* New upstream release 1.005.
Gregor Herrmann
13 years ago
23 | 23 | 'Apocalypse <APOCAL@cpan.org>' |
24 | 24 | ], |
25 | 25 | 'dist_name' => 'POE-Component-SSLify', |
26 | 'dist_version' => '1.004', | |
26 | 'dist_version' => '1.005', | |
27 | 27 | 'license' => 'perl', |
28 | 28 | 'module_name' => 'POE::Component::SSLify', |
29 | 29 | 'recommends' => {}, |
0 | 0 | Revision history for Perl extension POE::Component::SSLify. |
1 | ||
2 | 1.005 | |
3 | Released: 2011-03-10 07:55:30 UTC | |
4 | ||
5 | Fix the connfail tests due to an incorrect assumption regards socket close value, thanks CPANTesters! | |
1 | 6 | |
2 | 7 | 1.004 |
3 | 8 | Released: 2011-03-08 23:39:03 UTC |
1 | 1 | 9999-99-99 99:99:99 +0000 HEAD |
2 | 2 | ============================== |
3 | 3 | |
4 | commit d8b4c0e354acf683f17fd63186810226e101b54e | |
5 | Author: Apocalypse <perl@0ne.us> | |
6 | Date: Thu Mar 10 00:54:05 2011 -0700 | |
7 | ||
8 | fix an incorrect assumption in the connfail tests, thanks CPANTesters | |
9 | ||
10 | ======================================= | |
11 | 2011-03-08 16:43:43 -0700 release-1.004 | |
12 | ======================================= | |
13 | ||
14 | commit 073ae0a4eb74e7c7bd24db3717653ee5764db6bb | |
15 | Author: Apocalypse <perl@0ne.us> | |
16 | Date: Tue Mar 8 16:43:43 2011 -0700 | |
17 | ||
18 | New CPAN release of POE-Component-SSLify - v1.004 | |
19 | ||
20 | Released: 2011-03-08 23:39:03 UTC | |
21 | ||
22 | We now load certificate files via CTX_use_certificate_chain_file(), | |
23 | thanks Zephaniah E. Loss-Cutler-Hull <warp-spam_perl@aehallh.com> | |
24 | ||
25 | OpenSSL docs suggest it - | |
26 | http://www.openssl.org/docs/ssl/SSL_CTX_use_certificate.html#NOTES | |
27 | ||
28 | PLEASE yell at me if you need the old functionality - the docs | |
29 | suggest this is the "better" way to do it... | |
30 | ||
31 | Add the ability to pass a subref to call on connection/negotiation | |
32 | success, thanks Zephaniah E. Loss-Cutler-Hull | |
33 | <warp-spam_perl@aehallh.com> | |
34 | ||
35 | NOTE: This will not work if you do renegotiation or any other zany | |
36 | SSL stuff! | |
37 | ||
38 | Add the SSLify_GetStatus function to get the status of the connection | |
39 | ||
40 | After staring at the Net::SSLeay/OpenSSL docs for a while I realized | |
41 | we were missing support for sslv23 version, added! | |
42 | ||
43 | After some investigation, we now load all default ENGINEs for OpenSSL | |
44 | on startup, as it might provide a performance boost | |
45 | ||
4 | 46 | commit f9f664939980fdd646c3331815c7c9935e9ee248 |
5 | 47 | Author: Apocalypse <perl@0ne.us> |
6 | 48 | Date: Tue Mar 8 16:29:27 2011 -0700 |
57 | 57 | "provides" : { |
58 | 58 | "POE::Component::SSLify" : { |
59 | 59 | "file" : "lib/POE/Component/SSLify.pm", |
60 | "version" : "1.004" | |
60 | "version" : "1.005" | |
61 | 61 | }, |
62 | 62 | "POE::Component::SSLify::ClientHandle" : { |
63 | 63 | "file" : "lib/POE/Component/SSLify/ClientHandle.pm", |
64 | "version" : "1.004" | |
64 | "version" : "1.005" | |
65 | 65 | }, |
66 | 66 | "POE::Component::SSLify::ServerHandle" : { |
67 | 67 | "file" : "lib/POE/Component/SSLify/ServerHandle.pm", |
68 | "version" : "1.004" | |
68 | "version" : "1.005" | |
69 | 69 | } |
70 | 70 | }, |
71 | 71 | "release_status" : "stable", |
84 | 84 | "web" : "http://github.com/apocalypse/perl-poe-sslify" |
85 | 85 | } |
86 | 86 | }, |
87 | "version" : "1.004", | |
87 | "version" : "1.005", | |
88 | 88 | "x_BuiltWith" : { |
89 | 89 | "modules" : { |
90 | 90 | "Exporter" : "5.63", |
27 | 27 | provides: |
28 | 28 | POE::Component::SSLify: |
29 | 29 | file: lib/POE/Component/SSLify.pm |
30 | version: 1.004 | |
30 | version: 1.005 | |
31 | 31 | POE::Component::SSLify::ClientHandle: |
32 | 32 | file: lib/POE/Component/SSLify/ClientHandle.pm |
33 | version: 1.004 | |
33 | version: 1.005 | |
34 | 34 | POE::Component::SSLify::ServerHandle: |
35 | 35 | file: lib/POE/Component/SSLify/ServerHandle.pm |
36 | version: 1.004 | |
36 | version: 1.005 | |
37 | 37 | requires: |
38 | 38 | Exporter: 0 |
39 | 39 | IO::Handle: 1.28 |
48 | 48 | homepage: http://search.cpan.org/dist/POE-Component-SSLify/ |
49 | 49 | license: http://dev.perl.org/licenses/ |
50 | 50 | repository: git://github.com/apocalypse/perl-poe-sslify.git |
51 | version: 1.004 | |
51 | version: 1.005 | |
52 | 52 | x_BuiltWith: |
53 | 53 | modules: |
54 | 54 | Exporter: 5.63 |
36 | 36 | 'Task::Weaken' => '1.03', |
37 | 37 | 'parent' => '0' |
38 | 38 | }, |
39 | 'VERSION' => '1.004', | |
39 | 'VERSION' => '1.005', | |
40 | 40 | 'test' => { |
41 | 41 | 'TESTS' => 't/*.t' |
42 | 42 | } |
1 | 1 | POE::Component::SSLify - Makes using SSL in the world of POE easy! |
2 | 2 | |
3 | 3 | VERSION |
4 | This document describes v1.004 of POE::Component::SSLify - released March 08, 2011 as part of POE-Component-SSLify. | |
4 | This document describes v1.005 of POE::Component::SSLify - released March 10, 2011 as part of POE-Component-SSLify. | |
5 | 5 | |
6 | 6 | SYNOPSIS |
7 | 7 | # CLIENT-side usage |
13 | 13 | -----BEGIN PGP SIGNED MESSAGE----- |
14 | 14 | Hash: SHA1 |
15 | 15 | |
16 | SHA1 d435f238e487d8142e8518150b7855a233764459 Build.PL | |
17 | SHA1 d477fdd7d574483d63226b8874bcd0987453cde5 Changes | |
18 | SHA1 1c9fcb841a38b09c4c6d3f19e0c9bc20a467aa54 CommitLog | |
16 | SHA1 74d0a53111acfd4b4b7f9c269175a06e77309d86 Build.PL | |
17 | SHA1 0e7543ad72ae31c532a8298fae8a3c98cdc87e86 Changes | |
18 | SHA1 375fe756ad481b99709cf16d1a5378a7dee530ef CommitLog | |
19 | 19 | SHA1 e3edc44697d1770c65fec99f6ebdb6ea55fb3050 INSTALL |
20 | 20 | SHA1 263360e99a0de4d587fedefe1a919dcf61af1d10 LICENSE |
21 | 21 | SHA1 1baae2c8b4d91da92fdf35c5542137380f00c9e4 MANIFEST |
22 | 22 | SHA1 9dfc07c5655b958e800189837f3ddd37ca050bfe MANIFEST.SKIP |
23 | SHA1 686569e354f905cd3de3f08e283ad6f0885f917c META.json | |
24 | SHA1 85808fcb1a01f2e2f546848f8bc99dce585ff3f0 META.yml | |
25 | SHA1 0924ab6ac3ea8b7346f282e17e43b89799507237 Makefile.PL | |
26 | SHA1 48b7720f1cf878407b686404c53aabbb542bd310 README | |
23 | SHA1 bfa76e8e9cf9ce09d4b4fd98883f6d1b0639a4f6 META.json | |
24 | SHA1 5a4ea0cc9966848930db2129a75c3cf6bea77a45 META.yml | |
25 | SHA1 842e80effc5a192dd7d9ca2176d58985abb70a4c Makefile.PL | |
26 | SHA1 781198b6246cacc4b4c336bbacb47320a658f024 README | |
27 | 27 | SHA1 41a5da1356107d097f6bbf72c62ee4da83e4119f dist.ini |
28 | 28 | SHA1 96decb1c51052f9b024b6d069e428b4ccc19e909 examples/client.pl |
29 | 29 | SHA1 d8f9b44df461cdcf6cbd7cffd79a9d49aade3947 examples/server.pl |
30 | 30 | SHA1 c4a936c75d1d566e936dfb1776c9a01ea244c618 examples/serverclient.pl |
31 | SHA1 509e2a8a6af679d403ed916538596a60c0ac74b3 lib/POE/Component/SSLify.pm | |
32 | SHA1 6b1e09306b20af6f2a8006cc207f73be4a0e5944 lib/POE/Component/SSLify/ClientHandle.pm | |
33 | SHA1 b3677ae1f14989accb68427bdede87370d19e32d lib/POE/Component/SSLify/ServerHandle.pm | |
31 | SHA1 21353f9c92b51a2a27604af460d08f6993da9a28 lib/POE/Component/SSLify.pm | |
32 | SHA1 620bcbd8febf6eb4d4f066479c895b90302dedfd lib/POE/Component/SSLify/ClientHandle.pm | |
33 | SHA1 444dbb2e912dc3d94494ddb316b1950612d38288 lib/POE/Component/SSLify/ServerHandle.pm | |
34 | 34 | SHA1 59afa28f138a14b956443f915d60a891d5b306b8 mylib/example.crt |
35 | 35 | SHA1 f2ba02d28cfb207e0a86be7cb4f3c570f257bf93 mylib/example.key |
36 | 36 | SHA1 fd48b12e3df15fb55695e7d1b4ee95dc3c0cd766 t/00-compile.t |
39 | 39 | SHA1 0d6e08c744e377933f75c6d9fa25c37e3506d1a5 t/2_renegotiate.t |
40 | 40 | SHA1 73790060e55b0189540d898a97c485e187f05ae9 t/3_upgrade.t |
41 | 41 | SHA1 f8ba954e2a5bf546c3932eb9cc1ba9bf89a57385 t/4_connect_hook.t |
42 | SHA1 2a8853ebcd7064c1f4d39243ecdf24adb2f85459 t/5_connfail_client.t | |
43 | SHA1 93c04d0f28c590f39f621d130e02fb8f77cda897 t/6_connfail_server.t | |
42 | SHA1 4c7ecc5d6221a593b5961f53205eb016a1eee3bd t/5_connfail_client.t | |
43 | SHA1 89fa487c62b3e6aadc33bd1025bec93f2aabdc1d t/6_connfail_server.t | |
44 | 44 | SHA1 e3b390873d4de642e25fcfb4b7d16c00b096d24a t/apocalypse.t |
45 | 45 | -----BEGIN PGP SIGNATURE----- |
46 | 46 | Version: GnuPG v1.4.9 (GNU/Linux) |
47 | 47 | |
48 | iEYEARECAAYFAk12viEACgkQGfr7vsGKgxxkLwCfXhTLn9YyxGmWs69o5LLplJMD | |
49 | aSMAoLGwA6VYx7eY7kXyhrHQpRik3/JI | |
50 | =6gBh | |
48 | iEYEARECAAYFAk14g/0ACgkQGfr7vsGKgxzbqQCfVAAlTNCFi81uhNCljGXLGqOp | |
49 | BC4AoIytDbvdcMRaIj3mHDJP7ugIZyd9 | |
50 | =rNNR | |
51 | 51 | -----END PGP SIGNATURE----- |
0 | libpoe-component-sslify-perl (1.004-1) unstable; urgency=low | |
0 | libpoe-component-sslify-perl (1.005-1) UNRELEASED; urgency=low | |
1 | 1 | |
2 | * New upstream release | |
2 | [ Jonathan Yu ] | |
3 | * New upstream release 1.004 | |
3 | 4 | * Refresh spelling.patch (offset) |
4 | 5 | * Update dependencies per upstream |
5 | 6 | |
6 | -- Jonathan Yu <jawnsy@cpan.org> Wed, 09 Mar 2011 19:51:30 -0500 | |
7 | [ gregor herrmann ] | |
8 | * New upstream release 1.005. | |
9 | ||
10 | -- gregor herrmann <gregoa@debian.org> Thu, 10 Mar 2011 21:20:14 +0100 | |
7 | 11 | |
8 | 12 | libpoe-component-sslify-perl (1.003-1) unstable; urgency=low |
9 | 13 |
8 | 8 | use strict; use warnings; |
9 | 9 | package POE::Component::SSLify::ClientHandle; |
10 | 10 | BEGIN { |
11 | $POE::Component::SSLify::ClientHandle::VERSION = '1.004'; | |
11 | $POE::Component::SSLify::ClientHandle::VERSION = '1.005'; | |
12 | 12 | } |
13 | 13 | BEGIN { |
14 | 14 | $POE::Component::SSLify::ClientHandle::AUTHORITY = 'cpan:APOCAL'; |
72 | 72 | |
73 | 73 | =head1 VERSION |
74 | 74 | |
75 | This document describes v1.004 of POE::Component::SSLify::ClientHandle - released March 08, 2011 as part of POE-Component-SSLify. | |
75 | This document describes v1.005 of POE::Component::SSLify::ClientHandle - released March 10, 2011 as part of POE-Component-SSLify. | |
76 | 76 | |
77 | 77 | =head1 DESCRIPTION |
78 | 78 |
8 | 8 | use strict; use warnings; |
9 | 9 | package POE::Component::SSLify::ServerHandle; |
10 | 10 | BEGIN { |
11 | $POE::Component::SSLify::ServerHandle::VERSION = '1.004'; | |
11 | $POE::Component::SSLify::ServerHandle::VERSION = '1.005'; | |
12 | 12 | } |
13 | 13 | BEGIN { |
14 | 14 | $POE::Component::SSLify::ServerHandle::AUTHORITY = 'cpan:APOCAL'; |
224 | 224 | |
225 | 225 | =head1 VERSION |
226 | 226 | |
227 | This document describes v1.004 of POE::Component::SSLify::ServerHandle - released March 08, 2011 as part of POE-Component-SSLify. | |
227 | This document describes v1.005 of POE::Component::SSLify::ServerHandle - released March 10, 2011 as part of POE-Component-SSLify. | |
228 | 228 | |
229 | 229 | =head1 DESCRIPTION |
230 | 230 |
8 | 8 | use strict; use warnings; |
9 | 9 | package POE::Component::SSLify; |
10 | 10 | BEGIN { |
11 | $POE::Component::SSLify::VERSION = '1.004'; | |
11 | $POE::Component::SSLify::VERSION = '1.005'; | |
12 | 12 | } |
13 | 13 | BEGIN { |
14 | 14 | $POE::Component::SSLify::AUTHORITY = 'cpan:APOCAL'; |
281 | 281 | |
282 | 282 | =head1 VERSION |
283 | 283 | |
284 | This document describes v1.004 of POE::Component::SSLify - released March 08, 2011 as part of POE-Component-SSLify. | |
284 | This document describes v1.005 of POE::Component::SSLify - released March 10, 2011 as part of POE-Component-SSLify. | |
285 | 285 | |
286 | 286 | =head1 SYNOPSIS |
287 | 287 |
65 | 65 | # Thanks to H. Merijn Brand for spotting this FAIL in 5.12.0! |
66 | 66 | # The default PoCo::Server::TCP handler will throw a warning, which causes Test::NoWarnings to FAIL :( |
67 | 67 | my ($syscall, $errno, $error) = @_[ ARG0..ARG2 ]; |
68 | ||
69 | # Since this test purposefully sends garbage, we expect a connection reset by peer | |
70 | # not ok 7 - Got SERVER read error 104: Connection reset by peer | |
71 | ||
72 | # TODO are there other "errors" that is harmless? | |
73 | 68 | $error = "Normal disconnection" unless $error; |
74 | my $msg = "Got SERVER $syscall error $errno: $error"; | |
75 | unless ( $syscall eq 'read' and $errno == 104 ) { | |
76 | fail( $msg ); | |
77 | } else { | |
78 | diag( $msg ) if $ENV{TEST_VERBOSE}; | |
79 | } | |
69 | diag( "Got SERVER $syscall error $errno: $error" ) if $ENV{TEST_VERBOSE}; | |
80 | 70 | }, |
81 | 71 | ); |
82 | 72 | |
116 | 106 | # Thanks to H. Merijn Brand for spotting this FAIL in 5.12.0! |
117 | 107 | # The default PoCo::Client::TCP handler will throw a warning, which causes Test::NoWarnings to FAIL :( |
118 | 108 | my ($syscall, $errno, $error) = @_[ ARG0..ARG2 ]; |
119 | ||
120 | # TODO are there other "errors" that is harmless? | |
121 | 109 | $error = "Normal disconnection" unless $error; |
122 | my $msg = "Got CLIENT $syscall error $errno: $error"; | |
123 | unless ( $syscall eq 'read' and $errno == 0 ) { | |
124 | fail( $msg ); | |
125 | } else { | |
126 | diag( $msg ) if $ENV{TEST_VERBOSE}; | |
127 | } | |
110 | diag( "Got CLIENT $syscall error $errno: $error" ) if $ENV{TEST_VERBOSE}; | |
128 | 111 | }, |
129 | 112 | ); |
130 | 113 |
86 | 86 | # Thanks to H. Merijn Brand for spotting this FAIL in 5.12.0! |
87 | 87 | # The default PoCo::Server::TCP handler will throw a warning, which causes Test::NoWarnings to FAIL :( |
88 | 88 | my ($syscall, $errno, $error) = @_[ ARG0..ARG2 ]; |
89 | ||
90 | # Since this test purposefully sends garbage, we expect a connection reset by peer | |
91 | # not ok 7 - Got SERVER read error 104: Connection reset by peer | |
92 | ||
93 | # TODO are there other "errors" that is harmless? | |
94 | 89 | $error = "Normal disconnection" unless $error; |
95 | my $msg = "Got SERVER $syscall error $errno: $error"; | |
96 | unless ( $syscall eq 'read' and $errno == 104 ) { | |
97 | fail( $msg ); | |
98 | } else { | |
99 | diag( $msg ) if $ENV{TEST_VERBOSE}; | |
100 | } | |
90 | diag( "Got SERVER $syscall error $errno: $error" ) if $ENV{TEST_VERBOSE}; | |
101 | 91 | }, |
102 | 92 | ); |
103 | 93 | |
123 | 113 | # Thanks to H. Merijn Brand for spotting this FAIL in 5.12.0! |
124 | 114 | # The default PoCo::Client::TCP handler will throw a warning, which causes Test::NoWarnings to FAIL :( |
125 | 115 | my ($syscall, $errno, $error) = @_[ ARG0..ARG2 ]; |
126 | ||
127 | # Since this test purposefully sends garbage, we expect a connection reset by peer | |
128 | # not ok 7 - Got SERVER read error 104: Connection reset by peer | |
129 | ||
130 | # TODO are there other "errors" that is harmless? | |
131 | 116 | $error = "Normal disconnection" unless $error; |
132 | my $msg = "Got CLIENT $syscall error $errno: $error"; | |
133 | unless ( $syscall eq 'read' and $errno == 104 ) { | |
134 | fail( $msg ); | |
135 | } else { | |
136 | diag( $msg ) if $ENV{TEST_VERBOSE}; | |
137 | } | |
117 | diag( "Got CLIENT $syscall error $errno: $error" ) if $ENV{TEST_VERBOSE}; | |
138 | 118 | }, |
139 | 119 | ); |
140 | 120 |