Skip to content

Commit

Permalink
libcrypt-openssl-rsa-perl: upgrade 0.30 -> 0.31; enable ptest
Browse files Browse the repository at this point in the history
* Add runtime and ptest dependencies

Upstream release notes:

0.31 Mon Sep 24 2018
    - Remove default of SHA256 for RSA keys. This has caused significant
      problems with downstream modules and it has always been possible to
      do $key->use_sha256_hash()

Signed-off-by: Tim Orling <[email protected]>
Signed-off-by: Khem Raj <[email protected]>
  • Loading branch information
Tim Orling authored and kraj committed Jun 13, 2019
1 parent 7131206 commit 2cc4d30
Show file tree
Hide file tree
Showing 2 changed files with 38 additions and 24 deletions.
24 changes: 0 additions & 24 deletions meta-perl/recipes-perl/libcrypt/libcrypt-openssl-rsa-perl_0.30.bb

This file was deleted.

38 changes: 38 additions & 0 deletions meta-perl/recipes-perl/libcrypt/libcrypt-openssl-rsa-perl_0.31.bb
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
SUMMARY = "Crypt Openssl RSA cpan module"
SECTION = "libs"
LICENSE = "Artistic-1.0 | GPL-1.0+"
LIC_FILES_CHKSUM = "file://LICENSE;md5=a67ceecc5d9a91a5a0d003ba50c26346"

SRC_URI = "http://www.cpan.org/modules/by-module/Crypt/Crypt-OpenSSL-RSA-${PV}.tar.gz "

SRC_URI[md5sum] = "d33681e19d2094df7c26bc7a4509265e"
SRC_URI[sha256sum] = "4173403ad4cf76732192099f833fbfbf3cd8104e0246b3844187ae384d2c5436"

DEPENDS += "libcrypt-openssl-guess-perl-native openssl"

RDEPENDS_${PN} = " \
libcrypt-openssl-random-perl \
perl-module-autoloader \
perl-module-carp \
perl-module-strict \
perl-module-warnings \
perl-module-xsloader \
"

EXTRA_CPANFLAGS = "INC='-I${STAGING_INCDIR}' LIBS='-L${STAGING_LIBDIR} -lssl -L${STAGING_DIR_TARGET}${base_libdir} -lcrypto'"

S = "${WORKDIR}/Crypt-OpenSSL-RSA-${PV}"

inherit cpan ptest-perl

do_compile() {
export OTHERLDFLAGS='-Wl,-rpath'
cpan_do_compile
}

RDEPENDS_${PN}-ptest = " \
${PN} \
perl-module-file-copy \
perl-module-test \
perl-module-test-more \
"

0 comments on commit 2cc4d30

Please sign in to comment.