Debian Patches

Status for libpoe-component-sslify-perl/1.012-2

Patch Description Author Forwarded Bugs Origin Last update
spelling.patch fix a spelling mistake gregor herrmann <> yes upstream vendor 2015-05-29
POE-Component-SSLify-1.012-Use-default-SSL-version-in-tests.patch [PATCH] Use default SSL version in tests
OpenSSL or distributor will remove support for SSLv3 soon or later.
POE-Component-SSLify tests fail now because Net-SSLeay-0.68 has
already removed the support.

The patch replaces hard-coding any specific procol version to
`default' value which should be future-proof.

CPAN RT#104493
=?UTF-8?q?Petr=20P=C3=ADsa=C5=99?= <> no 2015-05-18
POE-Component-SSLify-1.012-Adapt-to-OpenSSL-3.patch [PATCH] Adapt to OpenSSL 3
OpenSSL 3 changed handling of I/O errors in SSL_accept(). That became
visible when a client disconnected to early. As a result
t/simple_parallel.t started failing randomly:

# Failed test 'SERVER: SSLify_Options 156: private key
# '
# at t/simple_parallel.t line 52.
# Failed test 'SERVER: Server_SSLify Please do SSLify_Options() first ( or pass in a $ctx object ) at /builddir/build/BUILD/POE-Component
-SSLify-1.012/blib/lib/POE/Component/ line 247.
# '
# at t/simple_parallel.t line 55.
Can't use an undefined value as a symbol reference at /builddir/build/BUILD/POE-Component-SSLify-1.012/blib/lib/POE/Component/ line 457.
# Tests were run but no plan was declared and done_testing() was not seen.
# Looks like your test exited with 22 just after 94.
t/simple_parallel.t ...........
Dubious, test returned 22 (wstat 5632, 0x1600)
Failed 2/94 subtests

This patch fixes these bugs in POE-Component-SSLify:

soft errors of Net::SSLeay::accept().

Various Net::SSLeay calls inspected a global error stack instead of
the actual return value. That lead to misreporting errors at a wrong
place. Expecially after CTX_set_options() which cannot error.

The test retried SSLify_Options() with wrong file paths.

This patch should fix all of them.

CPAN RT#139684
=?UTF-8?q?Petr=20P=C3=ADsa=C5=99?= <> no 2021-10-13
0001-Disable-sessions-tickets-with-OpenSSL-1.1.1.patch [PATCH] Disable sessions tickets with OpenSSL 1.1.1
This works around an OpenSSL SIGIPE issue causing server crash or
SSL_accept() failure.

CPAN RT#126976
=?UTF-8?q?Petr=20P=C3=ADsa=C5=99?= <> no 2018-08-28

All known versions for source package 'libpoe-component-sslify-perl'