dev-perl/LWP-Protocol-https: Remove old 6.60.0
authorKent Fredric <kentnl@gentoo.org>
Tue, 14 Apr 2020 13:26:34 +0000 (01:26 +1200)
committerKent Fredric <kentnl@gentoo.org>
Tue, 14 Apr 2020 13:56:35 +0000 (01:56 +1200)
Package-Manager: Portage-2.3.97, Repoman-2.3.22
Signed-off-by: Kent Fredric <kentnl@gentoo.org>
dev-perl/LWP-Protocol-https/LWP-Protocol-https-6.60.0.ebuild [deleted file]
dev-perl/LWP-Protocol-https/Manifest
dev-perl/LWP-Protocol-https/files/LWP-Protocol-https-6.60.0-CVE-2014-3230.patch [deleted file]
dev-perl/LWP-Protocol-https/files/LWP-Protocol-https-6.60.0-etcsslcerts.patch [deleted file]

diff --git a/dev-perl/LWP-Protocol-https/LWP-Protocol-https-6.60.0.ebuild b/dev-perl/LWP-Protocol-https/LWP-Protocol-https-6.60.0.ebuild
deleted file mode 100644 (file)
index e556818..0000000
+++ /dev/null
@@ -1,31 +0,0 @@
-# Copyright 1999-2020 Gentoo Authors
-# Distributed under the terms of the GNU General Public License v2
-
-EAPI=5
-
-MODULE_AUTHOR=MSCHILLI
-MODULE_VERSION=6.06
-inherit perl-module
-
-DESCRIPTION="Provide https support for LWP::UserAgent"
-
-SLOT="0"
-IUSE=""
-KEYWORDS="~alpha amd64 arm ~arm64 hppa ~ia64 ~m68k ~mips ppc ppc64 s390 sparc x86 ~ppc-aix ~amd64-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris"
-
-RDEPEND="
-       app-misc/ca-certificates
-       >=dev-perl/libwww-perl-6.20.0
-       >=dev-perl/Net-HTTP-6
-       >=dev-perl/IO-Socket-SSL-1.540.0
-"
-DEPEND="${RDEPEND}
-       virtual/perl-ExtUtils-MakeMaker
-"
-
-PATCHES=(
-       "${FILESDIR}"/${PN}-6.60.0-etcsslcerts.patch
-       "${FILESDIR}"/${PN}-6.60.0-CVE-2014-3230.patch
-)
-
-SRC_TEST=online
index 2e89b3616f061388924ec87cc24f7976ab0da4cf..e08448021c934391ebcee8f11cd6c3955aa9989b 100644 (file)
@@ -1,2 +1 @@
-DIST LWP-Protocol-https-6.06.tar.gz 8376 BLAKE2B f8c19db22689c50b707f45d19f745e49329edf14d87a888f9d5d4eab901d5bbeac0b525f13a3dd0ad8ab642a2ea7f2a77167a86ccbe5bc6644bc4478531be8ec SHA512 acc65d63da858f25cf9cc1e11d074f035e8ead4c1ffea22bac930f61100ff98f2bf0bb4ede12219d6c22bd5fe4d99532a45fe5cbc9a4b863dd16b0c379f8d2ea
 DIST LWP-Protocol-https-6.07.tar.gz 9184 BLAKE2B 0104a51ac8b5cedeedc2f19bf6079a2f22f050db5f9e9030a015b473c63c8c01ea1716551a30e9602323dd420fdd50e304840722d214d38e1ae2a0347c91448a SHA512 4a07cd8a1c44e31781069a632a77f3af43747933420e831b4fd4a12faac7dc04f0c6b10ea773c3e14ecb66209a547b3587c0e3f481a55b9929db65f7b10343aa
diff --git a/dev-perl/LWP-Protocol-https/files/LWP-Protocol-https-6.60.0-CVE-2014-3230.patch b/dev-perl/LWP-Protocol-https/files/LWP-Protocol-https-6.60.0-CVE-2014-3230.patch
deleted file mode 100644 (file)
index 1eb26d2..0000000
+++ /dev/null
@@ -1,22 +0,0 @@
-Source: https://bugzilla.redhat.com/show_bug.cgi?id=1094440
-
-This patch combines the following two:
-https://bugzilla.redhat.com/attachment.cgi?id=894747
-https://bugzilla.redhat.com/attachment.cgi?id=894748
-
-diff -ruN LWP-Protocol-https-6.06.orig/lib/LWP/Protocol/https.pm LWP-Protocol-https-6.06/lib/LWP/Protocol/https.pm
---- LWP-Protocol-https-6.06.orig/lib/LWP/Protocol/https.pm     2014-04-18 18:33:26.000000000 +0200
-+++ LWP-Protocol-https-6.06/lib/LWP/Protocol/https.pm  2014-10-26 23:57:27.714303175 +0100
-@@ -21,7 +21,11 @@
-       $ssl_opts{SSL_verifycn_scheme} = 'www';
-     }
-     else {
--      $ssl_opts{SSL_verify_mode} = 0;
-+      if ( $Net::HTTPS::SSL_SOCKET_CLASS eq 'Net::SSL' ) {
-+          $ssl_opts{SSL_verifycn_scheme} = '';
-+      } else {
-+          $ssl_opts{SSL_verifycn_scheme} = 'none';
-+      }
-     }
-     if ($ssl_opts{SSL_verify_mode}) {
-       unless (exists $ssl_opts{SSL_ca_file} || exists $ssl_opts{SSL_ca_path}) {
diff --git a/dev-perl/LWP-Protocol-https/files/LWP-Protocol-https-6.60.0-etcsslcerts.patch b/dev-perl/LWP-Protocol-https/files/LWP-Protocol-https-6.60.0-etcsslcerts.patch
deleted file mode 100644 (file)
index 55163a0..0000000
+++ /dev/null
@@ -1,33 +0,0 @@
-See https://bugs.gentoo.org/358081
-
-
-diff -ruN LWP-Protocol-https-6.06.orig/lib/LWP/Protocol/https.pm LWP-Protocol-https-6.06/lib/LWP/Protocol/https.pm
---- LWP-Protocol-https-6.06.orig/lib/LWP/Protocol/https.pm     2014-04-18 18:33:26.000000000 +0200
-+++ LWP-Protocol-https-6.06/lib/LWP/Protocol/https.pm  2014-10-27 00:04:50.604802937 +0100
-@@ -25,25 +25,7 @@
-     }
-     if ($ssl_opts{SSL_verify_mode}) {
-       unless (exists $ssl_opts{SSL_ca_file} || exists $ssl_opts{SSL_ca_path}) {
--          eval {
--              require Mozilla::CA;
--          };
--          if ($@) {
--              if ($@ =! /^Can't locate Mozilla\/CA\.pm/) {
--                  $@ = <<'EOT';
--Can't verify SSL peers without knowing which Certificate Authorities to trust
--
--This problem can be fixed by either setting the PERL_LWP_SSL_CA_FILE
--environment variable or by installing the Mozilla::CA module.
--
--To disable verification of SSL peers set the PERL_LWP_SSL_VERIFY_HOSTNAME
--environment variable to 0.  If you do this you can't be sure that you
--communicate with the expected peer.
--EOT
--              }
--              die $@;
--          }
--          $ssl_opts{SSL_ca_file} = Mozilla::CA::SSL_ca_file();
-+          $ssl_opts{SSL_ca_path} = '/etc/ssl/certs';
-       }
-     }
-     $self->{ssl_opts} = \%ssl_opts;