diff -Nru libhttp-daemon-ssl-perl-1.05-01/debian/changelog libhttp-daemon-ssl-perl-1.05-01/debian/changelog --- libhttp-daemon-ssl-perl-1.05-01/debian/changelog 2022-12-28 20:22:12.000000000 +0000 +++ libhttp-daemon-ssl-perl-1.05-01/debian/changelog 2023-02-14 20:43:21.000000000 +0000 @@ -1,3 +1,12 @@ +libhttp-daemon-ssl-perl (1.05-01-5) unstable; urgency=medium + + * Team upload. + * Add patch to make test compatible with IO::Socket::SSL >= 2.079. + Thanks to Adrian Bunk for the bug report. (Closes: #1031305) + * Lowercase short description. + + -- gregor herrmann Tue, 14 Feb 2023 21:43:21 +0100 + libhttp-daemon-ssl-perl (1.05-01-4) unstable; urgency=medium * Team upload. diff -Nru libhttp-daemon-ssl-perl-1.05-01/debian/control libhttp-daemon-ssl-perl-1.05-01/debian/control --- libhttp-daemon-ssl-perl-1.05-01/debian/control 2022-12-28 20:22:12.000000000 +0000 +++ libhttp-daemon-ssl-perl-1.05-01/debian/control 2023-02-14 20:43:21.000000000 +0000 @@ -22,7 +22,7 @@ libhttp-daemon-perl, libio-socket-ssl-perl Suggests: libhttp-message-perl -Description: Simple HTTP server class with SSL support +Description: simple HTTP server class with SSL support HTTP::Daemon::SSL is a descendant of HTTP::Daemon that uses SSL sockets (via IO::Socket::SSL) instead of cleartext sockets. It also handles SSL-specific problems, such as dealing with HTTP clients that attempt diff -Nru libhttp-daemon-ssl-perl-1.05-01/debian/docs libhttp-daemon-ssl-perl-1.05-01/debian/docs --- libhttp-daemon-ssl-perl-1.05-01/debian/docs 2022-12-28 20:22:12.000000000 +0000 +++ libhttp-daemon-ssl-perl-1.05-01/debian/docs 1970-01-01 00:00:00.000000000 +0000 @@ -1,2 +0,0 @@ -BUGS -README diff -Nru libhttp-daemon-ssl-perl-1.05-01/debian/libhttp-daemon-ssl-perl.docs libhttp-daemon-ssl-perl-1.05-01/debian/libhttp-daemon-ssl-perl.docs --- libhttp-daemon-ssl-perl-1.05-01/debian/libhttp-daemon-ssl-perl.docs 1970-01-01 00:00:00.000000000 +0000 +++ libhttp-daemon-ssl-perl-1.05-01/debian/libhttp-daemon-ssl-perl.docs 2023-02-14 20:43:21.000000000 +0000 @@ -0,0 +1,2 @@ +BUGS +README diff -Nru libhttp-daemon-ssl-perl-1.05-01/debian/patches/IO-Socket-SSL_2.078.patch libhttp-daemon-ssl-perl-1.05-01/debian/patches/IO-Socket-SSL_2.078.patch --- libhttp-daemon-ssl-perl-1.05-01/debian/patches/IO-Socket-SSL_2.078.patch 1970-01-01 00:00:00.000000000 +0000 +++ libhttp-daemon-ssl-perl-1.05-01/debian/patches/IO-Socket-SSL_2.078.patch 2023-02-14 20:43:21.000000000 +0000 @@ -0,0 +1,27 @@ +Description: fix t/testmodule.t with IO-Socket-SSL + IO-Socket-SSL has in 2.078 reverted the decision from 2014 to not verify + hostname by default if hostname is IP address but no explicit verification + scheme given + https://github.com/noxxi/p5-io-socket-ssl/commit/c0a063b70f0a3ad033da0a51923c65bd2ff118a0 + https://github.com/noxxi/p5-io-socket-ssl/issues/121 + . + This makes t/testmodule.t fail. Add subjectAltNames with IP: 127.0.0.1 as a + workaround, as in + https://github.com/nginx/nginx-tests/commit/aedae20271d68a9341aff9f925499c367064fcd9 + or IO-Socket-SSL's test suite in the above commit. +Origin: vendor +Bug-Debian: https://bugs.debian.org/1026760 +Forwarded: https://rt.cpan.org/Ticket/Display.html?id=88998 +Author: gregor herrmann +Last-Update: 2022-12-28 + +--- a/t/testmodule.t ++++ b/t/testmodule.t +@@ -32,6 +32,7 @@ + + my ($server_cert, $server_key) = CERT_create( + subject => { commonName => 'IO::Socket::SSL Dummy Server Certificate' }, ++ subjectAltNames => [ [ IP => '127.0.0.1' ] ], + CA => 0, + issuer_cert => $ca_cert, + issuer_key => $ca_key, diff -Nru libhttp-daemon-ssl-perl-1.05-01/debian/patches/IO-Socket-SSL_2.079.patch libhttp-daemon-ssl-perl-1.05-01/debian/patches/IO-Socket-SSL_2.079.patch --- libhttp-daemon-ssl-perl-1.05-01/debian/patches/IO-Socket-SSL_2.079.patch 1970-01-01 00:00:00.000000000 +0000 +++ libhttp-daemon-ssl-perl-1.05-01/debian/patches/IO-Socket-SSL_2.079.patch 2023-02-14 20:43:21.000000000 +0000 @@ -0,0 +1,29 @@ +Description: Fix test with IO::Socket::SSL >= 2.079 + t/testmodule.t writes to STDERR + ok #bad request handled 9 + Use of uninitialized value $2 in concatenation (.) or string at /usr/share/perl5/IO/Socket/SSL.pm line 792. + ok #client good connection test 8 + after the change in IO::Socket::SSL 2.079: + - https://github.com/noxxi/p5-io-socket-ssl/issues/123 + - https://github.com/noxxi/p5-io-socket-ssl/commit/2681d9d9b0a5ba25abd7e32251daa3d1fc2b466a + . + Add SSL_verifycn_name to the test client. +Origin: vendor +Bug-Debian: https://bugs.debian.org/1031305 +Author: gregor herrmann +Last-Update: 2023-02-14 +Forwarded: https://rt.cpan.org/Ticket/Display.html?id=146478 +Bug: https://rt.cpan.org/Ticket/Display.html?id=146478 + +--- a/t/testmodule.t ++++ b/t/testmodule.t +@@ -93,7 +93,8 @@ + $client = new IO::Socket::SSL(PeerAddr => $SSL_SERVER_ADDR, + PeerPort => $SSL_SERVER_PORT, + SSL_verify_mode => 0x01, +- SSL_ca_file => "certs/test-ca.pem"); ++ SSL_ca_file => "certs/test-ca.pem", ++ SSL_verifycn_name => "127.0.0.1"); + + $client || (print("not ok #client failure\n") && exit); + &ok("client good connection test"); diff -Nru libhttp-daemon-ssl-perl-1.05-01/debian/patches/IO-Socket-SSL.patch libhttp-daemon-ssl-perl-1.05-01/debian/patches/IO-Socket-SSL.patch --- libhttp-daemon-ssl-perl-1.05-01/debian/patches/IO-Socket-SSL.patch 2022-12-28 20:22:12.000000000 +0000 +++ libhttp-daemon-ssl-perl-1.05-01/debian/patches/IO-Socket-SSL.patch 1970-01-01 00:00:00.000000000 +0000 @@ -1,27 +0,0 @@ -Description: fix t/testmodule.t with IO-Socket-SSL - IO-Socket-SSL has in 2.078 reverted the decision from 2014 to not verify - hostname by default if hostname is IP address but no explicit verification - scheme given - https://github.com/noxxi/p5-io-socket-ssl/commit/c0a063b70f0a3ad033da0a51923c65bd2ff118a0 - https://github.com/noxxi/p5-io-socket-ssl/issues/121 - . - This makes t/testmodule.t fail. Add subjectAltNames with IP: 127.0.0.1 as a - workaround, as in - https://github.com/nginx/nginx-tests/commit/aedae20271d68a9341aff9f925499c367064fcd9 - or IO-Socket-SSL's test suite in the above commit. -Origin: vendor -Bug-Debian: https://bugs.debian.org/1026760 -Forwarded: https://rt.cpan.org/Ticket/Display.html?id=88998 -Author: gregor herrmann -Last-Update: 2022-12-28 - ---- a/t/testmodule.t -+++ b/t/testmodule.t -@@ -32,6 +32,7 @@ - - my ($server_cert, $server_key) = CERT_create( - subject => { commonName => 'IO::Socket::SSL Dummy Server Certificate' }, -+ subjectAltNames => [ [ IP => '127.0.0.1' ] ], - CA => 0, - issuer_cert => $ca_cert, - issuer_key => $ca_key, diff -Nru libhttp-daemon-ssl-perl-1.05-01/debian/patches/series libhttp-daemon-ssl-perl-1.05-01/debian/patches/series --- libhttp-daemon-ssl-perl-1.05-01/debian/patches/series 2022-12-28 20:22:12.000000000 +0000 +++ libhttp-daemon-ssl-perl-1.05-01/debian/patches/series 2023-02-14 20:43:21.000000000 +0000 @@ -1,3 +1,4 @@ testmodule.diff testpost.diff -IO-Socket-SSL.patch +IO-Socket-SSL_2.078.patch +IO-Socket-SSL_2.079.patch