From 9b50c005e07cd89288d441caa0c03e05d46ec03d Mon Sep 17 00:00:00 2001 From: Kent Fredric Date: Wed, 15 Apr 2020 01:26:34 +1200 Subject: [PATCH] dev-perl/LWP-Protocol-https: Remove old 6.60.0 Package-Manager: Portage-2.3.97, Repoman-2.3.22 Signed-off-by: Kent Fredric --- .../LWP-Protocol-https-6.60.0.ebuild | 31 ----------------- dev-perl/LWP-Protocol-https/Manifest | 1 - ...-Protocol-https-6.60.0-CVE-2014-3230.patch | 22 ------------- ...WP-Protocol-https-6.60.0-etcsslcerts.patch | 33 ------------------- 4 files changed, 87 deletions(-) delete mode 100644 dev-perl/LWP-Protocol-https/LWP-Protocol-https-6.60.0.ebuild delete mode 100644 dev-perl/LWP-Protocol-https/files/LWP-Protocol-https-6.60.0-CVE-2014-3230.patch delete mode 100644 dev-perl/LWP-Protocol-https/files/LWP-Protocol-https-6.60.0-etcsslcerts.patch diff --git a/dev-perl/LWP-Protocol-https/LWP-Protocol-https-6.60.0.ebuild b/dev-perl/LWP-Protocol-https/LWP-Protocol-https-6.60.0.ebuild deleted file mode 100644 index e556818760c1..000000000000 --- a/dev-perl/LWP-Protocol-https/LWP-Protocol-https-6.60.0.ebuild +++ /dev/null @@ -1,31 +0,0 @@ -# Copyright 1999-2020 Gentoo Authors -# Distributed under the terms of the GNU General Public License v2 - -EAPI=5 - -MODULE_AUTHOR=MSCHILLI -MODULE_VERSION=6.06 -inherit perl-module - -DESCRIPTION="Provide https support for LWP::UserAgent" - -SLOT="0" -IUSE="" -KEYWORDS="~alpha amd64 arm ~arm64 hppa ~ia64 ~m68k ~mips ppc ppc64 s390 sparc x86 ~ppc-aix ~amd64-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris" - -RDEPEND=" - app-misc/ca-certificates - >=dev-perl/libwww-perl-6.20.0 - >=dev-perl/Net-HTTP-6 - >=dev-perl/IO-Socket-SSL-1.540.0 -" -DEPEND="${RDEPEND} - virtual/perl-ExtUtils-MakeMaker -" - -PATCHES=( - "${FILESDIR}"/${PN}-6.60.0-etcsslcerts.patch - "${FILESDIR}"/${PN}-6.60.0-CVE-2014-3230.patch -) - -SRC_TEST=online diff --git a/dev-perl/LWP-Protocol-https/Manifest b/dev-perl/LWP-Protocol-https/Manifest index 2e89b3616f06..e08448021c93 100644 --- a/dev-perl/LWP-Protocol-https/Manifest +++ b/dev-perl/LWP-Protocol-https/Manifest @@ -1,2 +1 @@ -DIST LWP-Protocol-https-6.06.tar.gz 8376 BLAKE2B f8c19db22689c50b707f45d19f745e49329edf14d87a888f9d5d4eab901d5bbeac0b525f13a3dd0ad8ab642a2ea7f2a77167a86ccbe5bc6644bc4478531be8ec SHA512 acc65d63da858f25cf9cc1e11d074f035e8ead4c1ffea22bac930f61100ff98f2bf0bb4ede12219d6c22bd5fe4d99532a45fe5cbc9a4b863dd16b0c379f8d2ea DIST LWP-Protocol-https-6.07.tar.gz 9184 BLAKE2B 0104a51ac8b5cedeedc2f19bf6079a2f22f050db5f9e9030a015b473c63c8c01ea1716551a30e9602323dd420fdd50e304840722d214d38e1ae2a0347c91448a SHA512 4a07cd8a1c44e31781069a632a77f3af43747933420e831b4fd4a12faac7dc04f0c6b10ea773c3e14ecb66209a547b3587c0e3f481a55b9929db65f7b10343aa diff --git a/dev-perl/LWP-Protocol-https/files/LWP-Protocol-https-6.60.0-CVE-2014-3230.patch b/dev-perl/LWP-Protocol-https/files/LWP-Protocol-https-6.60.0-CVE-2014-3230.patch deleted file mode 100644 index 1eb26d2e4092..000000000000 --- a/dev-perl/LWP-Protocol-https/files/LWP-Protocol-https-6.60.0-CVE-2014-3230.patch +++ /dev/null @@ -1,22 +0,0 @@ -Source: https://bugzilla.redhat.com/show_bug.cgi?id=1094440 - -This patch combines the following two: -https://bugzilla.redhat.com/attachment.cgi?id=894747 -https://bugzilla.redhat.com/attachment.cgi?id=894748 - -diff -ruN LWP-Protocol-https-6.06.orig/lib/LWP/Protocol/https.pm LWP-Protocol-https-6.06/lib/LWP/Protocol/https.pm ---- LWP-Protocol-https-6.06.orig/lib/LWP/Protocol/https.pm 2014-04-18 18:33:26.000000000 +0200 -+++ LWP-Protocol-https-6.06/lib/LWP/Protocol/https.pm 2014-10-26 23:57:27.714303175 +0100 -@@ -21,7 +21,11 @@ - $ssl_opts{SSL_verifycn_scheme} = 'www'; - } - else { -- $ssl_opts{SSL_verify_mode} = 0; -+ if ( $Net::HTTPS::SSL_SOCKET_CLASS eq 'Net::SSL' ) { -+ $ssl_opts{SSL_verifycn_scheme} = ''; -+ } else { -+ $ssl_opts{SSL_verifycn_scheme} = 'none'; -+ } - } - if ($ssl_opts{SSL_verify_mode}) { - unless (exists $ssl_opts{SSL_ca_file} || exists $ssl_opts{SSL_ca_path}) { diff --git a/dev-perl/LWP-Protocol-https/files/LWP-Protocol-https-6.60.0-etcsslcerts.patch b/dev-perl/LWP-Protocol-https/files/LWP-Protocol-https-6.60.0-etcsslcerts.patch deleted file mode 100644 index 55163a097835..000000000000 --- a/dev-perl/LWP-Protocol-https/files/LWP-Protocol-https-6.60.0-etcsslcerts.patch +++ /dev/null @@ -1,33 +0,0 @@ -See https://bugs.gentoo.org/358081 - - -diff -ruN LWP-Protocol-https-6.06.orig/lib/LWP/Protocol/https.pm LWP-Protocol-https-6.06/lib/LWP/Protocol/https.pm ---- LWP-Protocol-https-6.06.orig/lib/LWP/Protocol/https.pm 2014-04-18 18:33:26.000000000 +0200 -+++ LWP-Protocol-https-6.06/lib/LWP/Protocol/https.pm 2014-10-27 00:04:50.604802937 +0100 -@@ -25,25 +25,7 @@ - } - if ($ssl_opts{SSL_verify_mode}) { - unless (exists $ssl_opts{SSL_ca_file} || exists $ssl_opts{SSL_ca_path}) { -- eval { -- require Mozilla::CA; -- }; -- if ($@) { -- if ($@ =! /^Can't locate Mozilla\/CA\.pm/) { -- $@ = <<'EOT'; --Can't verify SSL peers without knowing which Certificate Authorities to trust -- --This problem can be fixed by either setting the PERL_LWP_SSL_CA_FILE --environment variable or by installing the Mozilla::CA module. -- --To disable verification of SSL peers set the PERL_LWP_SSL_VERIFY_HOSTNAME --environment variable to 0. If you do this you can't be sure that you --communicate with the expected peer. --EOT -- } -- die $@; -- } -- $ssl_opts{SSL_ca_file} = Mozilla::CA::SSL_ca_file(); -+ $ssl_opts{SSL_ca_path} = '/etc/ssl/certs'; - } - } - $self->{ssl_opts} = \%ssl_opts; -- 2.26.2