We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
2 parents af050d5 + 929894c commit 0d07622Copy full SHA for 0d07622
.github/workflows/linux.yml
@@ -25,19 +25,9 @@ jobs:
25
image: perl:${{ matrix.perl-version }}
26
steps:
27
- uses: actions/checkout@v1
28
- - name: Install Crypt::OpenSSL::VerifyX509
29
- run: |
30
- curl -sL https://cpanmin.us/ | perl - -nq inc::Module::Install \
31
- Module::Install::AuthorRequires Module::Install::AuthorTests \
32
- Test::NoTabs Test::Pod Test::Pod::Coverage Test::More Crypt::OpenSSL::X509;
33
- git clone https://github.com/timlegge/perl-Crypt-OpenSSL-VerifyX509.git;
34
- cd perl-Crypt-OpenSSL-VerifyX509;
35
- perl Makefile.PL;
36
- make install;
37
- cd ..;
38
- name: Install Net::SAML2 Depends
39
run: |
40
- apt-get install libxml2-dev make gcc;
+ apt-get install libxml2 make gcc;
41
curl -sL https://cpanmin.us/ | perl - -nq --installdeps . ;
42
- name: Build Module
43
Changes
@@ -1,10 +1,30 @@
1
Revision history for Perl extension Net::SAML2.
2
3
+0.30-TRIAL 13-Jan-2021
4
+
5
+ Significant Changes
6
7
+ 1. Replace Crypt::OpenSSL::Verify
8
+ 2. Merge latest XML::Sig
9
10
+ Warning: This release require the installation of Crypt::OpenSSL::Verify.
11
12
+ TBD Update Changes and Increment version
13
+ ccaa892 Remove the installation of Crypt::OpenSSL::VerifyX509 from action
14
+ 36d0a5c Move to Crypt-OpenSSL-Verify as Crypt-OpenSSL-Verify is not supported
15
+ af050d5 Merge pull request #8 from timlegge/merge-xml-sig
16
+ 91208a2 Update dependencies for Net::SAML2::XML::Sig
17
+ 359a0bd Merge XML::Sig version 0.39
18
+ 200c0ae Update some documentation details
19
+ ed3c265 Merge XML::Sig version 0.38
20
+ dfefef6 Remove XML::Lib added XML Declaration from Signed XML
21
+ a39774f Copy updated XML::Sig and update name and version
22
23
0.29 12-Jan-2021
24
Small release to update issues location to be github
- TBD Update Changes and Increment version
+ 6a03758 Update Changes and Increment version
08e1a17 Fixes #7 - Move issues to github
0.28 04-Jul-2020
Makefile.PL
@@ -22,7 +22,7 @@ my %WriteMakefileArgs = (
"Crypt::OpenSSL::DSA" => 0,
"Crypt::OpenSSL::RSA" => 0,
"Crypt::OpenSSL::Random" => 0,
- "Crypt::OpenSSL::VerifyX509" => 0,
+ "Crypt::OpenSSL::Verify" => 0,
"Crypt::OpenSSL::X509" => 0,
"DateTime" => 0,
"DateTime::Format::XSD" => 0,
@@ -68,7 +68,7 @@ my %WriteMakefileArgs = (
68
"Test::Pod::Coverage" => "1.04",
69
"XML::LibXML::XPathContext" => 0
70
},
71
- "VERSION" => "0.29",
+ "VERSION" => "0.30",
72
"test" => {
73
"TESTS" => "t/*.t t/author/*.t"
74
}
@@ -82,7 +82,7 @@ my %FallbackPrereqs = (
82
83
84
85
86
87
88
cpanfile
@@ -1,10 +1,12 @@
+# Do not edit this file directly. To change prereqs, edit the `dist.ini` file.
requires "Carp" => "0";
requires "Class::Accessor" => "0";
requires "Crypt::OpenSSL::Bignum" => "0";
requires "Crypt::OpenSSL::DSA" => "0";
requires "Crypt::OpenSSL::RSA" => "0";
requires "Crypt::OpenSSL::Random" => "0";
-requires "Crypt::OpenSSL::VerifyX509" => "0";
+requires "Crypt::OpenSSL::Verify" => "0";
requires "Crypt::OpenSSL::X509" => "0";
requires "DateTime" => "0";
requires "DateTime::Format::XSD" => "0";
lib/Net/SAML2.pm
@@ -4,7 +4,7 @@ use warnings;
require 5.008_001;
-our $VERSION = '0.29';
+our $VERSION = '0.30';
$VERSION = eval {$VERSION};
=head1 NAME
lib/Net/SAML2/Binding/POST.pm
@@ -25,7 +25,7 @@ Net::SAML2::Binding::POST - HTTP POST binding for SAML2
use Net::SAML2::XML::Sig;
use MIME::Base64 qw/ decode_base64 /;
-use Crypt::OpenSSL::VerifyX509;
+use Crypt::OpenSSL::Verify;
=head2 new( )
@@ -69,7 +69,7 @@ sub handle_response {
my $cert = $x->signer_cert
or die "Certificate not provided and not in SAML Response, cannot validate";
- my $ca = Crypt::OpenSSL::VerifyX509->new($self->cacert);
+ my $ca = Crypt::OpenSSL::Verify->new($self->cacert, { strict_certs => 0, });
if ($ca->verify($cert)) {
return sprintf("%s (verified)", $cert->subject);
75
} else {
lib/Net/SAML2/Binding/SOAP.pm
@@ -121,7 +121,7 @@ sub handle_response {
121
122
# verify the signing certificate
123
my $cert = $x->signer_cert;
124
125
$ret = $ca->verify($cert);
126
die "bad signer cert" unless $ret;
127
@@ -159,7 +159,7 @@ sub handle_request {
159
die "bad signature" unless $ret;
160
161
162
163
164
die "bad certificate in request: ".$cert->subject unless $ret;
165
lib/Net/SAML2/IdP.pm
@@ -16,7 +16,7 @@ Net::SAML2::IdP - SAML Identity Provider object
=cut
use Crypt::OpenSSL::X509;
use HTTP::Request::Common;
use LWP::UserAgent;
@@ -180,7 +180,7 @@ sub BUILD {
180
my($self) = @_;
181
182
if ($self->cacert) {
183
184
185
for my $use (keys %{$self->certs}) {
186
my $cert = Crypt::OpenSSL::X509->new_from_string($self->certs->{$use});
lib/Net/SAML2/XML/Sig.pm
@@ -36,7 +36,7 @@ use vars qw($VERSION @EXPORT_OK %EXPORT_TAGS $DEBUG);
$DEBUG = 0;
# Based on XML::Sig VERSION = '0.39';
-$VERSION = '0.29';
+$VERSION = '0.30';
use base qw(Class::Accessor);
Net::SAML2::XML::Sig->mk_accessors(qw(key));
lib/Net/SAML2/XML/Util.pm
@@ -9,7 +9,7 @@ use XML::Tidy;
use vars qw($VERSION @EXPORT_OK %EXPORT_TAGS $DEBUG);
# We are exporting functions
use base qw/Exporter/;
0 commit comments