Codebase list libpoe-component-sslify-perl / 7d7564e
* New upstream release 1.005. Gregor Herrmann 13 years ago
14 changed file(s) with 90 addition(s) and 76 deletion(s). Raw diff Collapse all Expand all
2323 'Apocalypse <APOCAL@cpan.org>'
2424 ],
2525 'dist_name' => 'POE-Component-SSLify',
26 'dist_version' => '1.004',
26 'dist_version' => '1.005',
2727 'license' => 'perl',
2828 'module_name' => 'POE::Component::SSLify',
2929 'recommends' => {},
00 Revision history for Perl extension POE::Component::SSLify.
1
2 1.005
3 Released: 2011-03-10 07:55:30 UTC
4
5 Fix the connfail tests due to an incorrect assumption regards socket close value, thanks CPANTesters!
16
27 1.004
38 Released: 2011-03-08 23:39:03 UTC
11 9999-99-99 99:99:99 +0000 HEAD
22 ==============================
33
4 commit d8b4c0e354acf683f17fd63186810226e101b54e
5 Author: Apocalypse <perl@0ne.us>
6 Date: Thu Mar 10 00:54:05 2011 -0700
7
8 fix an incorrect assumption in the connfail tests, thanks CPANTesters
9
10 =======================================
11 2011-03-08 16:43:43 -0700 release-1.004
12 =======================================
13
14 commit 073ae0a4eb74e7c7bd24db3717653ee5764db6bb
15 Author: Apocalypse <perl@0ne.us>
16 Date: Tue Mar 8 16:43:43 2011 -0700
17
18 New CPAN release of POE-Component-SSLify - v1.004
19
20 Released: 2011-03-08 23:39:03 UTC
21
22 We now load certificate files via CTX_use_certificate_chain_file(),
23 thanks Zephaniah E. Loss-Cutler-Hull <warp-spam_perl@aehallh.com>
24
25 OpenSSL docs suggest it -
26 http://www.openssl.org/docs/ssl/SSL_CTX_use_certificate.html#NOTES
27
28 PLEASE yell at me if you need the old functionality - the docs
29 suggest this is the "better" way to do it...
30
31 Add the ability to pass a subref to call on connection/negotiation
32 success, thanks Zephaniah E. Loss-Cutler-Hull
33 <warp-spam_perl@aehallh.com>
34
35 NOTE: This will not work if you do renegotiation or any other zany
36 SSL stuff!
37
38 Add the SSLify_GetStatus function to get the status of the connection
39
40 After staring at the Net::SSLeay/OpenSSL docs for a while I realized
41 we were missing support for sslv23 version, added!
42
43 After some investigation, we now load all default ENGINEs for OpenSSL
44 on startup, as it might provide a performance boost
45
446 commit f9f664939980fdd646c3331815c7c9935e9ee248
547 Author: Apocalypse <perl@0ne.us>
648 Date: Tue Mar 8 16:29:27 2011 -0700
5757 "provides" : {
5858 "POE::Component::SSLify" : {
5959 "file" : "lib/POE/Component/SSLify.pm",
60 "version" : "1.004"
60 "version" : "1.005"
6161 },
6262 "POE::Component::SSLify::ClientHandle" : {
6363 "file" : "lib/POE/Component/SSLify/ClientHandle.pm",
64 "version" : "1.004"
64 "version" : "1.005"
6565 },
6666 "POE::Component::SSLify::ServerHandle" : {
6767 "file" : "lib/POE/Component/SSLify/ServerHandle.pm",
68 "version" : "1.004"
68 "version" : "1.005"
6969 }
7070 },
7171 "release_status" : "stable",
8484 "web" : "http://github.com/apocalypse/perl-poe-sslify"
8585 }
8686 },
87 "version" : "1.004",
87 "version" : "1.005",
8888 "x_BuiltWith" : {
8989 "modules" : {
9090 "Exporter" : "5.63",
2727 provides:
2828 POE::Component::SSLify:
2929 file: lib/POE/Component/SSLify.pm
30 version: 1.004
30 version: 1.005
3131 POE::Component::SSLify::ClientHandle:
3232 file: lib/POE/Component/SSLify/ClientHandle.pm
33 version: 1.004
33 version: 1.005
3434 POE::Component::SSLify::ServerHandle:
3535 file: lib/POE/Component/SSLify/ServerHandle.pm
36 version: 1.004
36 version: 1.005
3737 requires:
3838 Exporter: 0
3939 IO::Handle: 1.28
4848 homepage: http://search.cpan.org/dist/POE-Component-SSLify/
4949 license: http://dev.perl.org/licenses/
5050 repository: git://github.com/apocalypse/perl-poe-sslify.git
51 version: 1.004
51 version: 1.005
5252 x_BuiltWith:
5353 modules:
5454 Exporter: 5.63
3636 'Task::Weaken' => '1.03',
3737 'parent' => '0'
3838 },
39 'VERSION' => '1.004',
39 'VERSION' => '1.005',
4040 'test' => {
4141 'TESTS' => 't/*.t'
4242 }
11 POE::Component::SSLify - Makes using SSL in the world of POE easy!
22
33 VERSION
4 This document describes v1.004 of POE::Component::SSLify - released March 08, 2011 as part of POE-Component-SSLify.
4 This document describes v1.005 of POE::Component::SSLify - released March 10, 2011 as part of POE-Component-SSLify.
55
66 SYNOPSIS
77 # CLIENT-side usage
1313 -----BEGIN PGP SIGNED MESSAGE-----
1414 Hash: SHA1
1515
16 SHA1 d435f238e487d8142e8518150b7855a233764459 Build.PL
17 SHA1 d477fdd7d574483d63226b8874bcd0987453cde5 Changes
18 SHA1 1c9fcb841a38b09c4c6d3f19e0c9bc20a467aa54 CommitLog
16 SHA1 74d0a53111acfd4b4b7f9c269175a06e77309d86 Build.PL
17 SHA1 0e7543ad72ae31c532a8298fae8a3c98cdc87e86 Changes
18 SHA1 375fe756ad481b99709cf16d1a5378a7dee530ef CommitLog
1919 SHA1 e3edc44697d1770c65fec99f6ebdb6ea55fb3050 INSTALL
2020 SHA1 263360e99a0de4d587fedefe1a919dcf61af1d10 LICENSE
2121 SHA1 1baae2c8b4d91da92fdf35c5542137380f00c9e4 MANIFEST
2222 SHA1 9dfc07c5655b958e800189837f3ddd37ca050bfe MANIFEST.SKIP
23 SHA1 686569e354f905cd3de3f08e283ad6f0885f917c META.json
24 SHA1 85808fcb1a01f2e2f546848f8bc99dce585ff3f0 META.yml
25 SHA1 0924ab6ac3ea8b7346f282e17e43b89799507237 Makefile.PL
26 SHA1 48b7720f1cf878407b686404c53aabbb542bd310 README
23 SHA1 bfa76e8e9cf9ce09d4b4fd98883f6d1b0639a4f6 META.json
24 SHA1 5a4ea0cc9966848930db2129a75c3cf6bea77a45 META.yml
25 SHA1 842e80effc5a192dd7d9ca2176d58985abb70a4c Makefile.PL
26 SHA1 781198b6246cacc4b4c336bbacb47320a658f024 README
2727 SHA1 41a5da1356107d097f6bbf72c62ee4da83e4119f dist.ini
2828 SHA1 96decb1c51052f9b024b6d069e428b4ccc19e909 examples/client.pl
2929 SHA1 d8f9b44df461cdcf6cbd7cffd79a9d49aade3947 examples/server.pl
3030 SHA1 c4a936c75d1d566e936dfb1776c9a01ea244c618 examples/serverclient.pl
31 SHA1 509e2a8a6af679d403ed916538596a60c0ac74b3 lib/POE/Component/SSLify.pm
32 SHA1 6b1e09306b20af6f2a8006cc207f73be4a0e5944 lib/POE/Component/SSLify/ClientHandle.pm
33 SHA1 b3677ae1f14989accb68427bdede87370d19e32d lib/POE/Component/SSLify/ServerHandle.pm
31 SHA1 21353f9c92b51a2a27604af460d08f6993da9a28 lib/POE/Component/SSLify.pm
32 SHA1 620bcbd8febf6eb4d4f066479c895b90302dedfd lib/POE/Component/SSLify/ClientHandle.pm
33 SHA1 444dbb2e912dc3d94494ddb316b1950612d38288 lib/POE/Component/SSLify/ServerHandle.pm
3434 SHA1 59afa28f138a14b956443f915d60a891d5b306b8 mylib/example.crt
3535 SHA1 f2ba02d28cfb207e0a86be7cb4f3c570f257bf93 mylib/example.key
3636 SHA1 fd48b12e3df15fb55695e7d1b4ee95dc3c0cd766 t/00-compile.t
3939 SHA1 0d6e08c744e377933f75c6d9fa25c37e3506d1a5 t/2_renegotiate.t
4040 SHA1 73790060e55b0189540d898a97c485e187f05ae9 t/3_upgrade.t
4141 SHA1 f8ba954e2a5bf546c3932eb9cc1ba9bf89a57385 t/4_connect_hook.t
42 SHA1 2a8853ebcd7064c1f4d39243ecdf24adb2f85459 t/5_connfail_client.t
43 SHA1 93c04d0f28c590f39f621d130e02fb8f77cda897 t/6_connfail_server.t
42 SHA1 4c7ecc5d6221a593b5961f53205eb016a1eee3bd t/5_connfail_client.t
43 SHA1 89fa487c62b3e6aadc33bd1025bec93f2aabdc1d t/6_connfail_server.t
4444 SHA1 e3b390873d4de642e25fcfb4b7d16c00b096d24a t/apocalypse.t
4545 -----BEGIN PGP SIGNATURE-----
4646 Version: GnuPG v1.4.9 (GNU/Linux)
4747
48 iEYEARECAAYFAk12viEACgkQGfr7vsGKgxxkLwCfXhTLn9YyxGmWs69o5LLplJMD
49 aSMAoLGwA6VYx7eY7kXyhrHQpRik3/JI
50 =6gBh
48 iEYEARECAAYFAk14g/0ACgkQGfr7vsGKgxzbqQCfVAAlTNCFi81uhNCljGXLGqOp
49 BC4AoIytDbvdcMRaIj3mHDJP7ugIZyd9
50 =rNNR
5151 -----END PGP SIGNATURE-----
0 libpoe-component-sslify-perl (1.004-1) unstable; urgency=low
0 libpoe-component-sslify-perl (1.005-1) UNRELEASED; urgency=low
11
2 * New upstream release
2 [ Jonathan Yu ]
3 * New upstream release 1.004
34 * Refresh spelling.patch (offset)
45 * Update dependencies per upstream
56
6 -- Jonathan Yu <jawnsy@cpan.org> Wed, 09 Mar 2011 19:51:30 -0500
7 [ gregor herrmann ]
8 * New upstream release 1.005.
9
10 -- gregor herrmann <gregoa@debian.org> Thu, 10 Mar 2011 21:20:14 +0100
711
812 libpoe-component-sslify-perl (1.003-1) unstable; urgency=low
913
88 use strict; use warnings;
99 package POE::Component::SSLify::ClientHandle;
1010 BEGIN {
11 $POE::Component::SSLify::ClientHandle::VERSION = '1.004';
11 $POE::Component::SSLify::ClientHandle::VERSION = '1.005';
1212 }
1313 BEGIN {
1414 $POE::Component::SSLify::ClientHandle::AUTHORITY = 'cpan:APOCAL';
7272
7373 =head1 VERSION
7474
75 This document describes v1.004 of POE::Component::SSLify::ClientHandle - released March 08, 2011 as part of POE-Component-SSLify.
75 This document describes v1.005 of POE::Component::SSLify::ClientHandle - released March 10, 2011 as part of POE-Component-SSLify.
7676
7777 =head1 DESCRIPTION
7878
88 use strict; use warnings;
99 package POE::Component::SSLify::ServerHandle;
1010 BEGIN {
11 $POE::Component::SSLify::ServerHandle::VERSION = '1.004';
11 $POE::Component::SSLify::ServerHandle::VERSION = '1.005';
1212 }
1313 BEGIN {
1414 $POE::Component::SSLify::ServerHandle::AUTHORITY = 'cpan:APOCAL';
224224
225225 =head1 VERSION
226226
227 This document describes v1.004 of POE::Component::SSLify::ServerHandle - released March 08, 2011 as part of POE-Component-SSLify.
227 This document describes v1.005 of POE::Component::SSLify::ServerHandle - released March 10, 2011 as part of POE-Component-SSLify.
228228
229229 =head1 DESCRIPTION
230230
88 use strict; use warnings;
99 package POE::Component::SSLify;
1010 BEGIN {
11 $POE::Component::SSLify::VERSION = '1.004';
11 $POE::Component::SSLify::VERSION = '1.005';
1212 }
1313 BEGIN {
1414 $POE::Component::SSLify::AUTHORITY = 'cpan:APOCAL';
281281
282282 =head1 VERSION
283283
284 This document describes v1.004 of POE::Component::SSLify - released March 08, 2011 as part of POE-Component-SSLify.
284 This document describes v1.005 of POE::Component::SSLify - released March 10, 2011 as part of POE-Component-SSLify.
285285
286286 =head1 SYNOPSIS
287287
6565 # Thanks to H. Merijn Brand for spotting this FAIL in 5.12.0!
6666 # The default PoCo::Server::TCP handler will throw a warning, which causes Test::NoWarnings to FAIL :(
6767 my ($syscall, $errno, $error) = @_[ ARG0..ARG2 ];
68
69 # Since this test purposefully sends garbage, we expect a connection reset by peer
70 # not ok 7 - Got SERVER read error 104: Connection reset by peer
71
72 # TODO are there other "errors" that is harmless?
7368 $error = "Normal disconnection" unless $error;
74 my $msg = "Got SERVER $syscall error $errno: $error";
75 unless ( $syscall eq 'read' and $errno == 104 ) {
76 fail( $msg );
77 } else {
78 diag( $msg ) if $ENV{TEST_VERBOSE};
79 }
69 diag( "Got SERVER $syscall error $errno: $error" ) if $ENV{TEST_VERBOSE};
8070 },
8171 );
8272
116106 # Thanks to H. Merijn Brand for spotting this FAIL in 5.12.0!
117107 # The default PoCo::Client::TCP handler will throw a warning, which causes Test::NoWarnings to FAIL :(
118108 my ($syscall, $errno, $error) = @_[ ARG0..ARG2 ];
119
120 # TODO are there other "errors" that is harmless?
121109 $error = "Normal disconnection" unless $error;
122 my $msg = "Got CLIENT $syscall error $errno: $error";
123 unless ( $syscall eq 'read' and $errno == 0 ) {
124 fail( $msg );
125 } else {
126 diag( $msg ) if $ENV{TEST_VERBOSE};
127 }
110 diag( "Got CLIENT $syscall error $errno: $error" ) if $ENV{TEST_VERBOSE};
128111 },
129112 );
130113
8686 # Thanks to H. Merijn Brand for spotting this FAIL in 5.12.0!
8787 # The default PoCo::Server::TCP handler will throw a warning, which causes Test::NoWarnings to FAIL :(
8888 my ($syscall, $errno, $error) = @_[ ARG0..ARG2 ];
89
90 # Since this test purposefully sends garbage, we expect a connection reset by peer
91 # not ok 7 - Got SERVER read error 104: Connection reset by peer
92
93 # TODO are there other "errors" that is harmless?
9489 $error = "Normal disconnection" unless $error;
95 my $msg = "Got SERVER $syscall error $errno: $error";
96 unless ( $syscall eq 'read' and $errno == 104 ) {
97 fail( $msg );
98 } else {
99 diag( $msg ) if $ENV{TEST_VERBOSE};
100 }
90 diag( "Got SERVER $syscall error $errno: $error" ) if $ENV{TEST_VERBOSE};
10191 },
10292 );
10393
123113 # Thanks to H. Merijn Brand for spotting this FAIL in 5.12.0!
124114 # The default PoCo::Client::TCP handler will throw a warning, which causes Test::NoWarnings to FAIL :(
125115 my ($syscall, $errno, $error) = @_[ ARG0..ARG2 ];
126
127 # Since this test purposefully sends garbage, we expect a connection reset by peer
128 # not ok 7 - Got SERVER read error 104: Connection reset by peer
129
130 # TODO are there other "errors" that is harmless?
131116 $error = "Normal disconnection" unless $error;
132 my $msg = "Got CLIENT $syscall error $errno: $error";
133 unless ( $syscall eq 'read' and $errno == 104 ) {
134 fail( $msg );
135 } else {
136 diag( $msg ) if $ENV{TEST_VERBOSE};
137 }
117 diag( "Got CLIENT $syscall error $errno: $error" ) if $ENV{TEST_VERBOSE};
138118 },
139119 );
140120