libdbix-safe-perl 1.2.5-3 source package in Ubuntu

Changelog

libdbix-safe-perl (1.2.5-3) unstable; urgency=medium

  [ Salvatore Bonaccorso ]
  * debian/control: Use HTTPS transport protocol for Vcs-Git URI

  [ Alex Muntada ]
  * Remove inactive pkg-perl members from Uploaders.

  [ Salvatore Bonaccorso ]
  * Update Vcs-* headers for switch to salsa.debian.org

  [ Debian Janitor ]
  * Bump debhelper from deprecated 8 to 12.
  * Set debhelper-compat version in Build-Depends.
  * Set upstream metadata fields: Bug-Database, Repository.

  [ gregor herrmann ]
  * debian/copyright: replace tabs with spaces / remove trailing
    whitespace.
  * debian/watch: use uscan version 4.

 -- Jelmer Vernooij <email address hidden>  Mon, 13 Jun 2022 15:36:37 +0100

Upload details

Uploaded by:
Debian Perl Group
Uploaded to:
Sid
Original maintainer:
Debian Perl Group
Architectures:
all
Section:
perl
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Mantic release universe perl
Lunar release universe perl

Builds

Kinetic: [FULLYBUILT] amd64

Downloads

File Size SHA-256 Checksum
libdbix-safe-perl_1.2.5-3.dsc 2.0 KiB 48ff7b185f927970358e8942dfc01cbf795e7b963b672cf97e0a9fc8c4cebed9
libdbix-safe-perl_1.2.5.orig.tar.gz 16.6 KiB 73279fd98b20034d3735dee67e2b89ac63d55449c3c64dd1a7ba0df10fbe0acf
libdbix-safe-perl_1.2.5-3.debian.tar.xz 3.3 KiB 170278f0f5e9efcea7cc9826926f0fc4451074fef699f1553ec308fa5d60d74b

Available diffs

No changes file available.

Binary packages built by this source

libdbix-safe-perl: safe wrapper to DBI interface

 The purpose of the DBIx::Safe module is to give controlled, limited access to
 an application, rather than simply passing it a raw database handle through
 DBI. DBIx::Safe acts as a wrapper to the database, by only allowing through
 the commands you tell it to. It filters all things related to the database
 handle - methods and attributes.
 .
 The typical usage is for your application to create a database handle via a
 normal DBI call to new(), then pass that to DBIx::Safe->new(), which will
 return you a DBIx::Safe object. After specifying exactly what is and what is
 not allowed, you can pass the object to the untrusted application. The object
 will act very similar to a DBI database handle, and in most cases can be used
 interchangeably.
 .
 By default, nothing is allowed to run at all. There are many things you can
 control. You can specify which SQL commands are allowed, by indicating the
 first word in the SQL statement (e.g. 'SELECT'). You can specify which
 database methods are allowed to run (e.g. 'ping'). You can specify a regular
 expression that allows matching SQL statements to run (e.g. 'qr{SET
 TIMEZONE}'). You can specify a regular expression that is NOT allowed to run
 (e.g. qr(UPDATE xxx}). Finally, you can indicate which database attributes
 are allowed to be read and changed (e.g. 'PrintError'). For all of the above,
 there are matching methods to remove them as well.