Age | Commit message (Collapse) | Author | Files | Lines |
|
|
|
- Add following line
PERL5_MODULE_TYPE= Module::Build
(Upstream)
- Update to 0.07
--------------
0.07 2015-01-14T07:27:52Z
- Use %04x not %04d (Thanks anall and teancom)
- cleanup docs add a reference to a site about preventing XSS (Thanks teancom)
- migrate with minil
|
|
Problems found locating distfiles:
Package haskell-cgi: missing distfile haskell-cgi-20001206.tar.gz
Package nginx: missing distfile array-var-nginx-module-0.04.tar.gz
Package nginx: missing distfile encrypted-session-nginx-module-0.04.tar.gz
Package nginx: missing distfile headers-more-nginx-module-0.261.tar.gz
Package nginx: missing distfile nginx_http_push_module-0.692.tar.gz
Package nginx: missing distfile set-misc-nginx-module-0.29.tar.gz
Package nginx-devel: missing distfile echo-nginx-module-0.58.tar.gz
Package nginx-devel: missing distfile form-input-nginx-module-0.11.tar.gz
Package nginx-devel: missing distfile lua-nginx-module-0.9.16.tar.gz
Package nginx-devel: missing distfile nginx_http_push_module-0.692.tar.gz
Package nginx-devel: missing distfile set-misc-nginx-module-0.29.tar.gz
Package php-owncloud: missing distfile owncloud-8.2.0.tar.bz2
Otherwise, existing SHA1 digests verified and found to be the same on
the machine holding the existing distfiles (morden). All existing
SHA1 digests retained for now as an audit trail.
|
|
having a PKGNAME of p5-*, or depending such a package,
for perl-5.22.0.
|
|
Do it for all packages that
* mention perl, or
* have a directory name starting with p5-*, or
* depend on a package starting with p5-
like last time, for 5.18, where this didn't lead to complaints.
Let me know if you have any this time.
|
|
a) refer 'perl' in their Makefile, or
b) have a directory name of p5-*, or
c) have any dependency on any p5-* package
Like last time, where this caused no complaints.
|
|
|
|
are called p5-*.
I hope that's all of them.
|
|
which is required to update www/p5-Plack-Middleware-ConsoleLogger.
There are a lot of XSS, a security hole typically found in web
applications, caused by incorrect (or lack of) JavaScript
escaping. This module is aimed to provide a secure JavaScript escaping
to avoid XSS with JavaScript values.
|