[libauthen-krb5-admin-perl] 02/05: Add patch to fix POD warnings with perl 5.18.
gregor herrmann
gregoa at debian.org
Thu Aug 29 23:52:55 UTC 2013
This is an automated email from the git hooks/post-receive script.
gregoa pushed a commit to branch master
in repository libauthen-krb5-admin-perl.
commit 7b575c6c5ad8e298b0ebf96faa978a7ddd9fc59f
Author: gregor herrmann <gregoa at debian.org>
Date: Fri Aug 30 01:47:23 2013 +0200
Add patch to fix POD warnings with perl 5.18.
---
debian/patches/pod.patch | 383 ++++++++++++++++++++++++++++++++++++++++++++++
debian/patches/series | 1 +
2 files changed, 384 insertions(+)
diff --git a/debian/patches/pod.patch b/debian/patches/pod.patch
new file mode 100644
index 0000000..35a905d
--- /dev/null
+++ b/debian/patches/pod.patch
@@ -0,0 +1,383 @@
+Description: bullet after =item is not allowed anymore
+Origin: vendor
+Bug: https://rt.cpan.org/Ticket/Display.html?id=88281
+Forwarded: https://rt.cpan.org/Ticket/Display.html?id=88281
+Author: gregor herrmann <gregoa at debian.org>
+Last-Update: 2013-08-30
+
+--- a/Admin.pm
++++ b/Admin.pm
+@@ -313,27 +313,27 @@
+ The only methods in this class are the constructor (I<new>, described
+ above) and the following accessor methods.
+
+-=item * admin_server {KADM5_CONFIG_ADMIN_SERVER}
++=item admin_server {KADM5_CONFIG_ADMIN_SERVER}
+
+ Admin server hostname
+
+-=item * kadmind_port {KADM5_CONFIG_KADMIND_PORT}
++=item kadmind_port {KADM5_CONFIG_KADMIND_PORT}
+
+ Admin server port number
+
+-=item * kpasswd_port {KADM5_CONFIG_KPASSWD_PORT}
++=item kpasswd_port {KADM5_CONFIG_KPASSWD_PORT}
+
+ Kpasswd server port number
+
+-=item * mask
++=item mask
+
+ Mask (described above)
+
+-=item * profile {KADM5_CONFIG_PROFILE}
++=item profile {KADM5_CONFIG_PROFILE}
+
+ Kerberos 5 configuration profile
+
+-=item * realm {KADM5_CONFIG_REALM}
++=item realm {KADM5_CONFIG_REALM}
+
+ Kerberos 5 realm name
+
+@@ -343,32 +343,32 @@
+ The only methods in this class are the constructor (I<new>, described
+ above) and the following accessor methods.
+
+-=item * key_contents
++=item key_contents
+
+ Key contents, encrypted with the KDC master key. This data may not be
+ available remotely.
+
+-=item * enc_type
++=item enc_type
+
+ Kerberos 5 enctype of the key
+
+-=item * key_type
++=item key_type
+
+ Alias for I<enc_type>
+
+-=item * kvno
++=item kvno
+
+ Key version number
+
+-=item * salt_contents
++=item salt_contents
+
+ Salt contents, if any (I<ver> > 1)
+
+-=item * salt_type
++=item salt_type
+
+ Salt type, if any (I<ver> > 1)
+
+-=item * ver
++=item ver
+
+ Version number of the underlying I<krb5_key_data> structure
+
+@@ -378,53 +378,53 @@
+ are the constructor (I<new>, described above) and the following
+ accessor methods.
+
+-=item * mask
++=item mask
+
+ Mask (described above)
+
+-=item * name {KADM5_POLICY}
++=item name {KADM5_POLICY}
+
+ Policy name
+
+-=item * pw_history_num {KADM5_PW_HISTORY_NUM}
++=item pw_history_num {KADM5_PW_HISTORY_NUM}
+
+ Number (between 1 and 10, inclusive) of past passwords to be stored
+ for the principal. A principal may not set its password to any of its
+ previous I<pw_history_num> passwords.
+
+-=item * pw_max_life {KADM5_PW_MAX_LIFE}
++=item pw_max_life {KADM5_PW_MAX_LIFE}
+
+ Default number of seconds a password lasts before the principal is
+ required to change it
+
+-=item * pw_max_fail {KADM5_PW_MAX_FAILURE}
++=item pw_max_fail {KADM5_PW_MAX_FAILURE}
+
+ The maximum allowed number of attempts before a lockout.
+
+-=item * pw_failcnt_interval {KADM5_PW_FAILURE_COUNT_INTERVAL}
++=item pw_failcnt_interval {KADM5_PW_FAILURE_COUNT_INTERVAL}
+
+ The period after which the bad preauthentication count will be reset.
+
+-=item * pw_lockout_duration {KADM5_PW_LOCKOUT_DURATION}
++=item pw_lockout_duration {KADM5_PW_LOCKOUT_DURATION}
+
+ The period in which lockout is enforced; a duration of zero means that
+ the principal must be manually unlocked.
+
+-=item * pw_min_classes {KADM5_PW_MIN_CLASSES}
++=item pw_min_classes {KADM5_PW_MIN_CLASSES}
+
+ Number (between 1 and 5, inclusive) of required character classes
+ represented in a password
+
+-=item * pw_min_length {KADM5_PW_MIN_LENGTH}
++=item pw_min_length {KADM5_PW_MIN_LENGTH}
+
+ Minimum number of characters in a password
+
+-=item * pw_min_life {KADM5_PW_MIN_LIFE}
++=item pw_min_life {KADM5_PW_MIN_LIFE}
+
+ Number of seconds a password must age before the principal may change
+ it
+
+-=item * policy_refcnt {KADM5_REF_COUNT}
++=item policy_refcnt {KADM5_REF_COUNT}
+
+ Number of principals referring to this policy (read-only, does not set
+ KADM5_REF_COUNT automatically)
+@@ -439,95 +439,95 @@
+ above), the following accessor methods, and I<policy_clear>, which is
+ used to clear the policy attribute.
+
+-=item * attributes {KADM5_ATTRIBUTES}
++=item attributes {KADM5_ATTRIBUTES}
+
+ Bitfield representing principal attributes (see L<kadmin(8)>)
+
+-=item * aux_attributes {KADM5_AUX_ATTRIBUTES}
++=item aux_attributes {KADM5_AUX_ATTRIBUTES}
+
+ Bitfield used by kadmin. Currently only recognizes the KADM5_POLICY,
+ which indicates that a policy is in effect for this principal. This
+ attribute is read-only, so KADM5_AUX_ATTRIBUTES is not set
+ automatically.
+
+-=item * fail_auth_count {KADM5_FAIL_AUTH_COUNT}
++=item fail_auth_count {KADM5_FAIL_AUTH_COUNT}
+
+ Number of consecutive failed AS_REQs for this principal. This
+ attribute is read-only, so KADM5_FAIL_AUTH_COUNT is not set
+ automatically.
+
+-=item * kvno {KADM5_KVNO}
++=item kvno {KADM5_KVNO}
+
+ Key version number
+
+-=item * last_failed {KADM5_LAST_FAILED}
++=item last_failed {KADM5_LAST_FAILED}
+
+ Time (in seconds since the Epoch) of the last failed AS_REQ for this
+ principal. This attribute is read-only, so KADM5_LAST_FAILED is not
+ set automatically.
+
+-=item * last_pwd_change {KADM5_LAST_PWD_CHANGE}
++=item last_pwd_change {KADM5_LAST_PWD_CHANGE}
+
+ Time (in seconds since the Epoch) of the last password change for this
+ principal. This attribute is read-only, so KADM5_LAST_PWD_CHANGE is
+ not set automatically.
+
+-=item * last_success {KADM5_LAST_SUCCESS}
++=item last_success {KADM5_LAST_SUCCESS}
+
+ Time (in seconds since the Epoch) of the last successful AS_REQ for
+ this principal. This attribute is read-only, so KADM5_LAST_SUCCESS is
+ not set automatically.
+
+-=item * mask
++=item mask
+
+ Mask (see above)
+
+-=item * max_life {KADM5_MAX_LIFE}
++=item max_life {KADM5_MAX_LIFE}
+
+ maximum lifetime in seconds of any Kerberos ticket issued to this
+ principal
+
+-=item * max_renewable_life {KADM5_MAX_RLIFE}
++=item max_renewable_life {KADM5_MAX_RLIFE}
+
+ maximum renewable lifetime in seconds of any Kerberos ticket issued to
+ this principal
+
+-=item * mod_date {KADM5_MOD_TIME}
++=item mod_date {KADM5_MOD_TIME}
+
+ Time (in seconds since the Epoch) this principal was last modified.
+ This attribute is read-only, so KADM5_MOD_TIME is not set
+ automatically.
+
+-=item * mod_name {KADM5_MOD_NAME}
++=item mod_name {KADM5_MOD_NAME}
+
+ Kerberos principal (B<Authen::Krb5::Principal>, see
+ L<Authen::Krb5(3)>) that last modified this principal. This attribute
+ is read-only, so KADM5_MOD_NAME is not set automatically.
+
+-=item * policy {KADM5_POLICY}
++=item policy {KADM5_POLICY}
+
+ Name of policy that affects this principal if KADM5_POLICY is set in
+ I<aux_attributes>
+
+-=item * policy_clear {KADM5_POLICY_CLR}
++=item policy_clear {KADM5_POLICY_CLR}
+
+ Not really an attribute--disables the current policy for this
+ principal. This method doesn't return anything.
+
+-=item * princ_expire_time {KADM5_PRINC_EXPIRE_TIME}
++=item princ_expire_time {KADM5_PRINC_EXPIRE_TIME}
+
+ Expire time (in seconds since the Epoch) of the principal
+
+-=item * principal {KADM5_PRINCIPAL}
++=item principal {KADM5_PRINCIPAL}
+
+ Kerberos principal itself (B<Authen::Krb5::Principal>, see
+ L<Authen::Krb5(3)>)
+
+-=item * pw_expiration {KADM5_PW_EXPIRATION}
++=item pw_expiration {KADM5_PW_EXPIRATION}
+
+ Expire time (in seconds since the Epoch) of the principal's password
+
+-=item * db_args [@ARGS]
++=item db_args [@ARGS]
+
+ When called without any C<@ARGS>, returns the list of arguments that
+ will be passed into the underlying database, as with C<addprinc -x> in
+@@ -578,82 +578,82 @@
+ the configuration from the Kerberos 5 profile (F</etc/krb5.conf> by
+ default).
+
+-=item * $kadm5 = Authen::Krb5::Admin->init_with_creds($client, $krb5_ccache[, $service, $kadm5_config])
++=item $kadm5 = Authen::Krb5::Admin->init_with_creds($client, $krb5_ccache[, $service, $kadm5_config])
+
+ Authenticate using the credentials cached in $krb5_ccache.
+
+-=item * $kadm5 = Authen::Krb5::Admin->init_with_password($client[, $password, $service, $kadm5_config])
++=item $kadm5 = Authen::Krb5::Admin->init_with_password($client[, $password, $service, $kadm5_config])
+
+ Authenticate with $password.
+
+-=item * $kadm5 = Authen::Krb5::Admin->init_with_skey($client[, $keytab_file, $service, $kadm5_config])
++=item $kadm5 = Authen::Krb5::Admin->init_with_skey($client[, $keytab_file, $service, $kadm5_config])
+
+ Authenticate using the keytab stored in $keytab_file. If $keytab_file
+ is undef, the default keytab is used.
+
+ =item Principal Operations
+
+-=item * $success = $kadm5->chpass_principal($krb5_princ, $password)
++=item $success = $kadm5->chpass_principal($krb5_princ, $password)
+
+ Change the password of $krb5_princ to $password.
+
+-=item * $success = $kadm5->create_principal($kadm5_princ[, $password])
++=item $success = $kadm5->create_principal($kadm5_princ[, $password])
+
+ Insert $kadm5_princ into the database, optionally setting its password
+ to the string in $password. Clears KADM5_POLICY_CLR and
+ KADM5_FAIL_AUTH_COUNT.
+
+-=item * $success = $kadm5->delete_principal($krb5_princ)
++=item $success = $kadm5->delete_principal($krb5_princ)
+
+ Delete the principal represented by $krb5_princ from the database.
+
+-=item * $kadm5_princ = $kadm5->get_principal($krb5_princ[, $mask])
++=item $kadm5_princ = $kadm5->get_principal($krb5_princ[, $mask])
+
+ Retrieve the Authen::Krb5::Admin::Principal object for the principal
+ $krb5_princ from the database. Use KADM5_PRINCIPAL_NORMAL_MASK to
+ retrieve all of the useful attributes.
+
+-=item * @names = $kadm5->get_principals([$expr])
++=item @names = $kadm5->get_principals([$expr])
+
+ Retrieve a list of principal names matching the glob pattern $expr.
+ In the absence of $expr, retrieve the list of all principal names.
+
+-=item * $success = $kadm5->modify_principal($kadm5_princ)
++=item $success = $kadm5->modify_principal($kadm5_princ)
+
+ Modify $kadm5_princ in the database. The principal to modify is
+ determined by C<$kadm5_princ-E<gt>principal>, and the rest of the writable
+ parameters will be modified accordingly. Clears KADM5_PRINCIPAL.
+
+-=item * @keys = $kadm5->randkey_principal($krb5_princ)
++=item @keys = $kadm5->randkey_principal($krb5_princ)
+
+ Randomize the principal in the database represented by $krb5_princ and
+ return B<Authen::Krb5::Keyblock> objects.
+
+-=item * $success = $kadm5->rename_principal($krb5_princ_from, $krb5_princ_to)
++=item $success = $kadm5->rename_principal($krb5_princ_from, $krb5_princ_to)
+
+ Change the name of the principal from $krb5_princ_from to $krb5_princ_to.
+
+ =item Policy Operations
+
+-=item * $success = $kadm5->create_policy($kadm5_pol)
++=item $success = $kadm5->create_policy($kadm5_pol)
+
+ Insert $kadm5_pol into the database.
+
+-=item * $success = $kadm5->delete_policy($name)
++=item $success = $kadm5->delete_policy($name)
+
+ Delete the policy named $name from the database.
+
+-=item * $kadm5_pol = $kadm5->get_policy([$name])
++=item $kadm5_pol = $kadm5->get_policy([$name])
+
+ Retrieve the B<Authen::Krb5::Admin::Policy> object for the policy
+ named $name from the database.
+
+-=item * @names = $kadm5->get_policies([$expr])
++=item @names = $kadm5->get_policies([$expr])
+
+ Retrieve a list of policy names matching the glob pattern $expr. In
+ the absence of $expr, retrieve the list of all policy names.
+
+-=item * $success = $kadm5->modify_policy($kadm5_pol)
++=item $success = $kadm5->modify_policy($kadm5_pol)
+
+ Modify $kadm5_pol in the database. The policy to modify is
+ determined by C<$kadm5_pol->name>,(and the rest of the writable)
+@@ -661,18 +661,18 @@
+
+ =item Other Methods
+
+-=item * $magic_value = Authen::Krb5::Admin::error [$error]
++=item $magic_value = Authen::Krb5::Admin::error [$error]
+
+ Return value that acts like $! (see L<perlvar(1)>) for the most
+ recent Authen::Krb5::Admin call. With error code $error, return
+ the error message corresponding to that error code.
+
+-=item * $error_code = Authen::Krb5::Admin::error_code
++=item $error_code = Authen::Krb5::Admin::error_code
+
+ Returns the value of the error code for the most recent
+ Authen::Krb5::Admin call as a simple integer.
+
+-=item * $privs = $kadm5->get_privs
++=item $privs = $kadm5->get_privs
+
+ Return a bitfield representing the kadmin privileges a principal has,
+ as follows:
diff --git a/debian/patches/series b/debian/patches/series
new file mode 100644
index 0000000..c9352c4
--- /dev/null
+++ b/debian/patches/series
@@ -0,0 +1 @@
+pod.patch
--
Alioth's /usr/local/bin/git-commit-notice on /srv/git.debian.org/git/pkg-perl/packages/libauthen-krb5-admin-perl.git
More information about the Pkg-perl-cvs-commits
mailing list