Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: perl-Module-Signature | Distribution: SUSE Linux Enterprise 15 SP6 |
Version: 0.88 | Vendor: openSUSE |
Release: bp156.2.1 | Build date: Sat Jul 22 11:43:54 2023 |
Group: Unspecified | Build host: goat01 |
Size: 139085 | Source RPM: perl-Module-Signature-0.88-bp156.2.1.src.rpm |
Packager: https://bugs.opensuse.org | |
Url: https://metacpan.org/release/Module-Signature | |
Summary: Module signature file manipulation |
*Module::Signature* adds cryptographic authentications to CPAN distributions, via the special _SIGNATURE_ file. If you are a module user, all you have to do is to remember to run 'cpansign -v' (or just 'cpansign') before issuing 'perl Makefile.PL' or 'perl Build.PL'; that will ensure the distribution has not been tampered with. Module authors can easily add the _SIGNATURE_ file to the distribution tarball; see NOTES below for how to do it as part of 'make dist'. If you _really_ want to sign a distribution manually, simply add 'SIGNATURE' to _MANIFEST_, then type 'cpansign -s' immediately before 'make dist'. Be sure to delete the _SIGNATURE_ file afterwards. Please also see NOTES about _MANIFEST.SKIP_ issues, especially if you are using *Module::Build* or writing your own _MANIFEST.SKIP_. Signatures made with Module::Signature prior to version 0.82 used the SHA1 algorithm by default. SHA1 is now considered broken, and therefore module authors are strongly encouraged to regenerate their _SIGNATURE_ files. Users verifying old SHA1 signature files will receive a warning.
CC0-1.0 AND (GPL-1.0-or-later OR Artistic-1.0)
* Sun Dec 19 2021 Tina Müller <timueller+perl@suse.de> - updated to 0.88 see /usr/share/doc/packages/perl-Module-Signature/Changes [Changes for 0.88 - Sat Dec 18 11:34:44 CST 2021] * Update PAUSE keys to 2022. (@skaji) * Sun Jul 05 2020 Tina Müller <timueller+perl@suse.de> - updated to 0.87 see /usr/share/doc/packages/perl-Module-Signature/Changes [Changes for 0.87 - Sat Jul 4 15:04:41 CST 2020] * Skip 3-verify.t on Crypt::OpenPGP installations. (@pyramation) * Fri Jun 26 2020 Tina Müller <timueller+perl@suse.de> - updated to 0.86 see /usr/share/doc/packages/perl-Module-Signature/Changes [Changes for 0.86 - Thu Jun 25 21:06:24 CST 2020] * Update PAUSE and ANDK keys to 2020. (@dweekly) * Update documentation pertaining to SHA1. (@dweekly) * Fix compatibility with Crypt::OpenPGP. (@niklasholm) * Thu Aug 30 2018 coolo@suse.com - updated to 0.83 see /usr/share/doc/packages/perl-Module-Signature/Changes [Changes for 0.83 - Wed Aug 29 17:33:12 JST 2018] * Update META.yml. * Mon Aug 27 2018 coolo@suse.com - updated to 0.82 see /usr/share/doc/packages/perl-Module-Signature/Changes [Changes for 0.82 - Sun Aug 26 23:00:04 CST 2018] * Fix CRLF handling on Win32. (@niklasholm) * Default to SHA256 on new hashes as SHA1 is deprecated. (@niklasholm) * Tue Oct 03 2017 coolo@suse.com - patch the Makefile to build with perl 5.26 * Tue Sep 06 2016 coolo@suse.com - updated to 0.81 see /usr/share/doc/packages/perl-Module-Signature/Changes * Sun Jun 12 2016 coolo@suse.com - updated to 0.80 see /usr/share/doc/packages/perl-Module-Signature/Changes * Fri Jan 08 2016 chris@computersalat.de - update changelog * add missing CVE tags for 0.78 changes (boo#928382) * Tue May 19 2015 coolo@suse.com - updated to 0.79 see /usr/share/doc/packages/perl-Module-Signature/Changes [Changes for 0.79 - Mon May 18 23:02:11 CST 2015] * Restore "cpansign --skip" functionality. Contributed by: CLOOS * Fri Apr 17 2015 coolo@suse.com - updated to 0.78 see /usr/share/doc/packages/perl-Module-Signature/Changes [Changes for 0.78 - Thu Apr 9 16:58:27 CST 2015] * Fix verify() use from cpanm and CPAN.pm. Contributed by: ANDK [Changes for 0.77 - Wed Apr 8 19:36:50 CST 2015] * Include the latest public keys of PAUSE, ANDK and AUDREYT. * Clarify scripts/cpansign copyright to CC0. Reported by: @pghmcfc [Changes for 0.76 - Wed Apr 8 18:05:48 CST 2015] * Fix signature tests by defaulting to verify(skip=>1) when $ENV{TEST_SIGNATURE} is true. Reported by: @pghmcfc [Changes for 0.75 - Tue Apr 7 04:56:09 CST 2015] Two more issues reported by John Lightsey: * Update ChangeLog. * More protection of @INC from relative paths. (CVE-2015-3409) Fix various issues reported by John Lightsey: [Changes for 0.74 - Tue Apr 7 02:39:14 CST 2015] Fix various issues reported by John Lightsey: * Fix GPG signature parsing logic. (CVE-2015-3406) * MANIFEST.SKIP is no longer consulted unless --skip is given. (CVE-2015-3407) * Properly use open() modes to avoid injection attacks. (CVE-2015-3408)
/usr/bin/cpansign /usr/lib/perl5/vendor_perl/5.26.1/Module /usr/lib/perl5/vendor_perl/5.26.1/Module/Signature.pm /usr/lib/perl5/vendor_perl/5.26.1/x86_64-linux-thread-multi /usr/share/doc/packages/perl-Module-Signature /usr/share/doc/packages/perl-Module-Signature/ANDK2020.pub /usr/share/doc/packages/perl-Module-Signature/AUDREYT2018.pub /usr/share/doc/packages/perl-Module-Signature/AUTHORS /usr/share/doc/packages/perl-Module-Signature/Changes /usr/share/doc/packages/perl-Module-Signature/NIKLASHOLM2018.pub /usr/share/doc/packages/perl-Module-Signature/PAUSE2022.pub /usr/share/doc/packages/perl-Module-Signature/README /usr/share/man/man1/cpansign.1.gz /usr/share/man/man3/Module::Signature.3pm.gz
Generated by rpm2html 1.8.1
Fabrice Bellet, Tue Jul 9 19:58:50 2024