initial commit of file from CVS for perl-WWW-CSRF on Fri 14 Jul 16:01:48 BST 2023

This commit is contained in:
Brian Read 2023-07-14 16:01:48 +01:00
parent 967205cb30
commit 48f1828b9b
7 changed files with 102 additions and 1 deletions

1
.gitattributes vendored Normal file
View File

@ -0,0 +1 @@
*.tar.gz filter=lfs diff=lfs merge=lfs -text

3
.gitignore vendored Normal file
View File

@ -0,0 +1,3 @@
*.rpm
*.log
*spec-20*

21
Makefile Normal file
View File

@ -0,0 +1,21 @@
# Makefile for source rpm: perl-WWW-CSRF
# $Id: Makefile,v 1.1 2019/01/27 05:29:06 jpp Exp $
NAME := perl-WWW-CSRF
SPECFILE = $(firstword $(wildcard *.spec))
define find-makefile-common
for d in common ../common ../../common ; do if [ -f $$d/Makefile.common ] ; then if [ -f $$d/CVS/Root -a -w $$/Makefile.common ] ; then cd $$d ; cvs -Q update ; fi ; echo "$$d/Makefile.common" ; break ; fi ; done
endef
MAKEFILE_COMMON := $(shell $(find-makefile-common))
ifeq ($(MAKEFILE_COMMON),)
# attept a checkout
define checkout-makefile-common
test -f CVS/Root && { cvs -Q -d $$(cat CVS/Root) checkout common && echo "common/Makefile.common" ; } || { echo "ERROR: I can't figure out how to checkout the 'common' module." ; exit -1 ; } >&2
endef
MAKEFILE_COMMON := $(shell $(checkout-makefile-common))
endif
include $(MAKEFILE_COMMON)

View File

@ -1,3 +1,11 @@
# perl-WWW-CSRF
3rd Party (Maintained by Koozali) git repo for perl-WWW-CSRF smeserver
3rd Party (Maintained by Koozali) git repo for perl-WWW-CSRF smeserver
## Description
<br />*This description has been generated by an LLM AI system and cannot be relied on to be fully correct.*
*Once it has been checked, then this comment will be deleted*
<br />
Perl-WWW-CSRF (Cross-Site Request Forgery) is a collection of Perl modules which aim to make it easier to prevent a type of attack known as Cross-Site Request Forgery. CSRF attacks are conducted by an attacker who tricks a user into clicking a link or pressing a button on a website which causes the user's browser to perform some action on the site on the attacker's behalf. This module provides a set of functions and classes which enables web applications to protect themselves from this type of attack.

BIN
WWW-CSRF-1.00.tar.gz (Stored with Git LFS) Normal file

Binary file not shown.

1
contriborbase Normal file
View File

@ -0,0 +1 @@
sme10

64
perl-WWW-CSRF.spec Normal file
View File

@ -0,0 +1,64 @@
Name: perl-WWW-CSRF
Version: 1.00
Release: 1%{?dist}
Summary: Generate and check tokens to protect against CSRF attacks
License: CHECK(Distributable)
Group: Development/Libraries
URL: http://search.cpan.org/dist/WWW-CSRF/
Source0: http://www.cpan.org/authors/id/S/SE/SESSE/WWW-CSRF-%{version}.tar.gz
BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(%{__id_u} -n)
BuildArch: noarch
BuildRequires: perl(Bytes::Random::Secure)
BuildRequires: perl(Digest::HMAC_SHA1)
BuildRequires: perl(ExtUtils::MakeMaker)
BuildRequires: perl(ExtUtils::ParseXS)
BuildRequires: perl(ExtUtils::Manifest)
BuildRequires: perl(Test::More)
Requires: perl(Bytes::Random::Secure)
Requires: perl(Digest::HMAC_SHA1)
Requires: perl(:MODULE_COMPAT_%(eval "`%{__perl} -V:version`"; echo $version))
%description
This module generates tokens to help protect against a website attack known
as Cross-Site Request Forgery (CSRF, also known as XSRF). CSRF is an attack
where an attacker fools a browser into make a request to a web server for
which that browser will automatically include some form of credentials
(cookies, cached HTTP Basic authentication, etc.), thus abusing the web
server's trust in the user for malicious use.
%prep
%setup -q -n WWW-CSRF-%{version}
%build
%{__perl} Makefile.PL INSTALLDIRS=vendor
make %{?_smp_mflags}
%install
rm -rf $RPM_BUILD_ROOT
make pure_install PERL_INSTALL_ROOT=$RPM_BUILD_ROOT
find $RPM_BUILD_ROOT -type f -name .packlist -exec rm -f {} \;
find $RPM_BUILD_ROOT -depth -type d -exec rmdir {} 2>/dev/null \;
%{_fixperms} $RPM_BUILD_ROOT/*
%check
make test
%clean
rm -rf $RPM_BUILD_ROOT
%files
%defattr(-,root,root,-)
%doc Changes META.json
%{perl_vendorlib}/*
%{_mandir}/man3/*
%changelog
* Fri Jul 14 2023 BogusDateBot
- Eliminated rpmbuild "bogus date" warnings due to inconsistent weekday,
by assuming the date is correct and changing the weekday.
* Mon Oct 08 2018 Daniel Berteaud <daniel@firewall-services.com> - 1.00-1
- First build using cpanspec