. - support different cipher suites per SNI hosts 2.016 2015/06/02 - add flag X509_V_FLAG_TRUSTED_FIRST by default if available in OpenSSL (since 1.02) and available with Net::SSLeay. RT#104759 (thanks GAAS) - work around hanging prompt() with older perl in Makefile.PL RT#104731 - make t/memleak_bad_handshake.t work on cygwin and other systems having /proc/pid/statm, see RT#104659 - add better debugging based on patch from H.Merijn Brand 2.015 2015/05/13 - work around problem with IO::Socket::INET6 on windows, by explicitly using Domain AF_INET in the tests. Fixes RT#104226 reported by CHORNY 2.014 2015/05/05 - Utils::CERT_create - work around problems with authorityInfoAccess, where OpenSSL i2v does not create the same string as v2i expects - Intercept - don't clone some specific extensions which make only sense with the original certificate 2.013 2015/05/01 - assign severities to internal error handling and make sure that follow-up errors like "configuration failed" or "certificate verify error" don't replace more specific "hostname verification failed" when reporting in sub errstr/$SSL_ERROR. see also RT#103423 - enhanced documentation thanks to Chase Whitener https://github.com/noxxi/p5-io-socket-ssl/pull/26 2.012 2015/02/02 - fix t/ocsp.t in case no HTTP::Tiny is installed 2.011 2015/02/01 - fix t/ocsp.t - don't count on revoked.grc.com using OCSP stapling #101855 - added option 'purpose' to Utils::CERT_create to get better control of the certificates purpose. Default is 'server,client' for non-CA (contrary to only 'server' before) - removed RC4 from default cipher suites on the server site https://github.com/noxxi/p5-io-socket-ssl/issues/22 - refactoring of some tests using Test::More thanks to Sweet-kid and the 2015 Pull Request Challenge 2.010 2015/01/14 - new options SSL_client_ca_file and SSL_client_ca to let the server send the list of acceptable CAs for the client certificate. - t/protocol_version.t - fix in case SSLv3 is not supported in Net::SSLeay. RT#101485, thanks to TEAM. 2.009 2015/01/12 - remove util/analyze.pl. This tool is now together with other SSL tools in https://github.com/noxxi/p5-ssl-tools - added ALPN support (needs OpenSSL1.02, Net::SSLeay 1.56+) thanks to TEAM, RT#101452 2.008 2014/12/16 - work around recent OCSP verification errors for revoked.grc.com (badly signed OCSP response, Firefox also complains about it) in test t/external/ocsp.t. - util/analyze.pl - report more details about preferred cipher for specific TLS versions 2.007 2014/11/26 - make getline/readline fall back to super class if class is not sslified yet, i.e. behave the same as sysread, syswrite etc. This fixes RT#100529 2.006 2014/11/22 - Make (hopefully) non-blocking work on windows by using EWOULDBLOCK instead of EAGAIN. While this is the same on UNIX it is different on Windows and socket operations return there (WSA)EWOULDBLOCK and not EAGAIN. Enable non-blocking tests on Windows too. - make PublicSuffix::_default_data thread safe - update PublicSuffix with latest list from publicsuffix.org 2.005 2014/11/15 - next try to fix t/protocol_version.t for OpenSSL w/o SSLv3 support 2.004 2014/11/15 - only test fix: fix t/protocol_version.t to deal with OpenSSL installations which are compiled without SSLv3 support. 2.003 2014/11/14 - make SSLv3 available even if the SSL library disables it by default in SSL_CTX_new (like done in LibreSSL). Default will stay to disable SSLv3, so this will be only done when setting SSL_version explicitly. - fix possible segmentation fault when trying to use an invalid certificate, reported by Nick Andrew. - Use only the ICANN part of the default public suffix list and not the private domains. This makes existing exceptions for s3.amazonaws.com and googleapis.com obsolete. Thanks to Gervase Markham from mozilla.org. 2.002 2014/10/21 - fix check for (invalid) IPv4 when validating hostname against certificate. Do not use inet_aton any longer because it can cause DNS lookups for malformed IP. RT#99448, thanks to justincase[AT]yopmail[DOT]com. - Update PublicSuffix with latest version from publicsuffix.org - lots of new top level domains. - Add exception to PublicSuffix for s3.amazonaws.com - RT#99702, thanks to cpan[AT]cpanel[DOT]net. 2.001 2014/10/21 - Add SSL_OP_SINGLE_(DH|ECDH)_USE to default options to increase PFS security. Thanks to Heikki Vatiainen for suggesting. - Update external tests with currently expected fingerprints of hosts. - Some fixes to make it still work on 5.8.1. 2.000 2014/10/15 - consider SSL3.0 as broken because of POODLE and disable it by default. - Skip live tests without asking if environment NO_NETWORK_TESTING is set. Thanks to ntyni[AT]debian[DOT]org for suggestion. - skip tests which require fork on non-default windows setups without proper fork. Thanks to SHAY for https://github.com/noxxi/p5-io-socket-ssl/pull/18 1.999 2014/10/09 - make sure we don't use version 0.30 of IO::Socket::IP - make sure that PeerHost is checked on all places where PeerAddr is checked, because these are synonyms and IO::Socket::IP prefers PeerHost while others prefer PeerAddr. Also accept PeerService additionally to PeerPort. See https://github.com/noxxi/p5-io-socket-ssl/issues/16 for details. - add ability to use client certificates and to overwrite hostname with util/analyze-ssl.pl. 1.998 2014/09/07 - make client authentication work at the server side when SNI is in by use having CA path and other settings in all SSL contexts instead of only the main one. Based on code from lundstrom[DOT]jerry[AT]gmail[DOT]com, https://github.com/noxxi/p5-io-socket-ssl/pull/15 Signed-off-by: Tim Orling <timothy.t.orling@linux.intel.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
2018-01-26libextutils-cppguess-perl: upgrade 0.09 -> 0.12Tim Orling
Changes: 0.12 Sat Oct 21 18:12:51 BST 2017 - Fix tests on 5.26 without '.' in @INC (kentfredric) 0.11 Thu Sep 10 13:12:17 MDT 2015 - Add leading whitespace to $cflags in _get_cflags (bulk88) 0.10 Tue Sep 08 21:15:30 MDT 2015 - Config's ccflags must always be used. (bulk88) Signed-off-by: Tim Orling <timothy.t.orling@linux.intel.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
2018-01-26libcgi-perl: upgrade 4.36 -> 4.38Tim Orling
* Fix RDEPENDS Changes: 4.38 2017-12-01 [ TESTING ] - command_line.t: Avoid -I for libs (GH #224, thanks to cpansprout) 4.37 2017-11-01 [ FIX ] - Fix incorrect quoting of ? in ->url (GH #112, GH #222, with thanks to Reuben Thomas) Signed-off-by: Tim Orling <timothy.t.orling@linux.intel.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
2018-01-26libencode-perl: add UPSTREAM_CHECK_REGEXTim Orling
The default does not work for this recipe. * Add a note that perl-module-encode should be preferred over this package unless a newer version than what is provided by perl is needed. Signed-off-by: Tim Orling <timothy.t.orling@linux.intel.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
2018-01-26libdbd-sqlite-perl: add UPSTREAM_CHECK_REGEXTim Orling
The default does not work for this recipe. Signed-off-by: Tim Orling <timothy.t.orling@linux.intel.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
2017-11-15libxml-libxml-perl: update to version 2.0131Derek Straka
Signed-off-by: Derek Straka <derek@asterius.io> Signed-off-by: Armin Kuster <akuster808@gmail.com>
2017-11-15libnet-dns-perl: update to version 1.13Derek Straka
Signed-off-by: Derek Straka <derek@asterius.io> Signed-off-by: Armin Kuster <akuster808@gmail.com>
2017-11-15README: add self as maintainerTim Orling
I have been, in practice, maintaining meta-perl for several years now. Given discussion at OEDEM, make it official. Signed-off-by: Tim Orling <timothy.t.orling@linux.intel.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
2017-10-11libauthen-radius-perl: move recipe to meta-networkingDerek Straka
Recipe depends on radius which is located in meta-networking Signed-off-by: Derek Straka <derek@asterius.io> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com> Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
2017-10-04meta-perl: update layer.conf to include openembedded-layerDerek Straka
Several recipes require items that are in the openembedded layer Signed-off-by: Derek Straka <derek@asterius.io> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
2017-09-22adduser: update to version 3.116Derek Straka
Signed-off-by: Derek Straka <derek@asterius.io> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
2017-09-22libnet-dns-perl: Add HOMEPAGE info into recipe file.Huang Qiyu
Signed-off-by: Huang Qiyu <huangqy.fnst@cn.fujitsu.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
2017-09-22libhtml-parser-perl: Add HOMEPAGE info into recipe file.Huang Qiyu
Signed-off-by: Huang Qiyu <huangqy.fnst@cn.fujitsu.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
2017-09-07logcheck: Add HOMEPAGE info into recipe filefan.xin
Signed-off-by: Fan Xin <fan.xin@jp.fujitsu.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
2017-08-31libmodule-build-perl: upgrade to v0.4224Tim Orling
* Use COPYRIGHT excerpt from README for license check - Remains the same perl5 license - LICENSE contents is unhelpful "FULLTEXT" * Correct copy-paste error in SUMMARY * Author is now LEONT instead of KWILLIAMS * Update HOMEPAGE * Add interpreter fix from meta-cpan for lib/Module/Build/Base.pm Signed-off-by: Tim Orling <timothy.t.orling@linux.intel.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
2017-08-28logcheck: update to 1.3.18 and move to meta-perlJackie Huang
- logcheck depends on mime-construct which is in meta-perl, so move it to meta-perl to avoid that meta-oe depends on meta-perl. - logcheck should not be run as root, so inherit useradd and add proper user and group. - Add missing runtime dependencies according to the file debian/control and simple test by running "logcheck -ot". - For syslog, debian directly depends on rsyslog, but logcheck works with any syslog and we have busybox-syslog, sysklogd, syslog-ng and rsyslog, so use VIRTUAL-RUNTIME_syslog for the syslog dependency and set rsyslog as the default, which can be easily overridden in distro conf file or local.conf. - Don't install /var/lock when populating rootfs. Do it through volatile. - install header.txt for generated mails Signed-off-by: Jackie Huang <jackie.huang@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
2017-08-28adduser: use get_perl_version instead of PERLVERSIONJackie Huang
Immediate expansion for PERLVERSION(in perl-version.bbclass) is too early, it will result in 'None' before perl is built, then the module file is installed incorrectly: $ rpm -ql adduser|grep Common /usr/lib/perl/None/Debian/AdduserCommon.pm So use get_perl_version directly instead of PERLVERSION. Signed-off-by: Jackie Huang <jackie.huang@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
2017-08-13libextutils-parsexs-perl: update to version 3.35Derek Straka
Update license checksum and verify terms are unchanged Signed-off-by: Derek Straka <derek@asterius.io> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
2017-08-13libmoo-perl: update to version 2.003002Derek Straka
Signed-off-by: Derek Straka <derek@asterius.io> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>