Commit Graph

33 Commits

Author SHA1 Message Date
naddy
8c0294c2fa drop RCS Ids 2022-03-11 19:53:16 +00:00
bluhm
2072eaf210 update p5-Module-Signature to 0.88 2021-12-21 17:46:49 +00:00
bluhm
655ccc98b7 update p5-Module-Signature to 0.87 2020-08-21 14:49:51 +00:00
sthen
95d31a4bd8 bump for search.cpan.org->metacpan.org change 2020-07-03 21:44:29 +00:00
sthen
48b0b9660c replace simple PERMIT_PACKAGE_CDROM=Yes with PERMIT_PACKAGE=Yes 2019-07-12 20:48:23 +00:00
bluhm
0f5044a98b update p5-Module-Signature to 0.83 2018-09-02 16:33:08 +00:00
ajacoutot
6dc8381768 Missing BDEP on security/gnupg. 2018-08-30 10:31:06 +00:00
bluhm
cd7618b7fa update p5-Module-Signature to 0.82 2018-08-28 19:01:10 +00:00
bluhm
658d713966 update p5-Module-Signature to 0.81 2016-09-15 22:03:36 +00:00
bluhm
e5b4939013 update p5-Module-Signature to 0.80 2016-06-08 21:48:45 +00:00
naddy
cfbb239b6a Remove SHARED_ONLY from all CPAN Perl ports and the cpan and perl MODULES.
Add WANTLIB+=perl and PKG_ARCH=* as appropriate.
2016-03-20 19:56:05 +00:00
bluhm
ae55e151f8 update p5-Module-Signature to 0.79 2015-05-19 17:21:15 +00:00
bluhm
3a39385884 update p5-Module-Signature to 0.78 2015-04-15 18:41:22 +00:00
jasper
8e777bdcec - security update to p5-Module-Signature 0.75
http://seclists.org/oss-sec/2015/q2/59

ok bluhm@  (MAINTAINER)
2015-04-15 14:20:24 +00:00
bluhm
3b1a86d5fe Upstream Module::Signature is still fiddling with @INC, so
update p5-Module-Signature to 0.73.
OK sthen@
2013-06-09 21:25:04 +00:00
sthen
15e437a58d SECURITY update to p5-Module-Signature 0.72; CVE-2013-2145, if an attacker
were to include a malicious file in a CPAN package, checking the signature
with cpansign -verify could result in arbitrary code execution. ok bluhm@
2013-06-05 21:36:27 +00:00
espie
eae66e4a7b PERMIT_* / REGRESS->TEST sweep 2013-03-11 11:35:43 +00:00
bluhm
466efe1bd2 update p5-Module-Signature to 0.70 2012-12-29 15:36:59 +00:00
bluhm
1a4f50bc35 update p5-Module-Signature to 0.68 2011-05-28 12:14:25 +00:00
bluhm
de261617ba - update p5-Module-Signature to 0.67
- no use groff
2011-04-21 15:26:38 +00:00
ajacoutot
df4e1203e4 Bump after recent cpan.port.mk change.
ok jasper@
(final commit)
2010-12-03 11:46:46 +00:00
espie
fe13b4748a make use of PKGSPEC to simplify depends, requires most recent security/gnupg
to compile correctly
2010-11-26 07:51:00 +00:00
espie
6c283d7e98 new depends 2010-11-20 17:22:40 +00:00
espie
2ef1026971 USE_GROFF=Yes 2010-10-18 21:41:44 +00:00
bluhm
be993c0d82 update p5-Module-Signature to 0.66 2010-10-02 14:02:10 +00:00
ajacoutot
cabe9a216e Force dependency on gnupg1 since gnupg2 has the same PKGNAME, it can
create some depency mess.
The long term solution is to update+merge gnupg2 into gnupg1 but for now
at least we have a clean dependency chain.

looks ok to jasper@ and pea@
2010-08-25 06:34:50 +00:00
bluhm
0a0eb6afcd update p5-Module-Signature to 0.64 2010-05-18 22:30:46 +00:00
bluhm
45f068b29a update p5-Module-Signature to 0.63 2010-05-07 10:26:40 +00:00
bluhm
e178717e16 update p5-Module-Signature to 0.61 2009-12-28 12:53:17 +00:00
bluhm
507038562a Set GNUPGHOME during port build to avoid additional patch.
Enable regression test that checks the signature with gpg.
ok sturm
2009-08-25 20:23:45 +00:00
bluhm
b09a8b9351 Add missing p5- prefix.
ok sthen
2008-10-03 23:47:24 +00:00
sthen
0879b92af8 Adjust for Digest::SHA move to base perl. Bump packages all round. 2008-10-01 21:54:55 +00:00
bluhm
0dff7e38e8 Module::Signature adds cryptographic authentications to CPAN
distributions, via the special SIGNATURE file.
2008-07-19 12:12:53 +00:00