[perl-Dancer/f18] Fix CVE-2012-5572 (cookie name CR-LF injection)
by Petr Pisar
commit 0df619f4582ada0daa98ff255a5bec3883e8dcc1
Author: Petr Písař <ppisar(a)redhat.com>
Date: Mon Jun 3 13:24:45 2013 +0200
Fix CVE-2012-5572 (cookie name CR-LF injection)
Dancer-1.3113-CVE-2012-5572-1.patch | 59 +++++++++++++++++++++++++++++++++++
Dancer-1.3113-CVE-2012-5572-2.patch | 29 +++++++++++++++++
perl-Dancer.spec | 11 ++++++-
3 files changed, 98 insertions(+), 1 deletions(-)
---
diff --git a/Dancer-1.3113-CVE-2012-5572-1.patch b/Dancer-1.3113-CVE-2012-5572-1.patch
new file mode 100644
index 0000000..23c3628
--- /dev/null
+++ b/Dancer-1.3113-CVE-2012-5572-1.patch
@@ -0,0 +1,59 @@
+From d21a0983fa95ffea2b50ad5af84cc93f4ce5f4d2 Mon Sep 17 00:00:00 2001
+From: Colin Keith <colinmkeith(a)gmail.com>
+Date: Sat, 25 May 2013 00:46:53 -0400
+Subject: [PATCH 1/2] test and resolution for CVE-2012-5572, \r\n sequence
+ being allowed in a cookie name fixes PerlDancer/Dancer#859
+
+---
+ t/12_response/11_CVE-2012-5572.t | 39 +++++++++++++++++++++++++++++++++++++++
+ 1 file changed, 39 insertions(+)
+ create mode 100644 t/12_response/11_CVE-2012-5572.t
+
+diff --git a/t/12_response/11_CVE-2012-5572.t b/t/12_response/11_CVE-2012-5572.t
+new file mode 100644
+index 0000000..2b6eacb
+--- /dev/null
++++ b/t/12_response/11_CVE-2012-5572.t
+@@ -0,0 +1,39 @@
++package main;
++use strict;
++use warnings;
++use Test::More tests => 2, import => ['!pass'];
++
++{
++ use Dancer;
++ get '/CVE-2012-5572-cookie' => sub {
++ cookie "test\r\nX-Evil-Header: " => "evil";
++ };
++}
++
++
++use Dancer::Test;
++{
++ note "Testing CVE-2012-5572 (CRLF in response headers)";
++ my $req = [GET => '/CVE-2012-5572-cookie'];
++ route_exists $req;
++ my $response = Dancer::Test::_req_to_response($req);
++
++ my $CRLF = "\r\n";
++
++ my $tb = Test::Builder->new;
++ my %headers = @{$response->headers_to_array};
++ my $foundCRLF = 0;
++ while (my($name, $value) = each %headers) {
++ index($value, $CRLF) == -1
++ && index($name, $CRLF) == -1
++ && next;
++ $foundCRLF = 1;
++ last;
++ }
++
++ $tb->ok(!$foundCRLF, 'Headers do not contain CRLF (CVE-2012-5572)');
++}
++
++
++1;
++
+--
+1.8.1.4
+
diff --git a/Dancer-1.3113-CVE-2012-5572-2.patch b/Dancer-1.3113-CVE-2012-5572-2.patch
new file mode 100644
index 0000000..911f32b
--- /dev/null
+++ b/Dancer-1.3113-CVE-2012-5572-2.patch
@@ -0,0 +1,29 @@
+From 46ef9124f3149f697455061499ac7cee40930349 Mon Sep 17 00:00:00 2001
+From: Colin Keith <colinmkeith(a)gmail.com>
+Date: Sat, 25 May 2013 22:56:31 -0400
+Subject: [PATCH 2/2] resolution for CVE-2012-5572, \r\n sequence being allowed
+ in a cookie name fixes PerlDancer/Dancer#859
+
+---
+ lib/Dancer/Cookie.pm | 5 ++++-
+ 1 file changed, 4 insertions(+), 1 deletion(-)
+
+diff --git a/lib/Dancer/Cookie.pm b/lib/Dancer/Cookie.pm
+index efcb1a3..e736ab8 100644
+--- a/lib/Dancer/Cookie.pm
++++ b/lib/Dancer/Cookie.pm
+@@ -29,7 +29,10 @@ sub to_header {
+ my $value = join('&', map {uri_escape($_)} $self->value);
+ my $no_httponly = defined( $self->http_only ) && $self->http_only == 0;
+
+- my @headers = $self->name . '=' . $value;
++ my $name = $self->name;
++ $name =~ s/[=,; \t\r\n\013\014]//mg;
++
++ my @headers = $name . '=' . $value;
+ push @headers, "path=" . $self->path if $self->path;
+ push @headers, "expires=" . $self->expires if $self->expires;
+ push @headers, "domain=" . $self->domain if $self->domain;
+--
+1.8.1.4
+
diff --git a/perl-Dancer.spec b/perl-Dancer.spec
index 1a915dc..6907283 100644
--- a/perl-Dancer.spec
+++ b/perl-Dancer.spec
@@ -1,6 +1,6 @@
Name: perl-Dancer
Version: 1.3100
-Release: 2%{?dist}
+Release: 3%{?dist}
Summary: Lightweight yet powerful web application framework
License: GPL+ or Artistic
Group: Development/Libraries
@@ -8,6 +8,10 @@ URL: http://search.cpan.org/dist/Dancer/
Source0: http://www.cpan.org/authors/id/X/XS/XSAWYERX/Dancer-%{version}.tar.gz
# Bug #960184, GitHub #PerlDancer/Dancer/919
Patch0: Dancer-1.3112-Return-non-zero-exit-code-on-bad-application-name.patch
+# Bug #880330, test for CVE-2012-5572, GiHub #PerlDancer/Dancer/859
+Patch1: Dancer-1.3113-CVE-2012-5572-1.patch
+# Bug #880330, fix for CVE-2012-5572, GiHub #PerlDancer/Dancer/859
+Patch2: Dancer-1.3113-CVE-2012-5572-2.patch
BuildArch: noarch
BuildRequires: perl(base)
BuildRequires: perl(Carp)
@@ -88,6 +92,8 @@ your code.
%prep
%setup -q -n Dancer-%{version}
%patch0 -p1
+%patch1 -p1
+%patch2 -p1
%build
perl Makefile.PL INSTALLDIRS=vendor
@@ -110,6 +116,9 @@ make test
%{_mandir}/man3/*
%changelog
+* Mon Jun 03 2013 Petr Pisar <ppisar(a)redhat.com> - 1.3100-3
+- Fix CVE-2012-5572 (cookie name CR-LF injection) (bug #880330)
+
* Tue May 07 2013 Petr Pisar <ppisar(a)redhat.com> - 1.3100-2
- Return proper exit code on dancer tool failure (bug #960184)
10 years, 11 months
[perl-Dancer/f19] Fix CVE-2012-5572 (cookie name CR-LF injection)
by Petr Pisar
commit b897a7382258f91936ced4cd5bfee28c4372edfd
Author: Petr Písař <ppisar(a)redhat.com>
Date: Mon Jun 3 13:24:45 2013 +0200
Fix CVE-2012-5572 (cookie name CR-LF injection)
Dancer-1.3113-CVE-2012-5572-1.patch | 59 +++++++++++++++++++++++++++++++++++
Dancer-1.3113-CVE-2012-5572-2.patch | 29 +++++++++++++++++
perl-Dancer.spec | 11 ++++++-
3 files changed, 98 insertions(+), 1 deletions(-)
---
diff --git a/Dancer-1.3113-CVE-2012-5572-1.patch b/Dancer-1.3113-CVE-2012-5572-1.patch
new file mode 100644
index 0000000..23c3628
--- /dev/null
+++ b/Dancer-1.3113-CVE-2012-5572-1.patch
@@ -0,0 +1,59 @@
+From d21a0983fa95ffea2b50ad5af84cc93f4ce5f4d2 Mon Sep 17 00:00:00 2001
+From: Colin Keith <colinmkeith(a)gmail.com>
+Date: Sat, 25 May 2013 00:46:53 -0400
+Subject: [PATCH 1/2] test and resolution for CVE-2012-5572, \r\n sequence
+ being allowed in a cookie name fixes PerlDancer/Dancer#859
+
+---
+ t/12_response/11_CVE-2012-5572.t | 39 +++++++++++++++++++++++++++++++++++++++
+ 1 file changed, 39 insertions(+)
+ create mode 100644 t/12_response/11_CVE-2012-5572.t
+
+diff --git a/t/12_response/11_CVE-2012-5572.t b/t/12_response/11_CVE-2012-5572.t
+new file mode 100644
+index 0000000..2b6eacb
+--- /dev/null
++++ b/t/12_response/11_CVE-2012-5572.t
+@@ -0,0 +1,39 @@
++package main;
++use strict;
++use warnings;
++use Test::More tests => 2, import => ['!pass'];
++
++{
++ use Dancer;
++ get '/CVE-2012-5572-cookie' => sub {
++ cookie "test\r\nX-Evil-Header: " => "evil";
++ };
++}
++
++
++use Dancer::Test;
++{
++ note "Testing CVE-2012-5572 (CRLF in response headers)";
++ my $req = [GET => '/CVE-2012-5572-cookie'];
++ route_exists $req;
++ my $response = Dancer::Test::_req_to_response($req);
++
++ my $CRLF = "\r\n";
++
++ my $tb = Test::Builder->new;
++ my %headers = @{$response->headers_to_array};
++ my $foundCRLF = 0;
++ while (my($name, $value) = each %headers) {
++ index($value, $CRLF) == -1
++ && index($name, $CRLF) == -1
++ && next;
++ $foundCRLF = 1;
++ last;
++ }
++
++ $tb->ok(!$foundCRLF, 'Headers do not contain CRLF (CVE-2012-5572)');
++}
++
++
++1;
++
+--
+1.8.1.4
+
diff --git a/Dancer-1.3113-CVE-2012-5572-2.patch b/Dancer-1.3113-CVE-2012-5572-2.patch
new file mode 100644
index 0000000..911f32b
--- /dev/null
+++ b/Dancer-1.3113-CVE-2012-5572-2.patch
@@ -0,0 +1,29 @@
+From 46ef9124f3149f697455061499ac7cee40930349 Mon Sep 17 00:00:00 2001
+From: Colin Keith <colinmkeith(a)gmail.com>
+Date: Sat, 25 May 2013 22:56:31 -0400
+Subject: [PATCH 2/2] resolution for CVE-2012-5572, \r\n sequence being allowed
+ in a cookie name fixes PerlDancer/Dancer#859
+
+---
+ lib/Dancer/Cookie.pm | 5 ++++-
+ 1 file changed, 4 insertions(+), 1 deletion(-)
+
+diff --git a/lib/Dancer/Cookie.pm b/lib/Dancer/Cookie.pm
+index efcb1a3..e736ab8 100644
+--- a/lib/Dancer/Cookie.pm
++++ b/lib/Dancer/Cookie.pm
+@@ -29,7 +29,10 @@ sub to_header {
+ my $value = join('&', map {uri_escape($_)} $self->value);
+ my $no_httponly = defined( $self->http_only ) && $self->http_only == 0;
+
+- my @headers = $self->name . '=' . $value;
++ my $name = $self->name;
++ $name =~ s/[=,; \t\r\n\013\014]//mg;
++
++ my @headers = $name . '=' . $value;
+ push @headers, "path=" . $self->path if $self->path;
+ push @headers, "expires=" . $self->expires if $self->expires;
+ push @headers, "domain=" . $self->domain if $self->domain;
+--
+1.8.1.4
+
diff --git a/perl-Dancer.spec b/perl-Dancer.spec
index 71b5753..df473c5 100644
--- a/perl-Dancer.spec
+++ b/perl-Dancer.spec
@@ -1,6 +1,6 @@
Name: perl-Dancer
Version: 1.3111
-Release: 2%{?dist}
+Release: 3%{?dist}
Summary: Lightweight yet powerful web application framework
License: GPL+ or Artistic
Group: Development/Libraries
@@ -8,6 +8,10 @@ URL: http://search.cpan.org/dist/Dancer/
Source0: http://www.cpan.org/authors/id/Y/YA/YANICK/Dancer-%{version}.tar.gz
# Bug #960184, GitHub #PerlDancer/Dancer/919
Patch0: Dancer-1.3112-Return-non-zero-exit-code-on-bad-application-name.patch
+# Bug #880330, test for CVE-2012-5572, GiHub #PerlDancer/Dancer/859
+Patch1: Dancer-1.3113-CVE-2012-5572-1.patch
+# Bug #880330, fix for CVE-2012-5572, GiHub #PerlDancer/Dancer/859
+Patch2: Dancer-1.3113-CVE-2012-5572-2.patch
BuildArch: noarch
BuildRequires: perl
BuildRequires: perl(base)
@@ -94,6 +98,8 @@ your code.
%prep
%setup -q -n Dancer-%{version}
%patch0 -p1
+%patch1 -p1
+%patch2 -p1
%build
perl Makefile.PL INSTALLDIRS=vendor
@@ -115,6 +121,9 @@ make test
%{_mandir}/man3/*
%changelog
+* Mon Jun 03 2013 Petr Pisar <ppisar(a)redhat.com> - 1.3111-3
+- Fix CVE-2012-5572 (cookie name CR-LF injection) (bug #880330)
+
* Tue May 07 2013 Petr Pisar <ppisar(a)redhat.com> - 1.3111-2
- Return proper exit code on dancer tool failure (bug #960184)
10 years, 11 months
[perl-Dancer] Fix CVE-2012-5572 (cookie name CR-LF injection)
by Petr Pisar
commit 6eb544176af7da8e78b357510ead2e157e622c3f
Author: Petr Písař <ppisar(a)redhat.com>
Date: Mon Jun 3 13:24:45 2013 +0200
Fix CVE-2012-5572 (cookie name CR-LF injection)
Dancer-1.3113-CVE-2012-5572-1.patch | 59 +++++++++++++++++++++++++++++++++++
Dancer-1.3113-CVE-2012-5572-2.patch | 29 +++++++++++++++++
perl-Dancer.spec | 11 ++++++-
3 files changed, 98 insertions(+), 1 deletions(-)
---
diff --git a/Dancer-1.3113-CVE-2012-5572-1.patch b/Dancer-1.3113-CVE-2012-5572-1.patch
new file mode 100644
index 0000000..23c3628
--- /dev/null
+++ b/Dancer-1.3113-CVE-2012-5572-1.patch
@@ -0,0 +1,59 @@
+From d21a0983fa95ffea2b50ad5af84cc93f4ce5f4d2 Mon Sep 17 00:00:00 2001
+From: Colin Keith <colinmkeith(a)gmail.com>
+Date: Sat, 25 May 2013 00:46:53 -0400
+Subject: [PATCH 1/2] test and resolution for CVE-2012-5572, \r\n sequence
+ being allowed in a cookie name fixes PerlDancer/Dancer#859
+
+---
+ t/12_response/11_CVE-2012-5572.t | 39 +++++++++++++++++++++++++++++++++++++++
+ 1 file changed, 39 insertions(+)
+ create mode 100644 t/12_response/11_CVE-2012-5572.t
+
+diff --git a/t/12_response/11_CVE-2012-5572.t b/t/12_response/11_CVE-2012-5572.t
+new file mode 100644
+index 0000000..2b6eacb
+--- /dev/null
++++ b/t/12_response/11_CVE-2012-5572.t
+@@ -0,0 +1,39 @@
++package main;
++use strict;
++use warnings;
++use Test::More tests => 2, import => ['!pass'];
++
++{
++ use Dancer;
++ get '/CVE-2012-5572-cookie' => sub {
++ cookie "test\r\nX-Evil-Header: " => "evil";
++ };
++}
++
++
++use Dancer::Test;
++{
++ note "Testing CVE-2012-5572 (CRLF in response headers)";
++ my $req = [GET => '/CVE-2012-5572-cookie'];
++ route_exists $req;
++ my $response = Dancer::Test::_req_to_response($req);
++
++ my $CRLF = "\r\n";
++
++ my $tb = Test::Builder->new;
++ my %headers = @{$response->headers_to_array};
++ my $foundCRLF = 0;
++ while (my($name, $value) = each %headers) {
++ index($value, $CRLF) == -1
++ && index($name, $CRLF) == -1
++ && next;
++ $foundCRLF = 1;
++ last;
++ }
++
++ $tb->ok(!$foundCRLF, 'Headers do not contain CRLF (CVE-2012-5572)');
++}
++
++
++1;
++
+--
+1.8.1.4
+
diff --git a/Dancer-1.3113-CVE-2012-5572-2.patch b/Dancer-1.3113-CVE-2012-5572-2.patch
new file mode 100644
index 0000000..911f32b
--- /dev/null
+++ b/Dancer-1.3113-CVE-2012-5572-2.patch
@@ -0,0 +1,29 @@
+From 46ef9124f3149f697455061499ac7cee40930349 Mon Sep 17 00:00:00 2001
+From: Colin Keith <colinmkeith(a)gmail.com>
+Date: Sat, 25 May 2013 22:56:31 -0400
+Subject: [PATCH 2/2] resolution for CVE-2012-5572, \r\n sequence being allowed
+ in a cookie name fixes PerlDancer/Dancer#859
+
+---
+ lib/Dancer/Cookie.pm | 5 ++++-
+ 1 file changed, 4 insertions(+), 1 deletion(-)
+
+diff --git a/lib/Dancer/Cookie.pm b/lib/Dancer/Cookie.pm
+index efcb1a3..e736ab8 100644
+--- a/lib/Dancer/Cookie.pm
++++ b/lib/Dancer/Cookie.pm
+@@ -29,7 +29,10 @@ sub to_header {
+ my $value = join('&', map {uri_escape($_)} $self->value);
+ my $no_httponly = defined( $self->http_only ) && $self->http_only == 0;
+
+- my @headers = $self->name . '=' . $value;
++ my $name = $self->name;
++ $name =~ s/[=,; \t\r\n\013\014]//mg;
++
++ my @headers = $name . '=' . $value;
+ push @headers, "path=" . $self->path if $self->path;
+ push @headers, "expires=" . $self->expires if $self->expires;
+ push @headers, "domain=" . $self->domain if $self->domain;
+--
+1.8.1.4
+
diff --git a/perl-Dancer.spec b/perl-Dancer.spec
index c6736fc..da5b536 100644
--- a/perl-Dancer.spec
+++ b/perl-Dancer.spec
@@ -1,6 +1,6 @@
Name: perl-Dancer
Version: 1.3113
-Release: 1%{?dist}
+Release: 2%{?dist}
Summary: Lightweight yet powerful web application framework
License: GPL+ or Artistic
Group: Development/Libraries
@@ -8,6 +8,10 @@ URL: http://search.cpan.org/dist/Dancer/
Source0: http://www.cpan.org/authors/id/Y/YA/YANICK/Dancer-%{version}.tar.gz
# Bug #960184, GitHub #PerlDancer/Dancer/919
Patch0: Dancer-1.3112-Return-non-zero-exit-code-on-bad-application-name.patch
+# Bug #880330, test for CVE-2012-5572, GiHub #PerlDancer/Dancer/859
+Patch1: Dancer-1.3113-CVE-2012-5572-1.patch
+# Bug #880330, fix for CVE-2012-5572, GiHub #PerlDancer/Dancer/859
+Patch2: Dancer-1.3113-CVE-2012-5572-2.patch
BuildArch: noarch
BuildRequires: perl
BuildRequires: perl(base)
@@ -95,6 +99,8 @@ your code.
%prep
%setup -q -n Dancer-%{version}
%patch0 -p1
+%patch1 -p1
+%patch2 -p1
%build
perl Makefile.PL INSTALLDIRS=vendor
@@ -116,6 +122,9 @@ make test
%{_mandir}/man3/*
%changelog
+* Mon Jun 03 2013 Petr Pisar <ppisar(a)redhat.com> - 1.3113-2
+- Fix CVE-2012-5572 (cookie name CR-LF injection) (bug #880330)
+
* Mon May 13 2013 Jitka Plesnikova <jplesnik(a)redhat.com> - 1.3113-1
- 1.3113 bump
10 years, 11 months
[perl-Dancer] Correct changelog entry
by Petr Pisar
commit 522167744447fab5f46251a058bbb33864fb972d
Author: Petr Písař <ppisar(a)redhat.com>
Date: Mon Jun 3 13:31:58 2013 +0200
Correct changelog entry
perl-Dancer.spec | 2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
---
diff --git a/perl-Dancer.spec b/perl-Dancer.spec
index 3b677eb..c6736fc 100644
--- a/perl-Dancer.spec
+++ b/perl-Dancer.spec
@@ -116,7 +116,7 @@ make test
%{_mandir}/man3/*
%changelog
-* Mon May 13 2013 Jitka Plesnikova <jplesnik(a)redhat.com> - 1.3112-1
+* Mon May 13 2013 Jitka Plesnikova <jplesnik(a)redhat.com> - 1.3113-1
- 1.3113 bump
* Tue May 07 2013 Petr Pisar <ppisar(a)redhat.com> - 1.3112-2
10 years, 11 months
[Bug 880329] CVE-2012-5572 perl-Dancer: Newline injection due to improper CRLF escaping in cookie() and cookies() methods
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=880329
--- Comment #5 from Petr Pisar <ppisar(a)redhat.com> ---
Upstream states the fix is available in commit:
commit 46ef9124f3149f697455061499ac7cee40930349
Author: Colin Keith <colinmkeith(a)gmail.com>
Date: Sat May 25 22:56:31 2013 -0400
resolution for CVE-2012-5572, \r\n sequence being allowed in a cookie name
fixes PerlDancer/Dancer#859
diff --git a/lib/Dancer/Cookie.pm b/lib/Dancer/Cookie.pm
index efcb1a3..e736ab8 100644
--- a/lib/Dancer/Cookie.pm
+++ b/lib/Dancer/Cookie.pm
@@ -29,7 +29,10 @@ sub to_header {
my $value = join('&', map {uri_escape($_)} $self->value);
my $no_httponly = defined( $self->http_only ) && $self->http_only == 0;
- my @headers = $self->name . '=' . $value;
+ my $name = $self->name;
+ $name =~ s/[=,; \t\r\n\013\014]//mg;
+
+ my @headers = $name . '=' . $value;
push @headers, "path=" . $self->path if $self->path;
push @headers, "expires=" . $self->expires if $self->expires;
push @headers, "domain=" . $self->domain if $self->domain;
Upstream added tests for this issue with commit:
commit d21a0983fa95ffea2b50ad5af84cc93f4ce5f4d2
Author: Colin Keith <colinmkeith(a)gmail.com>
Date: Sat May 25 00:46:53 2013 -0400
test and resolution for CVE-2012-5572, \r\n sequence being allowed in a
cookie name fixes PerlDancer/Dancer#859
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=MxMxTVXLVw&a=cc_unsubscribe
10 years, 11 months
[perl-Mojolicious] Update to 4.10
by Emmanuel Seyman
commit ef0955a31064908798e110c2ffadac4416404d10
Author: Emmanuel Seyman <emmanuel(a)seyman.fr>
Date: Sun Jun 2 15:42:58 2013 +0200
Update to 4.10
.gitignore | 1 +
perl-Mojolicious.spec | 8 ++++++--
sources | 2 +-
3 files changed, 8 insertions(+), 3 deletions(-)
---
diff --git a/.gitignore b/.gitignore
index 7f1ac64..94a68c4 100644
--- a/.gitignore
+++ b/.gitignore
@@ -87,3 +87,4 @@ Mojolicious-0.999926.tar.gz
/Mojolicious-3.97.tar.gz
/Mojolicious-4.0.tar.gz
/Mojolicious-4.07.tar.gz
+/Mojolicious-4.10.tar.gz
diff --git a/perl-Mojolicious.spec b/perl-Mojolicious.spec
index 194c968..db67256 100644
--- a/perl-Mojolicious.spec
+++ b/perl-Mojolicious.spec
@@ -1,11 +1,12 @@
Name: perl-Mojolicious
-Version: 4.07
+Version: 4.10
Release: 1%{?dist}
Summary: A next generation web framework for Perl
License: Artistic 2.0
URL: http://mojolicious.org/
Source0: http://search.cpan.org/CPAN/authors/id/S/SR/SRI/Mojolicious-%{version}.ta...
+
BuildArch: noarch
BuildRequires: perl >= 0:5.010001
BuildRequires: perl(Compress::Raw::Zlib)
@@ -59,7 +60,10 @@ make test
%{_mandir}/man3/*
%changelog
-* Sun May 26 2013 Emmanuel Seyman <emmanuel(a)seyman.fr> - 4.07
+* Sun Jun 02 2013 Emmanuel Seyman <emmanuel(a)seyman.fr> - 4.10-1
+- Update to 4.10
+
+* Sun May 26 2013 Emmanuel Seyman <emmanuel(a)seyman.fr> - 4.07-1
- Update to 4.07
* Sun May 19 2013 Emmanuel Seyman <emmanuel(a)seyman.fr> - 4.0-1
diff --git a/sources b/sources
index f9a1867..e4fc457 100644
--- a/sources
+++ b/sources
@@ -1 +1 @@
-9306560b312de052ec810625632cc6d2 Mojolicious-4.07.tar.gz
+bf1cf2dd79688a63db5e5ceff3e91d0d Mojolicious-4.10.tar.gz
10 years, 11 months
[perl-Starman] Remove ugly hack for the man page name
by Emmanuel Seyman
commit 68c592cf0c97e7762403283a890e74c6777917f8
Author: Emmanuel Seyman <emmanuel(a)seyman.fr>
Date: Sun Jun 2 15:33:02 2013 +0200
Remove ugly hack for the man page name
perl-Starman.spec | 8 ++++++--
1 files changed, 6 insertions(+), 2 deletions(-)
---
diff --git a/perl-Starman.spec b/perl-Starman.spec
index acd8a17..d1f0b43 100644
--- a/perl-Starman.spec
+++ b/perl-Starman.spec
@@ -1,6 +1,6 @@
Name: perl-Starman
Version: 0.3011
-Release: 1%{?dist}
+Release: 2%{?dist}
Summary: High-performance preforking PSGI/Plack web server
License: GPL+ or Artistic
@@ -40,8 +40,9 @@ compatible and offers HTTP/1.1 support.
%install
./Build install --destdir $RPM_BUILD_ROOT
-mv $RPM_BUILD_ROOT/%{_mandir}/man3/.::Starman.3pm $RPM_BUILD_ROOT/%{_mandir}/man3/Starman.3pm
+
find $RPM_BUILD_ROOT -type f -name .packlist -exec rm -f {} ';'
+
%{_fixperms} $RPM_BUILD_ROOT/*
%check
@@ -58,6 +59,9 @@ find $RPM_BUILD_ROOT -type f -name .packlist -exec rm -f {} ';'
%{_mandir}/man3/*
%changelog
+* Sun Jun 02 2013 Emmanuel Seyman <emmanuel(a)seyman.fr> - 0.3011-2
+- Remove ugly hack for the man page name
+
* Sun Apr 28 2013 Emmanuel Seyman <emmanuel(a)seyman.fr> - 0.3011-1
- Update to 0.3011
- Switch to Module::Build::Tiny as building mecanism
10 years, 11 months
[perl-Exception-Base] Update to 0.25
by Emmanuel Seyman
commit 606c6ff8e8fe1728279e98222ebbd1a0e89e29d2
Author: Emmanuel Seyman <emmanuel(a)seyman.fr>
Date: Sun Jun 2 15:24:50 2013 +0200
Update to 0.25
.gitignore | 1 +
perl-Exception-Base.spec | 14 +++++++++-----
sources | 2 +-
3 files changed, 11 insertions(+), 6 deletions(-)
---
diff --git a/.gitignore b/.gitignore
index d7318e9..4bde678 100644
--- a/.gitignore
+++ b/.gitignore
@@ -1,2 +1,3 @@
Exception-Base-0.24.tar.gz
/Exception-Base-0.2401.tar.gz
+/Exception-Base-0.25.tar.gz
diff --git a/perl-Exception-Base.spec b/perl-Exception-Base.spec
index b49c77c..6ac04e5 100644
--- a/perl-Exception-Base.spec
+++ b/perl-Exception-Base.spec
@@ -1,11 +1,12 @@
Name: perl-Exception-Base
-Version: 0.2401
-Release: 8%{?dist}
+Version: 0.2500
+Release: 1%{?dist}
Summary: Lightweight exceptions
License: GPL+ or Artistic
-Group: Development/Libraries
+
URL: http://search.cpan.org/dist/Exception-Base/
-Source0: http://www.cpan.org/authors/id/D/DE/DEXTER/Exception-Base-%{version}.tar.gz
+Source0: http://www.cpan.org/authors/id/D/DE/DEXTER/Exception-Base-0.25.tar.gz
+
BuildArch: noarch
BuildRequires: perl(Module::Build)
BuildRequires: perl(Test::Unit::Lite)
@@ -21,7 +22,7 @@ thrown and caught. Each uncaught exception prints full stack trace if the
default verbosity is uppered for debugging purposes.
%prep
-%setup -q -n Exception-Base-%{version}
+%setup -q -n Exception-Base-0.25
%build
%{__perl} Build.PL installdirs=vendor
@@ -42,6 +43,9 @@ find $RPM_BUILD_ROOT -depth -type d -exec rmdir {} 2>/dev/null \;
%{_mandir}/man3/*
%changelog
+* Sun Jun 02 2013 Emmanuel Seyman <emmanuel(a)seyman.fr> - 0.2500-1
+- Update to 0.25
+
* Thu Feb 14 2013 Fedora Release Engineering <rel-eng(a)lists.fedoraproject.org> - 0.2401-8
- Rebuilt for https://fedoraproject.org/wiki/Fedora_19_Mass_Rebuild
diff --git a/sources b/sources
index c49c132..593241d 100644
--- a/sources
+++ b/sources
@@ -1 +1 @@
-4545a8f44375dd25606a8dcab5419632 Exception-Base-0.2401.tar.gz
+7aad69250044146a641fe34a2f8642dd Exception-Base-0.25.tar.gz
10 years, 11 months