initial commit of file from CVS for perl-WWW-CSRF on Fri 14 Jul 16:01:48 BST 2023
This commit is contained in:
parent
967205cb30
commit
58943e55ed
1
.gitattributes
vendored
Normal file
1
.gitattributes
vendored
Normal file
@ -0,0 +1 @@
|
|||||||
|
*.tar.gz filter=lfs diff=lfs merge=lfs -text
|
3
.gitignore
vendored
Normal file
3
.gitignore
vendored
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
*.rpm
|
||||||
|
*.log
|
||||||
|
*spec-20*
|
21
Makefile
Normal file
21
Makefile
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
# Makefile for source rpm: perl-WWW-CSRF
|
||||||
|
# $Id: Makefile,v 1.1 2019/01/27 05:29:06 jpp Exp $
|
||||||
|
NAME := perl-WWW-CSRF
|
||||||
|
SPECFILE = $(firstword $(wildcard *.spec))
|
||||||
|
|
||||||
|
define find-makefile-common
|
||||||
|
for d in common ../common ../../common ; do if [ -f $$d/Makefile.common ] ; then if [ -f $$d/CVS/Root -a -w $$/Makefile.common ] ; then cd $$d ; cvs -Q update ; fi ; echo "$$d/Makefile.common" ; break ; fi ; done
|
||||||
|
endef
|
||||||
|
|
||||||
|
MAKEFILE_COMMON := $(shell $(find-makefile-common))
|
||||||
|
|
||||||
|
ifeq ($(MAKEFILE_COMMON),)
|
||||||
|
# attept a checkout
|
||||||
|
define checkout-makefile-common
|
||||||
|
test -f CVS/Root && { cvs -Q -d $$(cat CVS/Root) checkout common && echo "common/Makefile.common" ; } || { echo "ERROR: I can't figure out how to checkout the 'common' module." ; exit -1 ; } >&2
|
||||||
|
endef
|
||||||
|
|
||||||
|
MAKEFILE_COMMON := $(shell $(checkout-makefile-common))
|
||||||
|
endif
|
||||||
|
|
||||||
|
include $(MAKEFILE_COMMON)
|
@ -1,3 +1,11 @@
|
|||||||
# perl-WWW-CSRF
|
# perl-WWW-CSRF
|
||||||
|
|
||||||
3rd Party (Maintained by Koozali) git repo for perl-WWW-CSRF smeserver
|
3rd Party (Maintained by Koozali) git repo for perl-WWW-CSRF smeserver
|
||||||
|
|
||||||
|
## Description
|
||||||
|
|
||||||
|
<br />*This description has been generated by an LLM AI system and cannot be relied on to be fully correct.*
|
||||||
|
*Once it has been checked, then this comment will be deleted*
|
||||||
|
<br />
|
||||||
|
|
||||||
|
Perl-WWW-CSRF (Cross-Site Request Forgery) is a collection of Perl modules which aim to make it easier to prevent a type of attack known as Cross-Site Request Forgery. CSRF attacks are conducted by an attacker who tricks a user into clicking a link or pressing a button on a website which causes the user's browser to perform some action on the site on the attacker's behalf. This module provides a set of functions and classes which enables web applications to protect themselves from this type of attack.
|
||||||
|
BIN
WWW-CSRF-1.00.tar.gz
(Stored with Git LFS)
Normal file
BIN
WWW-CSRF-1.00.tar.gz
(Stored with Git LFS)
Normal file
Binary file not shown.
1
contriborbase
Normal file
1
contriborbase
Normal file
@ -0,0 +1 @@
|
|||||||
|
sme10
|
64
perl-WWW-CSRF.spec
Normal file
64
perl-WWW-CSRF.spec
Normal file
@ -0,0 +1,64 @@
|
|||||||
|
Name: perl-WWW-CSRF
|
||||||
|
Version: 1.00
|
||||||
|
Release: 1%{?dist}
|
||||||
|
Summary: Generate and check tokens to protect against CSRF attacks
|
||||||
|
License: CHECK(Distributable)
|
||||||
|
Group: Development/Libraries
|
||||||
|
URL: http://search.cpan.org/dist/WWW-CSRF/
|
||||||
|
Source0: http://www.cpan.org/authors/id/S/SE/SESSE/WWW-CSRF-%{version}.tar.gz
|
||||||
|
BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(%{__id_u} -n)
|
||||||
|
BuildArch: noarch
|
||||||
|
BuildRequires: perl(Bytes::Random::Secure)
|
||||||
|
BuildRequires: perl(Digest::HMAC_SHA1)
|
||||||
|
BuildRequires: perl(ExtUtils::MakeMaker)
|
||||||
|
BuildRequires: perl(ExtUtils::ParseXS)
|
||||||
|
BuildRequires: perl(ExtUtils::Manifest)
|
||||||
|
BuildRequires: perl(Test::More)
|
||||||
|
Requires: perl(Bytes::Random::Secure)
|
||||||
|
Requires: perl(Digest::HMAC_SHA1)
|
||||||
|
Requires: perl(:MODULE_COMPAT_%(eval "`%{__perl} -V:version`"; echo $version))
|
||||||
|
|
||||||
|
%description
|
||||||
|
This module generates tokens to help protect against a website attack known
|
||||||
|
as Cross-Site Request Forgery (CSRF, also known as XSRF). CSRF is an attack
|
||||||
|
where an attacker fools a browser into make a request to a web server for
|
||||||
|
which that browser will automatically include some form of credentials
|
||||||
|
(cookies, cached HTTP Basic authentication, etc.), thus abusing the web
|
||||||
|
server's trust in the user for malicious use.
|
||||||
|
|
||||||
|
%prep
|
||||||
|
%setup -q -n WWW-CSRF-%{version}
|
||||||
|
|
||||||
|
%build
|
||||||
|
%{__perl} Makefile.PL INSTALLDIRS=vendor
|
||||||
|
make %{?_smp_mflags}
|
||||||
|
|
||||||
|
%install
|
||||||
|
rm -rf $RPM_BUILD_ROOT
|
||||||
|
|
||||||
|
make pure_install PERL_INSTALL_ROOT=$RPM_BUILD_ROOT
|
||||||
|
|
||||||
|
find $RPM_BUILD_ROOT -type f -name .packlist -exec rm -f {} \;
|
||||||
|
find $RPM_BUILD_ROOT -depth -type d -exec rmdir {} 2>/dev/null \;
|
||||||
|
|
||||||
|
%{_fixperms} $RPM_BUILD_ROOT/*
|
||||||
|
|
||||||
|
%check
|
||||||
|
make test
|
||||||
|
|
||||||
|
%clean
|
||||||
|
rm -rf $RPM_BUILD_ROOT
|
||||||
|
|
||||||
|
%files
|
||||||
|
%defattr(-,root,root,-)
|
||||||
|
%doc Changes META.json
|
||||||
|
%{perl_vendorlib}/*
|
||||||
|
%{_mandir}/man3/*
|
||||||
|
|
||||||
|
%changelog
|
||||||
|
* Fri Jul 14 2023 BogusDateBot
|
||||||
|
- Eliminated rpmbuild "bogus date" warnings due to inconsistent weekday,
|
||||||
|
by assuming the date is correct and changing the weekday.
|
||||||
|
|
||||||
|
* Mon Oct 08 2018 Daniel Berteaud <daniel@firewall-services.com> - 1.00-1
|
||||||
|
- First build using cpanspec
|
Loading…
x
Reference in New Issue
Block a user