initial commit of file from CVS for perl-Mojolicious-Plugin-CSRFDefender on Fri 14 Jul 14:01:52 BST 2023
This commit is contained in:
parent
911fb30535
commit
cf7cb48740
1
.gitattributes
vendored
Normal file
1
.gitattributes
vendored
Normal file
@ -0,0 +1 @@
|
|||||||
|
*.tar.gz filter=lfs diff=lfs merge=lfs -text
|
3
.gitignore
vendored
Normal file
3
.gitignore
vendored
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
*.rpm
|
||||||
|
*.log
|
||||||
|
*spec-20*
|
21
Makefile
Normal file
21
Makefile
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
# Makefile for source rpm: perl-Mojolicious-Plugin-CSRFDefender
|
||||||
|
# $Id: Makefile,v 1.1 2021/05/28 19:40:54 michel Exp $
|
||||||
|
NAME := perl-Mojolicious-Plugin-CSRFDefender
|
||||||
|
SPECFILE = $(firstword $(wildcard *.spec))
|
||||||
|
|
||||||
|
define find-makefile-common
|
||||||
|
for d in common ../common ../../common ; do if [ -f $$d/Makefile.common ] ; then if [ -f $$d/CVS/Root -a -w $$/Makefile.common ] ; then cd $$d ; cvs -Q update ; fi ; echo "$$d/Makefile.common" ; break ; fi ; done
|
||||||
|
endef
|
||||||
|
|
||||||
|
MAKEFILE_COMMON := $(shell $(find-makefile-common))
|
||||||
|
|
||||||
|
ifeq ($(MAKEFILE_COMMON),)
|
||||||
|
# attept a checkout
|
||||||
|
define checkout-makefile-common
|
||||||
|
test -f CVS/Root && { cvs -Q -d $$(cat CVS/Root) checkout common && echo "common/Makefile.common" ; } || { echo "ERROR: I can't figure out how to checkout the 'common' module." ; exit -1 ; } >&2
|
||||||
|
endef
|
||||||
|
|
||||||
|
MAKEFILE_COMMON := $(shell $(checkout-makefile-common))
|
||||||
|
endif
|
||||||
|
|
||||||
|
include $(MAKEFILE_COMMON)
|
BIN
Mojolicious-Plugin-CSRFDefender-0.0.8.tar.gz
(Stored with Git LFS)
Normal file
BIN
Mojolicious-Plugin-CSRFDefender-0.0.8.tar.gz
(Stored with Git LFS)
Normal file
Binary file not shown.
10
README.md
10
README.md
@ -1,3 +1,11 @@
|
|||||||
# perl-Mojolicious-Plugin-CSRFDefender
|
# perl-Mojolicious-Plugin-CSRFDefender
|
||||||
|
|
||||||
3rd Party (Maintained by Koozali) git repo for perl-Mojolicious-Plugin-CSRFDefender smeserver
|
3rd Party (Maintained by Koozali) git repo for perl-Mojolicious-Plugin-CSRFDefender smeserver
|
||||||
|
|
||||||
|
## Description
|
||||||
|
|
||||||
|
<br />*This description has been generated by an LLM AI system and cannot be relied on to be fully correct.*
|
||||||
|
*Once it has been checked, then this comment will be deleted*
|
||||||
|
<br />
|
||||||
|
|
||||||
|
Perl-Mojolicious-Plugin-CSRFDefender is a Perl plugin that provides CSRF (Cross-Site Request Forgery) protection for Mojolicious web applications. It adds a random, unique token to every form and then verifies the token's authenticity when the form is submitted. This helps protect against malicious users submitting unwanted requests on behalf of the user.
|
||||||
|
1
contriborbase
Normal file
1
contriborbase
Normal file
@ -0,0 +1 @@
|
|||||||
|
sme10
|
68
perl-Mojolicious-Plugin-CSRFDefender.spec
Normal file
68
perl-Mojolicious-Plugin-CSRFDefender.spec
Normal file
@ -0,0 +1,68 @@
|
|||||||
|
Name: perl-Mojolicious-Plugin-CSRFDefender
|
||||||
|
Version: 0.0.8
|
||||||
|
Release: 1%{?dist}
|
||||||
|
Summary: Defend CSRF automatically in Mojolicious Application
|
||||||
|
License: GPL+ or Artistic
|
||||||
|
Group: Development/Libraries
|
||||||
|
URL: http://search.cpan.org/dist/Mojolicious-Plugin-CSRFDefender/
|
||||||
|
Source0: Mojolicious-Plugin-CSRFDefender-%{version}.tar.gz
|
||||||
|
#Source0: http://www.cpan.org/authors/id/S/SH/SHIBAZAKI/Mojolicious-Plugin-CSRFDefender-%{version}.tar.gz
|
||||||
|
BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(%{__id_u} -n)
|
||||||
|
BuildArch: noarch
|
||||||
|
BuildRequires: perl(Class::Accessor::Fast)
|
||||||
|
BuildRequires: perl(ExtUtils::MakeMaker)
|
||||||
|
BuildRequires: perl(ExtUtils::ParseXS)
|
||||||
|
BuildRequires: perl(ExtUtils::Manifest)
|
||||||
|
BuildRequires: perl(Mojolicious) >= 1.43
|
||||||
|
BuildRequires: perl(Mojolicious::Lite)
|
||||||
|
BuildRequires: perl(Path::Class)
|
||||||
|
BuildRequires: perl(String::Random)
|
||||||
|
BuildRequires: perl(Test::Class)
|
||||||
|
BuildRequires: perl(Test::Mojo)
|
||||||
|
BuildRequires: perl(Test::More)
|
||||||
|
Requires: perl(Class::Accessor::Fast)
|
||||||
|
Requires: perl(Mojolicious) >= 1.43
|
||||||
|
Requires: perl(Path::Class)
|
||||||
|
Requires: perl(String::Random)
|
||||||
|
Requires: perl(:MODULE_COMPAT_%(eval "`%{__perl} -V:version`"; echo $version))
|
||||||
|
|
||||||
|
%description
|
||||||
|
This plugin defends CSRF automatically in Mojolicious Application.
|
||||||
|
Following is the strategy.
|
||||||
|
|
||||||
|
%prep
|
||||||
|
%setup -q -n Mojolicious-Plugin-CSRFDefender-%{version}
|
||||||
|
|
||||||
|
%build
|
||||||
|
%{__perl} Makefile.PL INSTALLDIRS=vendor
|
||||||
|
make %{?_smp_mflags}
|
||||||
|
|
||||||
|
%install
|
||||||
|
rm -rf $RPM_BUILD_ROOT
|
||||||
|
|
||||||
|
make pure_install PERL_INSTALL_ROOT=$RPM_BUILD_ROOT
|
||||||
|
|
||||||
|
find $RPM_BUILD_ROOT -type f -name .packlist -exec rm -f {} \;
|
||||||
|
find $RPM_BUILD_ROOT -depth -type d -exec rmdir {} 2>/dev/null \;
|
||||||
|
|
||||||
|
%{_fixperms} $RPM_BUILD_ROOT/*
|
||||||
|
|
||||||
|
%check
|
||||||
|
make test
|
||||||
|
|
||||||
|
%clean
|
||||||
|
rm -rf $RPM_BUILD_ROOT
|
||||||
|
|
||||||
|
%files
|
||||||
|
%defattr(-,root,root,-)
|
||||||
|
%doc Changes README
|
||||||
|
%{perl_vendorlib}/*
|
||||||
|
%{_mandir}/man3/*
|
||||||
|
|
||||||
|
%changelog
|
||||||
|
* Fri Jul 14 2023 BogusDateBot
|
||||||
|
- Eliminated rpmbuild "bogus date" warnings due to inconsistent weekday,
|
||||||
|
by assuming the date is correct and changing the weekday.
|
||||||
|
|
||||||
|
* Sun Mar 07 2021 Michel Begue <mab974@gmail.com> 0.0.8-1
|
||||||
|
- Specfile autogenerated by cpanspec 1.78.
|
Loading…
Reference in New Issue
Block a user