initial commit of file from CVS for perl-WWW-CSRF on Fri 14 Jul 16:01:48 BST 2023
This commit is contained in:
parent
967205cb30
commit
48f1828b9b
1
.gitattributes
vendored
Normal file
1
.gitattributes
vendored
Normal file
@ -0,0 +1 @@
|
||||
*.tar.gz filter=lfs diff=lfs merge=lfs -text
|
3
.gitignore
vendored
Normal file
3
.gitignore
vendored
Normal file
@ -0,0 +1,3 @@
|
||||
*.rpm
|
||||
*.log
|
||||
*spec-20*
|
21
Makefile
Normal file
21
Makefile
Normal file
@ -0,0 +1,21 @@
|
||||
# Makefile for source rpm: perl-WWW-CSRF
|
||||
# $Id: Makefile,v 1.1 2019/01/27 05:29:06 jpp Exp $
|
||||
NAME := perl-WWW-CSRF
|
||||
SPECFILE = $(firstword $(wildcard *.spec))
|
||||
|
||||
define find-makefile-common
|
||||
for d in common ../common ../../common ; do if [ -f $$d/Makefile.common ] ; then if [ -f $$d/CVS/Root -a -w $$/Makefile.common ] ; then cd $$d ; cvs -Q update ; fi ; echo "$$d/Makefile.common" ; break ; fi ; done
|
||||
endef
|
||||
|
||||
MAKEFILE_COMMON := $(shell $(find-makefile-common))
|
||||
|
||||
ifeq ($(MAKEFILE_COMMON),)
|
||||
# attept a checkout
|
||||
define checkout-makefile-common
|
||||
test -f CVS/Root && { cvs -Q -d $$(cat CVS/Root) checkout common && echo "common/Makefile.common" ; } || { echo "ERROR: I can't figure out how to checkout the 'common' module." ; exit -1 ; } >&2
|
||||
endef
|
||||
|
||||
MAKEFILE_COMMON := $(shell $(checkout-makefile-common))
|
||||
endif
|
||||
|
||||
include $(MAKEFILE_COMMON)
|
10
README.md
10
README.md
@ -1,3 +1,11 @@
|
||||
# perl-WWW-CSRF
|
||||
|
||||
3rd Party (Maintained by Koozali) git repo for perl-WWW-CSRF smeserver
|
||||
3rd Party (Maintained by Koozali) git repo for perl-WWW-CSRF smeserver
|
||||
|
||||
## Description
|
||||
|
||||
<br />*This description has been generated by an LLM AI system and cannot be relied on to be fully correct.*
|
||||
*Once it has been checked, then this comment will be deleted*
|
||||
<br />
|
||||
|
||||
Perl-WWW-CSRF (Cross-Site Request Forgery) is a collection of Perl modules which aim to make it easier to prevent a type of attack known as Cross-Site Request Forgery. CSRF attacks are conducted by an attacker who tricks a user into clicking a link or pressing a button on a website which causes the user's browser to perform some action on the site on the attacker's behalf. This module provides a set of functions and classes which enables web applications to protect themselves from this type of attack.
|
||||
|
BIN
WWW-CSRF-1.00.tar.gz
(Stored with Git LFS)
Normal file
BIN
WWW-CSRF-1.00.tar.gz
(Stored with Git LFS)
Normal file
Binary file not shown.
1
contriborbase
Normal file
1
contriborbase
Normal file
@ -0,0 +1 @@
|
||||
sme10
|
64
perl-WWW-CSRF.spec
Normal file
64
perl-WWW-CSRF.spec
Normal file
@ -0,0 +1,64 @@
|
||||
Name: perl-WWW-CSRF
|
||||
Version: 1.00
|
||||
Release: 1%{?dist}
|
||||
Summary: Generate and check tokens to protect against CSRF attacks
|
||||
License: CHECK(Distributable)
|
||||
Group: Development/Libraries
|
||||
URL: http://search.cpan.org/dist/WWW-CSRF/
|
||||
Source0: http://www.cpan.org/authors/id/S/SE/SESSE/WWW-CSRF-%{version}.tar.gz
|
||||
BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(%{__id_u} -n)
|
||||
BuildArch: noarch
|
||||
BuildRequires: perl(Bytes::Random::Secure)
|
||||
BuildRequires: perl(Digest::HMAC_SHA1)
|
||||
BuildRequires: perl(ExtUtils::MakeMaker)
|
||||
BuildRequires: perl(ExtUtils::ParseXS)
|
||||
BuildRequires: perl(ExtUtils::Manifest)
|
||||
BuildRequires: perl(Test::More)
|
||||
Requires: perl(Bytes::Random::Secure)
|
||||
Requires: perl(Digest::HMAC_SHA1)
|
||||
Requires: perl(:MODULE_COMPAT_%(eval "`%{__perl} -V:version`"; echo $version))
|
||||
|
||||
%description
|
||||
This module generates tokens to help protect against a website attack known
|
||||
as Cross-Site Request Forgery (CSRF, also known as XSRF). CSRF is an attack
|
||||
where an attacker fools a browser into make a request to a web server for
|
||||
which that browser will automatically include some form of credentials
|
||||
(cookies, cached HTTP Basic authentication, etc.), thus abusing the web
|
||||
server's trust in the user for malicious use.
|
||||
|
||||
%prep
|
||||
%setup -q -n WWW-CSRF-%{version}
|
||||
|
||||
%build
|
||||
%{__perl} Makefile.PL INSTALLDIRS=vendor
|
||||
make %{?_smp_mflags}
|
||||
|
||||
%install
|
||||
rm -rf $RPM_BUILD_ROOT
|
||||
|
||||
make pure_install PERL_INSTALL_ROOT=$RPM_BUILD_ROOT
|
||||
|
||||
find $RPM_BUILD_ROOT -type f -name .packlist -exec rm -f {} \;
|
||||
find $RPM_BUILD_ROOT -depth -type d -exec rmdir {} 2>/dev/null \;
|
||||
|
||||
%{_fixperms} $RPM_BUILD_ROOT/*
|
||||
|
||||
%check
|
||||
make test
|
||||
|
||||
%clean
|
||||
rm -rf $RPM_BUILD_ROOT
|
||||
|
||||
%files
|
||||
%defattr(-,root,root,-)
|
||||
%doc Changes META.json
|
||||
%{perl_vendorlib}/*
|
||||
%{_mandir}/man3/*
|
||||
|
||||
%changelog
|
||||
* Fri Jul 14 2023 BogusDateBot
|
||||
- Eliminated rpmbuild "bogus date" warnings due to inconsistent weekday,
|
||||
by assuming the date is correct and changing the weekday.
|
||||
|
||||
* Mon Oct 08 2018 Daniel Berteaud <daniel@firewall-services.com> - 1.00-1
|
||||
- First build using cpanspec
|
Loading…
Reference in New Issue
Block a user