[libcatalyst-modules-perl] 01/01: replace bundled Catalyst-Plugin-Authorization-ACL with a dependency on libcatalyst-plugin-authorization-acl-perl

Damyan Ivanov dmn at moszumanska.debian.org
Thu May 15 07:01:03 UTC 2014


This is an automated email from the git hooks/post-receive script.

dmn pushed a commit to branch master
in repository libcatalyst-modules-perl.

commit 642feb8162689cec01b401bb8e1da7883eaddf80
Author: Damyan Ivanov <dmn at debian.org>
Date:   Thu May 15 07:00:40 2014 +0000

    replace bundled Catalyst-Plugin-Authorization-ACL with a dependency on libcatalyst-plugin-authorization-acl-perl
---
 bundle/05/Catalyst-Plugin-Authorization-ACL        |   1 -
 debian/control                                     |   1 +
 debian/copyright                                   |   7 -
 .../pod-spelling.patch                             |  16 -
 .../Catalyst-Plugin-Authorization-ACL/series       |   1 -
 sources/Catalyst-Plugin-Authorization-ACL/Changes  |  56 --
 sources/Catalyst-Plugin-Authorization-ACL/MANIFEST |  31 -
 sources/Catalyst-Plugin-Authorization-ACL/META.yml |  46 --
 .../Catalyst-Plugin-Authorization-ACL/Makefile.PL  |  33 -
 sources/Catalyst-Plugin-Authorization-ACL/README   | 314 --------
 sources/Catalyst-Plugin-Authorization-ACL/TODO     |  22 -
 .../inc/Module/AutoInstall.pm                      | 805 ---------------------
 .../inc/Module/Install.pm                          | 430 -----------
 .../inc/Module/Install/AutoInstall.pm              |  61 --
 .../inc/Module/Install/Base.pm                     |  78 --
 .../inc/Module/Install/Can.pm                      |  81 ---
 .../inc/Module/Install/Fetch.pm                    |  93 ---
 .../inc/Module/Install/Include.pm                  |  34 -
 .../inc/Module/Install/Makefile.pm                 | 268 -------
 .../inc/Module/Install/Metadata.pm                 | 624 ----------------
 .../inc/Module/Install/Win32.pm                    |  64 --
 .../inc/Module/Install/WriteAll.pm                 |  60 --
 .../lib/Catalyst/Plugin/Authorization/ACL.pm       | 525 --------------
 .../Catalyst/Plugin/Authorization/ACL/Engine.pm    | 359 ---------
 .../Catalyst-Plugin-Authorization-ACL/t/01use.t    |   3 -
 .../Catalyst-Plugin-Authorization-ACL/t/02pod.t    |   7 -
 .../t/lib/ACLTestApp.pm                            |  78 --
 .../t/lib/ACLTestApp/Controller/Auth.pm            |  43 --
 .../t/lib/ACLTestApp/Controller/LionCage.pm        |  32 -
 .../t/lib/ACLTestApp/Controller/Root.pm            |  32 -
 .../t/lib/ACLTestApp/Controller/Zoo.pm             |  42 --
 .../t/lib/ACLTestApp/Controller/Zoo/Penguins.pm    |  41 --
 .../t/lib/ACLTestApp2.pm                           |  17 -
 .../t/lib/ACLTestApp2/Controller/Root.pm           |  44 --
 .../Catalyst-Plugin-Authorization-ACL/t/live_app.t | 103 ---
 .../t/more_live_app.t                              |  43 --
 36 files changed, 1 insertion(+), 4494 deletions(-)

diff --git a/bundle/05/Catalyst-Plugin-Authorization-ACL b/bundle/05/Catalyst-Plugin-Authorization-ACL
deleted file mode 120000
index 5b0b6a3..0000000
--- a/bundle/05/Catalyst-Plugin-Authorization-ACL
+++ /dev/null
@@ -1 +0,0 @@
-../../sources/Catalyst-Plugin-Authorization-ACL
\ No newline at end of file
diff --git a/debian/control b/debian/control
index c26f206..9658a5a 100644
--- a/debian/control
+++ b/debian/control
@@ -105,6 +105,7 @@ Depends: ${misc:Depends},
          libcatalyst-action-renderview-perl,
          libcatalyst-authentication-credential-authen-simple-perl,
          libcatalyst-authentication-store-dbix-class-perl,
+         libcatalyst-plugin-authorization-acl-perl,
          libcatalyst-component-instancepercontext-perl,
          libcatalyst-controller-formbuilder-perl,
          libcatalyst-controller-html-formfu-perl,
diff --git a/debian/copyright b/debian/copyright
index 43d4d7f..e06a928 100644
--- a/debian/copyright
+++ b/debian/copyright
@@ -9,13 +9,6 @@ Copyright: 2005-2006, Florian Ragwitz <rafl at debian.org>
  2010-2013, gregor herrmann <gregoa at debian.org>
 License: Artistic or GPL-1+
 
-Files: sources/Catalyst-Plugin-Authorization-ACL
-Copyright: 2005-2009, Yuval Kogman <nothingmuch at woobling.org>
- 2005-2009, Jess Robinson <cpan at desert-island.me.uk>
- 2005-2009, Rafael Kitover <rkitover at cpan.org>
-X-Upstream-Maintainers: Rafael Kitover <rkitover at cpan.org>
-License: Artistic or GPL-1+
-
 Files: sources/Catalyst-Plugin-Session-Store-DBIC
 Copyright: 2006-2009, Daniel Westermann-Clark <danieltwc at cpan.org>
 X-Upstream-Maintainers: Florian Ragwitz <rafl at debian.org>
diff --git a/debian/patches/Catalyst-Plugin-Authorization-ACL/pod-spelling.patch b/debian/patches/Catalyst-Plugin-Authorization-ACL/pod-spelling.patch
deleted file mode 100644
index ac2b69b..0000000
--- a/debian/patches/Catalyst-Plugin-Authorization-ACL/pod-spelling.patch
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: POD spelling
-  begining -> beginning
-Author: Damyan Ivanov <dmn at debian.org>
-Forwarded: https://rt.cpan.org/Ticket/Display?id=95566
-
---- a/lib/Catalyst/Plugin/Authorization/ACL.pm
-+++ b/lib/Catalyst/Plugin/Authorization/ACL.pm
-@@ -336,7 +336,7 @@ policy, access to the path will be permi
- 
- To apply a rule to an action or group of actions you must supply a path.
- 
--This path is what you should see dumped at the begining of the L<Catalyst>
-+This path is what you should see dumped at the beginning of the L<Catalyst>
- server's debug output.
- 
- For example, for the C<foo> action defined at the root level of your
diff --git a/debian/patches/Catalyst-Plugin-Authorization-ACL/series b/debian/patches/Catalyst-Plugin-Authorization-ACL/series
deleted file mode 100644
index ad85da2..0000000
--- a/debian/patches/Catalyst-Plugin-Authorization-ACL/series
+++ /dev/null
@@ -1 +0,0 @@
-pod-spelling.patch
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/Changes b/sources/Catalyst-Plugin-Authorization-ACL/Changes
deleted file mode 100644
index 95bf002..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/Changes
+++ /dev/null
@@ -1,56 +0,0 @@
-Revision history for Perl extension Catalyst::Plugin::Authorization::ACL
-
-0.15  2009-10-18 05:56:51
-        - apply fix from RT#50604 (filter undef actions when building tree)
-
-0.14  2009-09-30 22:20:41
-        - add 'deny_access_unless_any' and 'allow_access_if_any' as shortcuts
-        for any role in a list
-        - fix 'uninitialized' warning in tests
-
-0.13  2009-09-26 03:34:16
-        - fix use of $dispatcher->tree warning
-        - fix actions in testapp warning
-
-0.12  2009-09-25 09:35:51
-        - workaround for a test failure on some configurations of Strawberry
-        Perl
-        - add test_requires for things the tests depend on
-
-0.11  2009-04-21
-        - switch from NEXT to MRO::Compat
-
-0.10  2008-10-13
-        - fix access_denied action support
-
-0.09  2008-08-22
-        - fix the overwriting of $c->req->args for access_denied handlers
-
-0.08  2006-07-21 20:01:00
-        - protect ACL::Engine from custom $SIG{__DIE__} handlers
-
-0.07  2006-07-05 23:15:27
-        - support for ACL setup in app config
-        - bug fix for private access_denied action
-
-0.06  2005-12-25 20:37:00
-        - Added forcibly_allow_access, proper denial handling
-        - allow for constant conditions
-        - i think there was something else
-
-0.05  2005-12-25 20:37:00
-        - Forgot to changelog this release ;-)
-
-0.04  2005-12-08 10:15:00
-        - Fix a bug with ACLs on "/"
-
-0.03  2005-12-04 22:07:00
-        - Maybe some tiny doc fixes
-        - No longer relies on Test::Plan which had some trouble with windows
-          and was used incorrectly anyhow ;-)
-
-0.02  ???
-        - can't recall, may have been drunk
-
-0.01  ???
-        - Initial release.
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/MANIFEST b/sources/Catalyst-Plugin-Authorization-ACL/MANIFEST
deleted file mode 100644
index f93fb8c..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/MANIFEST
+++ /dev/null
@@ -1,31 +0,0 @@
-Changes
-inc/Module/AutoInstall.pm
-inc/Module/Install.pm
-inc/Module/Install/AutoInstall.pm
-inc/Module/Install/Base.pm
-inc/Module/Install/Can.pm
-inc/Module/Install/Fetch.pm
-inc/Module/Install/Include.pm
-inc/Module/Install/Makefile.pm
-inc/Module/Install/Metadata.pm
-inc/Module/Install/Win32.pm
-inc/Module/Install/WriteAll.pm
-lib/Catalyst/Plugin/Authorization/ACL.pm
-lib/Catalyst/Plugin/Authorization/ACL/Engine.pm
-Makefile.PL
-MANIFEST			This list of files
-META.yml
-README
-t/01use.t
-t/02pod.t
-t/lib/ACLTestApp.pm
-t/lib/ACLTestApp/Controller/Auth.pm
-t/lib/ACLTestApp/Controller/LionCage.pm
-t/lib/ACLTestApp/Controller/Root.pm
-t/lib/ACLTestApp/Controller/Zoo.pm
-t/lib/ACLTestApp/Controller/Zoo/Penguins.pm
-t/lib/ACLTestApp2.pm
-t/lib/ACLTestApp2/Controller/Root.pm
-t/live_app.t
-t/more_live_app.t
-TODO
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/META.yml b/sources/Catalyst-Plugin-Authorization-ACL/META.yml
deleted file mode 100644
index d6d2284..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/META.yml
+++ /dev/null
@@ -1,46 +0,0 @@
----
-abstract: 'ACL support for Catalyst applications.'
-author:
-  - 'Yuval Kogman <nothingmuch at woobling.org>'
-build_requires:
-  Catalyst::Plugin::Session: 0
-  Catalyst::Plugin::Session::State::Cookie: 0
-  ExtUtils::MakeMaker: 6.42
-  Test::More: 0
-  Test::WWW::Mechanize::Catalyst: 0
-configure_requires:
-  ExtUtils::MakeMaker: 6.42
-distribution_type: module
-generated_by: 'Module::Install version 0.91'
-license: perl
-meta-spec:
-  url: http://module-build.sourceforge.net/META-spec-v1.4.html
-  version: 1.4
-name: Catalyst-Plugin-Authorization-ACL
-no_index:
-  directory:
-    - inc
-    - t
-provides:
-  Catalyst::Plugin::Authorization::ACL:
-    file: lib/Catalyst/Plugin/Authorization/ACL.pm
-    version: 0.15
-  Catalyst::Plugin::Authorization::ACL::Engine:
-    file: lib/Catalyst/Plugin/Authorization/ACL/Engine.pm
-requires:
-  Catalyst::Plugin::Authentication: 0
-  Catalyst::Plugin::Authorization::Roles: 0
-  Catalyst::Runtime: 5.80013
-  Class::Data::Inheritable: 0
-  Class::Throwable: 0
-  MRO::Compat: 0
-  Moose: 0
-  Tree::Simple: 0
-  Tree::Simple::Visitor::FindByPath: 0
-  Tree::Simple::Visitor::GetAllDescendents: 0
-  namespace::autoclean: 0
-  perl: 5.8.0
-resources:
-  license: http://dev.perl.org/licenses/
-  repository: http://dev.catalyst.perl.org/repos/Catalyst/trunk/Catalyst-Plugin-Authorization-ACL/
-version: 0.15
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/Makefile.PL b/sources/Catalyst-Plugin-Authorization-ACL/Makefile.PL
deleted file mode 100644
index 7b54e33..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/Makefile.PL
+++ /dev/null
@@ -1,33 +0,0 @@
-use inc::Module::Install 0.91;
-
-if ( -e 'MANIFEST.SKIP' ) {
-    system( 'pod2text lib/Catalyst/Plugin/Authorization/ACL.pm > README' );
-}
-
-perl_version '5.008';
-
-name 'Catalyst-Plugin-Authorization-ACL';
-all_from 'lib/Catalyst/Plugin/Authorization/ACL.pm';
-
-test_requires 'Test::More';
-test_requires 'Catalyst::Plugin::Session';
-test_requires 'Catalyst::Plugin::Session::State::Cookie';
-test_requires 'Test::WWW::Mechanize::Catalyst';
-
-requires 'Catalyst::Runtime' => '5.80013';
-requires 'Catalyst::Plugin::Authentication';
-requires 'Catalyst::Plugin::Authorization::Roles';
-requires 'Moose';
-requires 'MRO::Compat';
-requires 'namespace::autoclean';
-requires 'Class::Data::Inheritable';
-requires 'Class::Throwable';
-requires 'Tree::Simple';
-requires 'Tree::Simple::Visitor::FindByPath';
-requires 'Tree::Simple::Visitor::GetAllDescendents';
-
-resources repository => 'http://dev.catalyst.perl.org/repos/Catalyst/trunk/Catalyst-Plugin-Authorization-ACL/';
-
-auto_provides;
-auto_install;
-WriteAll;
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/README b/sources/Catalyst-Plugin-Authorization-ACL/README
deleted file mode 100644
index 3cced38..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/README
+++ /dev/null
@@ -1,314 +0,0 @@
-NAME
-    Catalyst::Plugin::Authorization::ACL - ACL support for Catalyst
-    applications.
-
-SYNOPSIS
-            use Catalyst qw/
-                    Authentication
-                    Authorization::Roles
-                    Authorization::ACL
-            /;
-
-            __PACKAGE__->setup;
-
-            __PACKAGE__->deny_access_unless(
-                    "/foo/bar",
-                    [qw/nice_role/],
-            );
-
-            __PACKAGE__->allow_access_if(
-                    "/foo/bar/gorch",
-                    sub { return $boolean },
-            );
-
-DESCRIPTION
-    This module provides Access Control List style path protection, with
-    arbitrary rules for Catalyst applications. It operates only on the
-    Catalyst private namespace, at least at the moment.
-
-    The two hierarchies of actions and controllers in Catalyst are:
-
-    Private Namespace
-        Every action has its own private path. This path reflects the Perl
-        namespaces the actions were born in, and the namespaces of their
-        controllers.
-
-    External Namespace
-        Some actions are also directly accessible from the outside, via a
-        URL.
-
-        The private and external paths will be the same, if you are using
-        Local actions. Alternatively you can use "Path", "Regex", or
-        "Global" to specify a different external path for your action.
-
-    The ACL module currently only knows to exploit the private namespace. In
-    the future extensions may be made to support external namespaces as
-    well.
-
-    Various types of rules are supported, see the list under "RULES".
-
-    When a path is visited, rules are tested one after the other, with the
-    most exact rule fitting the path first, and continuing up the path.
-    Testing continues until a rule explcitly allows or denies access.
-
-METHODS
-  allow_access_if
-    Arguments: $path, $rule
-
-    Check the rule condition and allow access to the actions under $path if
-    the rule returns true.
-
-    This is normally useful to allow acces only to a specific part of a tree
-    whose parent has a "deny_access_unless" clause attached to it.
-
-    If the rule test returns false access is not denied or allowed. Instead
-    the next rule in the chain will be checked - in this sense the
-    combinatory behavior of these rules is like logical OR.
-
-  allow_access_if_any
-    Arguments: $path, \@roles
-
-    Same as above for any role in the list.
-
-  deny_access_unless
-    Arguments: $path, $rule
-
-    Check the rule condition and disallow access if the rule returns false.
-
-    This is normally useful to restrict access to any portion of the
-    application unless a certain condition can be met.
-
-    If the rule test returns true access is not allowed or denied. Instead
-    the next rule in the chain will be checked - in this sense the
-    combinatory behavior of these rules is like logical AND.
-
-  deny_access_unless_any
-    Arguments: $path, \@roles
-
-    Same as above for any role in the list.
-
-  allow_access
-  deny_access
-    Arguments: $path
-
-    Unconditionally allow or deny access to a path.
-
-  acl_add_rule
-    Arguments: $path, $rule, [ $filter ]
-
-    Manually add a rule to all the actions under $path using the more
-    flexible (but more verbose) method:
-
-        __PACKAGE__->acl_add_rule(
-            "/foo",
-            sub { ... }, # see FLEXIBLE RULES below
-            sub {
-                my $action = shift;
-                # return a true value if you want to apply the rule to this action
-                # called for all the actions under "/foo"
-            }
-        };
-
-    In this case the rule must be a sub reference (or method name) to be
-    invoked on $c.
-
-    The default filter will skip all actions starting with an underscore,
-    namely "_DISPATCH", "_AUTO", etc (but not "auto", "begin", et al).
-
-  acl_access_denied
-    Arguments: $c, $class, $action, $err
-
-  acl_access_allowed
-    Arguments: $c, $class, $action
-
-    The default event handlers for access denied or allowed conditions. See
-    below on handling access violations.
-
-  acl_allow_root_internals
-    Adds rules that permit access to the root controller (YourApp.pm)
-    "auto", "begin" and "end" unconditionally.
-
-EXTENDED METHODS
-  execute
-    The hook for rule evaluation
-
-  setup_actions
-RULE EVALUATION
-    When a rule is attached to an action the "distance" from the path it was
-    specified in is recorded. The closer the path is to the rule, the
-    earlier it will be checked.
-
-    Any rule can either explicitly deny or explicitly allow access to a
-    particular action. If a rule does not explicitly allow or permit access,
-    the next rule is checked, until the list of rules is finished. If no
-    rule has determined a policy, access to the path will be permitted.
-
-PATHS
-    To apply a rule to an action or group of actions you must supply a path.
-
-    This path is what you should see dumped at the begining of the Catalyst
-    server's debug output.
-
-    For example, for the "foo" action defined at the root level of your
-    application, specify "/foo". Under the "Moose" controller (e.g.
-    "MyApp::C::Moose", the action "bar" will be "/moose/bar").
-
-    The "distance" a path has from an action that is contained in it is the
-    the difference in the number of slashes between the path of the action,
-    and the path to which the rule was applied.
-
-RULES
-  Easy Rules
-    There are several kinds of rules you can create without using the
-    complex interface described in "FLEXIBLE RULES".
-
-    The easy rules are all predicate list oriented. "allow_access_if" will
-    explicitly allow access if the predicate is true, and
-    "deny_access_unless" will explicitly disallow if the predicate is false.
-
-    Role Lists
-          __PACAKGE__->deny_access_unless_any( "/foo/bar", [qw/admin moose_trainer/] );
-
-        When the role is evaluated the
-        Catalyst::Plugin::Authorization::Roles will be used to check whether
-        the currently logged in user has the specified roles.
-
-        If "allow_access_if_any" is used, the presence of any of the roles
-        in the list will immediately permit access, and if
-        "deny_access_unless_any" is used, the lack of all of the roles will
-        immediately deny access.
-
-        Similarly, if "allow_access_if" is used, the presence of all the
-        roles will immediately permit access, and if "deny_access_unless" is
-        used, the lack of any of the roles will immediately deny access.
-
-        When specifying a role list without the
-        Catalyst::Plugin::Authorization::Roles plugin loaded the ACL engine
-        will throw an error.
-
-    Predicate Code Reference / Method Name
-        The code reference or method is invoked with the context and the
-        action objects. The boolean return value will determine the behavior
-        of the rule.
-
-            __PACKAGE__->allow_access_if( "/gorch", sub { ... } );
-            __PACKAGE__->deny_access_unless( "/moose", "method_name" );
-
-        When specifying a method name the rule engine ensures that it can be
-        invoked using "can" in UNIVERSAL.
-
-    Constant
-        You can use "undef", 0 and '' to use as a constant false predicate,
-        or 1 to use as a constant true predicate.
-
-  Flexible Rules
-    These rules are the most annoying to write but provide the most
-    flexibility.
-
-    All access control is performed using exceptions -
-    $Catalyst::Plugin::Authorization::ACL::Engine::DENIED, and
-    $Catalyst::Plugin::Authorization::ACL::Engine::ALLOWED (these can be
-    imported from the engine module).
-
-    If no rule decides to explicitly allow or deny access, access will be
-    permitted.
-
-    Here is a rule that will always break out of rule processing by either
-    explicitly allowing or denying access based on how much mojo the current
-    user has:
-
-        __PACKAGE__->acl_add_rule(
-            "/foo",
-            sub {
-                my ( $c, $action ) = @_;
-
-                if ( $c->user->mojo > 50 ) {
-                    die $ALLOWED;
-                } else {
-                    die $DENIED;
-                }
-            }
-        );
-
-HANDLING DENIAL
-    There are two plugin methods that can be called when a rule makes a
-    decision about an action:
-
-    acl_access_allowed
-        A no-op
-
-    acl_access_denied
-        Looks for a private action named "access_denied" from the denied
-        action's controller and outwards (much like "auto"), and if none is
-        found throws an access denied exception.
-
-    forcibly_allow_access
-        Within an "access_denied" action this will immediately cause the
-        blocked action to be executed anyway.
-
-    This means that you have several alternatives:
-
-  Provide an "access_denied" action
-        package MyApp::Controller::Foo;
-
-        sub access_denied : Private {
-            my ( $self, $c, $action ) = @_;
-
-            ...
-            $c->forcibly_allow_access
-                if $you->mean_it eq "really";
-        }
-
-    If you call "forcibly_allow_access" then the blocked action will be
-    immediately unblocked. Otherwise the execution of the action will cease,
-    and return to it's caller or end.
-
-  Cleanup in "end"
-        sub end : Private {
-            my ( $self, $c ) = @_;
-
-            if ( $c->error and $c->error->[-1] eq "access denied" ) {
-                $c->error(0); # clear the error
-
-                # access denied
-            } else {
-                # normal end
-            }
-        }
-
-  Override the plugin event handler methods
-        package MyApp;
-
-        sub acl_access_allowed {
-            my ( $c, $class, $action ) = @_;
-            ...
-        }
-
-        sub acl_access_denied {
-            my ( $c, $class, $action, $err ) = @_;
-            ...
-        }
-
-    $class is the controller class the $action object was going to be
-    executed in, and $err is the exception cought during rule evaluation, if
-    any (access is denied if a rule raises an exception).
-
-SEE ALSO
-    Catalyst::Plugin::Authentication,
-    Catalyst::Plugin::Authorization::Roles,
-    <http://catalyst.perl.org/calendar/2005/24>
-
-AUTHOR
-    Yuval Kogman <nothingmuch at woobling.org>
-
-CONTRIBUTORS
-    castaway: Jess Robinson
-
-    caelum: Rafael Kitover <rkitover at cpan.org>
-
-COPYRIGHT & LICENSE
-    Copyright (c) 2008,2009 the aforementioned authors.
-
-    This library is free software; you can redistribute it and/or modify it
-    under the same terms as Perl itself.
-
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/TODO b/sources/Catalyst-Plugin-Authorization-ACL/TODO
deleted file mode 100644
index e19477b..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/TODO
+++ /dev/null
@@ -1,22 +0,0 @@
-Need to rewrite ACL/Engiine to get rid of Dispatcher::tree warning:
-
-02:04 <@t0m> Caelum: split the path, call get_containers, call get_action on them.. Something like that..
-02:05 <@t0m> Caelum: They're gonna delegate to methods on the tree anway under the hood, but the tree should be an implementation detail as far as you're concerned.
-02:05 <@t0m> Or, just document how to do it write with Chained, and mark ACL as deprecated :)
-
-Check for any role...earlier on RT:
-
-> If you want to check for either role, do something like this, described in "Flexible Rules":
-> 
-> use Catalyst::Plugin::Authorization::ACL::Engine qw/$ALLOWED $DENIED/;
-> 
-> __PACAKGE__->deny_access_unless( "/foo/bar", sub {
->     my ($c, $action) = @_;
->     if ($c->check_any_user_role(qw/admin user/)) {
->         die $ALLOWED;
->     } else {
->         die $DENIED;
->     }
-> } );
-> 
-> Perhaps we should have a syntax to make this easier?
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/AutoInstall.pm b/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/AutoInstall.pm
deleted file mode 100644
index dfb8ef7..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/AutoInstall.pm
+++ /dev/null
@@ -1,805 +0,0 @@
-#line 1
-package Module::AutoInstall;
-
-use strict;
-use Cwd                 ();
-use ExtUtils::MakeMaker ();
-
-use vars qw{$VERSION};
-BEGIN {
-	$VERSION = '1.03';
-}
-
-# special map on pre-defined feature sets
-my %FeatureMap = (
-    ''      => 'Core Features',    # XXX: deprecated
-    '-core' => 'Core Features',
-);
-
-# various lexical flags
-my ( @Missing, @Existing,  %DisabledTests, $UnderCPAN,     $HasCPANPLUS );
-my (
-    $Config, $CheckOnly, $SkipInstall, $AcceptDefault, $TestOnly, $AllDeps
-);
-my ( $PostambleActions, $PostambleUsed );
-
-# See if it's a testing or non-interactive session
-_accept_default( $ENV{AUTOMATED_TESTING} or ! -t STDIN ); 
-_init();
-
-sub _accept_default {
-    $AcceptDefault = shift;
-}
-
-sub missing_modules {
-    return @Missing;
-}
-
-sub do_install {
-    __PACKAGE__->install(
-        [
-            $Config
-            ? ( UNIVERSAL::isa( $Config, 'HASH' ) ? %{$Config} : @{$Config} )
-            : ()
-        ],
-        @Missing,
-    );
-}
-
-# initialize various flags, and/or perform install
-sub _init {
-    foreach my $arg (
-        @ARGV,
-        split(
-            /[\s\t]+/,
-            $ENV{PERL_AUTOINSTALL} || $ENV{PERL_EXTUTILS_AUTOINSTALL} || ''
-        )
-      )
-    {
-        if ( $arg =~ /^--config=(.*)$/ ) {
-            $Config = [ split( ',', $1 ) ];
-        }
-        elsif ( $arg =~ /^--installdeps=(.*)$/ ) {
-            __PACKAGE__->install( $Config, @Missing = split( /,/, $1 ) );
-            exit 0;
-        }
-        elsif ( $arg =~ /^--default(?:deps)?$/ ) {
-            $AcceptDefault = 1;
-        }
-        elsif ( $arg =~ /^--check(?:deps)?$/ ) {
-            $CheckOnly = 1;
-        }
-        elsif ( $arg =~ /^--skip(?:deps)?$/ ) {
-            $SkipInstall = 1;
-        }
-        elsif ( $arg =~ /^--test(?:only)?$/ ) {
-            $TestOnly = 1;
-        }
-        elsif ( $arg =~ /^--all(?:deps)?$/ ) {
-            $AllDeps = 1;
-        }
-    }
-}
-
-# overrides MakeMaker's prompt() to automatically accept the default choice
-sub _prompt {
-    goto &ExtUtils::MakeMaker::prompt unless $AcceptDefault;
-
-    my ( $prompt, $default ) = @_;
-    my $y = ( $default =~ /^[Yy]/ );
-
-    print $prompt, ' [', ( $y ? 'Y' : 'y' ), '/', ( $y ? 'n' : 'N' ), '] ';
-    print "$default\n";
-    return $default;
-}
-
-# the workhorse
-sub import {
-    my $class = shift;
-    my @args  = @_ or return;
-    my $core_all;
-
-    print "*** $class version " . $class->VERSION . "\n";
-    print "*** Checking for Perl dependencies...\n";
-
-    my $cwd = Cwd::cwd();
-
-    $Config = [];
-
-    my $maxlen = length(
-        (
-            sort   { length($b) <=> length($a) }
-              grep { /^[^\-]/ }
-              map  {
-                ref($_)
-                  ? ( ( ref($_) eq 'HASH' ) ? keys(%$_) : @{$_} )
-                  : ''
-              }
-              map { +{@args}->{$_} }
-              grep { /^[^\-]/ or /^-core$/i } keys %{ +{@args} }
-        )[0]
-    );
-
-    # We want to know if we're under CPAN early to avoid prompting, but
-    # if we aren't going to try and install anything anyway then skip the
-    # check entirely since we don't want to have to load (and configure)
-    # an old CPAN just for a cosmetic message
-
-    $UnderCPAN = _check_lock(1) unless $SkipInstall;
-
-    while ( my ( $feature, $modules ) = splice( @args, 0, 2 ) ) {
-        my ( @required, @tests, @skiptests );
-        my $default  = 1;
-        my $conflict = 0;
-
-        if ( $feature =~ m/^-(\w+)$/ ) {
-            my $option = lc($1);
-
-            # check for a newer version of myself
-            _update_to( $modules, @_ ) and return if $option eq 'version';
-
-            # sets CPAN configuration options
-            $Config = $modules if $option eq 'config';
-
-            # promote every features to core status
-            $core_all = ( $modules =~ /^all$/i ) and next
-              if $option eq 'core';
-
-            next unless $option eq 'core';
-        }
-
-        print "[" . ( $FeatureMap{ lc($feature) } || $feature ) . "]\n";
-
-        $modules = [ %{$modules} ] if UNIVERSAL::isa( $modules, 'HASH' );
-
-        unshift @$modules, -default => &{ shift(@$modules) }
-          if ( ref( $modules->[0] ) eq 'CODE' );    # XXX: bugward combatability
-
-        while ( my ( $mod, $arg ) = splice( @$modules, 0, 2 ) ) {
-            if ( $mod =~ m/^-(\w+)$/ ) {
-                my $option = lc($1);
-
-                $default   = $arg    if ( $option eq 'default' );
-                $conflict  = $arg    if ( $option eq 'conflict' );
-                @tests     = @{$arg} if ( $option eq 'tests' );
-                @skiptests = @{$arg} if ( $option eq 'skiptests' );
-
-                next;
-            }
-
-            printf( "- %-${maxlen}s ...", $mod );
-
-            if ( $arg and $arg =~ /^\D/ ) {
-                unshift @$modules, $arg;
-                $arg = 0;
-            }
-
-            # XXX: check for conflicts and uninstalls(!) them.
-            my $cur = _load($mod);
-            if (_version_cmp ($cur, $arg) >= 0)
-            {
-                print "loaded. ($cur" . ( $arg ? " >= $arg" : '' ) . ")\n";
-                push @Existing, $mod => $arg;
-                $DisabledTests{$_} = 1 for map { glob($_) } @skiptests;
-            }
-            else {
-                if (not defined $cur)   # indeed missing
-                {
-                    print "missing." . ( $arg ? " (would need $arg)" : '' ) . "\n";
-                }
-                else
-                {
-                    # no need to check $arg as _version_cmp ($cur, undef) would satisfy >= above
-                    print "too old. ($cur < $arg)\n";
-                }
-
-                push @required, $mod => $arg;
-            }
-        }
-
-        next unless @required;
-
-        my $mandatory = ( $feature eq '-core' or $core_all );
-
-        if (
-            !$SkipInstall
-            and (
-                $CheckOnly
-                or ($mandatory and $UnderCPAN)
-                or $AllDeps
-                or _prompt(
-                    qq{==> Auto-install the }
-                      . ( @required / 2 )
-                      . ( $mandatory ? ' mandatory' : ' optional' )
-                      . qq{ module(s) from CPAN?},
-                    $default ? 'y' : 'n',
-                ) =~ /^[Yy]/
-            )
-          )
-        {
-            push( @Missing, @required );
-            $DisabledTests{$_} = 1 for map { glob($_) } @skiptests;
-        }
-
-        elsif ( !$SkipInstall
-            and $default
-            and $mandatory
-            and
-            _prompt( qq{==> The module(s) are mandatory! Really skip?}, 'n', )
-            =~ /^[Nn]/ )
-        {
-            push( @Missing, @required );
-            $DisabledTests{$_} = 1 for map { glob($_) } @skiptests;
-        }
-
-        else {
-            $DisabledTests{$_} = 1 for map { glob($_) } @tests;
-        }
-    }
-
-    if ( @Missing and not( $CheckOnly or $UnderCPAN ) ) {
-        require Config;
-        print
-"*** Dependencies will be installed the next time you type '$Config::Config{make}'.\n";
-
-        # make an educated guess of whether we'll need root permission.
-        print "    (You may need to do that as the 'root' user.)\n"
-          if eval '$>';
-    }
-    print "*** $class configuration finished.\n";
-
-    chdir $cwd;
-
-    # import to main::
-    no strict 'refs';
-    *{'main::WriteMakefile'} = \&Write if caller(0) eq 'main';
-}
-
-sub _running_under {
-    my $thing = shift;
-    print <<"END_MESSAGE";
-*** Since we're running under ${thing}, I'll just let it take care
-    of the dependency's installation later.
-END_MESSAGE
-    return 1;
-}
-
-# Check to see if we are currently running under CPAN.pm and/or CPANPLUS;
-# if we are, then we simply let it taking care of our dependencies
-sub _check_lock {
-    return unless @Missing or @_;
-
-    my $cpan_env = $ENV{PERL5_CPAN_IS_RUNNING};
-
-    if ($ENV{PERL5_CPANPLUS_IS_RUNNING}) {
-        return _running_under($cpan_env ? 'CPAN' : 'CPANPLUS');
-    }
-
-    require CPAN;
-
-    if ($CPAN::VERSION > '1.89') {
-        if ($cpan_env) {
-            return _running_under('CPAN');
-        }
-        return; # CPAN.pm new enough, don't need to check further
-    }
-
-    # last ditch attempt, this -will- configure CPAN, very sorry
-
-    _load_cpan(1); # force initialize even though it's already loaded
-
-    # Find the CPAN lock-file
-    my $lock = MM->catfile( $CPAN::Config->{cpan_home}, ".lock" );
-    return unless -f $lock;
-
-    # Check the lock
-    local *LOCK;
-    return unless open(LOCK, $lock);
-
-    if (
-            ( $^O eq 'MSWin32' ? _under_cpan() : <LOCK> == getppid() )
-        and ( $CPAN::Config->{prerequisites_policy} || '' ) ne 'ignore'
-    ) {
-        print <<'END_MESSAGE';
-
-*** Since we're running under CPAN, I'll just let it take care
-    of the dependency's installation later.
-END_MESSAGE
-        return 1;
-    }
-
-    close LOCK;
-    return;
-}
-
-sub install {
-    my $class = shift;
-
-    my $i;    # used below to strip leading '-' from config keys
-    my @config = ( map { s/^-// if ++$i; $_ } @{ +shift } );
-
-    my ( @modules, @installed );
-    while ( my ( $pkg, $ver ) = splice( @_, 0, 2 ) ) {
-
-        # grep out those already installed
-        if ( _version_cmp( _load($pkg), $ver ) >= 0 ) {
-            push @installed, $pkg;
-        }
-        else {
-            push @modules, $pkg, $ver;
-        }
-    }
-
-    return @installed unless @modules;  # nothing to do
-    return @installed if _check_lock(); # defer to the CPAN shell
-
-    print "*** Installing dependencies...\n";
-
-    return unless _connected_to('cpan.org');
-
-    my %args = @config;
-    my %failed;
-    local *FAILED;
-    if ( $args{do_once} and open( FAILED, '.#autoinstall.failed' ) ) {
-        while (<FAILED>) { chomp; $failed{$_}++ }
-        close FAILED;
-
-        my @newmod;
-        while ( my ( $k, $v ) = splice( @modules, 0, 2 ) ) {
-            push @newmod, ( $k => $v ) unless $failed{$k};
-        }
-        @modules = @newmod;
-    }
-
-    if ( _has_cpanplus() and not $ENV{PERL_AUTOINSTALL_PREFER_CPAN} ) {
-        _install_cpanplus( \@modules, \@config );
-    } else {
-        _install_cpan( \@modules, \@config );
-    }
-
-    print "*** $class installation finished.\n";
-
-    # see if we have successfully installed them
-    while ( my ( $pkg, $ver ) = splice( @modules, 0, 2 ) ) {
-        if ( _version_cmp( _load($pkg), $ver ) >= 0 ) {
-            push @installed, $pkg;
-        }
-        elsif ( $args{do_once} and open( FAILED, '>> .#autoinstall.failed' ) ) {
-            print FAILED "$pkg\n";
-        }
-    }
-
-    close FAILED if $args{do_once};
-
-    return @installed;
-}
-
-sub _install_cpanplus {
-    my @modules   = @{ +shift };
-    my @config    = _cpanplus_config( @{ +shift } );
-    my $installed = 0;
-
-    require CPANPLUS::Backend;
-    my $cp   = CPANPLUS::Backend->new;
-    my $conf = $cp->configure_object;
-
-    return unless $conf->can('conf') # 0.05x+ with "sudo" support
-               or _can_write($conf->_get_build('base'));  # 0.04x
-
-    # if we're root, set UNINST=1 to avoid trouble unless user asked for it.
-    my $makeflags = $conf->get_conf('makeflags') || '';
-    if ( UNIVERSAL::isa( $makeflags, 'HASH' ) ) {
-        # 0.03+ uses a hashref here
-        $makeflags->{UNINST} = 1 unless exists $makeflags->{UNINST};
-
-    } else {
-        # 0.02 and below uses a scalar
-        $makeflags = join( ' ', split( ' ', $makeflags ), 'UNINST=1' )
-          if ( $makeflags !~ /\bUNINST\b/ and eval qq{ $> eq '0' } );
-
-    }
-    $conf->set_conf( makeflags => $makeflags );
-    $conf->set_conf( prereqs   => 1 );
-
-    
-
-    while ( my ( $key, $val ) = splice( @config, 0, 2 ) ) {
-        $conf->set_conf( $key, $val );
-    }
-
-    my $modtree = $cp->module_tree;
-    while ( my ( $pkg, $ver ) = splice( @modules, 0, 2 ) ) {
-        print "*** Installing $pkg...\n";
-
-        MY::preinstall( $pkg, $ver ) or next if defined &MY::preinstall;
-
-        my $success;
-        my $obj = $modtree->{$pkg};
-
-        if ( $obj and _version_cmp( $obj->{version}, $ver ) >= 0 ) {
-            my $pathname = $pkg;
-            $pathname =~ s/::/\\W/;
-
-            foreach my $inc ( grep { m/$pathname.pm/i } keys(%INC) ) {
-                delete $INC{$inc};
-            }
-
-            my $rv = $cp->install( modules => [ $obj->{module} ] );
-
-            if ( $rv and ( $rv->{ $obj->{module} } or $rv->{ok} ) ) {
-                print "*** $pkg successfully installed.\n";
-                $success = 1;
-            } else {
-                print "*** $pkg installation cancelled.\n";
-                $success = 0;
-            }
-
-            $installed += $success;
-        } else {
-            print << ".";
-*** Could not find a version $ver or above for $pkg; skipping.
-.
-        }
-
-        MY::postinstall( $pkg, $ver, $success ) if defined &MY::postinstall;
-    }
-
-    return $installed;
-}
-
-sub _cpanplus_config {
-	my @config = ();
-	while ( @_ ) {
-		my ($key, $value) = (shift(), shift());
-		if ( $key eq 'prerequisites_policy' ) {
-			if ( $value eq 'follow' ) {
-				$value = CPANPLUS::Internals::Constants::PREREQ_INSTALL();
-			} elsif ( $value eq 'ask' ) {
-				$value = CPANPLUS::Internals::Constants::PREREQ_ASK();
-			} elsif ( $value eq 'ignore' ) {
-				$value = CPANPLUS::Internals::Constants::PREREQ_IGNORE();
-			} else {
-				die "*** Cannot convert option $key = '$value' to CPANPLUS version.\n";
-			}
-		} else {
-			die "*** Cannot convert option $key to CPANPLUS version.\n";
-		}
-	}
-	return @config;
-}
-
-sub _install_cpan {
-    my @modules   = @{ +shift };
-    my @config    = @{ +shift };
-    my $installed = 0;
-    my %args;
-
-    _load_cpan();
-    require Config;
-
-    if (CPAN->VERSION < 1.80) {
-        # no "sudo" support, probe for writableness
-        return unless _can_write( MM->catfile( $CPAN::Config->{cpan_home}, 'sources' ) )
-                  and _can_write( $Config::Config{sitelib} );
-    }
-
-    # if we're root, set UNINST=1 to avoid trouble unless user asked for it.
-    my $makeflags = $CPAN::Config->{make_install_arg} || '';
-    $CPAN::Config->{make_install_arg} =
-      join( ' ', split( ' ', $makeflags ), 'UNINST=1' )
-      if ( $makeflags !~ /\bUNINST\b/ and eval qq{ $> eq '0' } );
-
-    # don't show start-up info
-    $CPAN::Config->{inhibit_startup_message} = 1;
-
-    # set additional options
-    while ( my ( $opt, $arg ) = splice( @config, 0, 2 ) ) {
-        ( $args{$opt} = $arg, next )
-          if $opt =~ /^force$/;    # pseudo-option
-        $CPAN::Config->{$opt} = $arg;
-    }
-
-    local $CPAN::Config->{prerequisites_policy} = 'follow';
-
-    while ( my ( $pkg, $ver ) = splice( @modules, 0, 2 ) ) {
-        MY::preinstall( $pkg, $ver ) or next if defined &MY::preinstall;
-
-        print "*** Installing $pkg...\n";
-
-        my $obj     = CPAN::Shell->expand( Module => $pkg );
-        my $success = 0;
-
-        if ( $obj and _version_cmp( $obj->cpan_version, $ver ) >= 0 ) {
-            my $pathname = $pkg;
-            $pathname =~ s/::/\\W/;
-
-            foreach my $inc ( grep { m/$pathname.pm/i } keys(%INC) ) {
-                delete $INC{$inc};
-            }
-
-            my $rv = $args{force} ? CPAN::Shell->force( install => $pkg )
-                                  : CPAN::Shell->install($pkg);
-            $rv ||= eval {
-                $CPAN::META->instance( 'CPAN::Distribution', $obj->cpan_file, )
-                  ->{install}
-                  if $CPAN::META;
-            };
-
-            if ( $rv eq 'YES' ) {
-                print "*** $pkg successfully installed.\n";
-                $success = 1;
-            }
-            else {
-                print "*** $pkg installation failed.\n";
-                $success = 0;
-            }
-
-            $installed += $success;
-        }
-        else {
-            print << ".";
-*** Could not find a version $ver or above for $pkg; skipping.
-.
-        }
-
-        MY::postinstall( $pkg, $ver, $success ) if defined &MY::postinstall;
-    }
-
-    return $installed;
-}
-
-sub _has_cpanplus {
-    return (
-        $HasCPANPLUS = (
-            $INC{'CPANPLUS/Config.pm'}
-              or _load('CPANPLUS::Shell::Default')
-        )
-    );
-}
-
-# make guesses on whether we're under the CPAN installation directory
-sub _under_cpan {
-    require Cwd;
-    require File::Spec;
-
-    my $cwd  = File::Spec->canonpath( Cwd::cwd() );
-    my $cpan = File::Spec->canonpath( $CPAN::Config->{cpan_home} );
-
-    return ( index( $cwd, $cpan ) > -1 );
-}
-
-sub _update_to {
-    my $class = __PACKAGE__;
-    my $ver   = shift;
-
-    return
-      if _version_cmp( _load($class), $ver ) >= 0;  # no need to upgrade
-
-    if (
-        _prompt( "==> A newer version of $class ($ver) is required. Install?",
-            'y' ) =~ /^[Nn]/
-      )
-    {
-        die "*** Please install $class $ver manually.\n";
-    }
-
-    print << ".";
-*** Trying to fetch it from CPAN...
-.
-
-    # install ourselves
-    _load($class) and return $class->import(@_)
-      if $class->install( [], $class, $ver );
-
-    print << '.'; exit 1;
-
-*** Cannot bootstrap myself. :-( Installation terminated.
-.
-}
-
-# check if we're connected to some host, using inet_aton
-sub _connected_to {
-    my $site = shift;
-
-    return (
-        ( _load('Socket') and Socket::inet_aton($site) ) or _prompt(
-            qq(
-*** Your host cannot resolve the domain name '$site', which
-    probably means the Internet connections are unavailable.
-==> Should we try to install the required module(s) anyway?), 'n'
-          ) =~ /^[Yy]/
-    );
-}
-
-# check if a directory is writable; may create it on demand
-sub _can_write {
-    my $path = shift;
-    mkdir( $path, 0755 ) unless -e $path;
-
-    return 1 if -w $path;
-
-    print << ".";
-*** You are not allowed to write to the directory '$path';
-    the installation may fail due to insufficient permissions.
-.
-
-    if (
-        eval '$>' and lc(`sudo -V`) =~ /version/ and _prompt(
-            qq(
-==> Should we try to re-execute the autoinstall process with 'sudo'?),
-            ((-t STDIN) ? 'y' : 'n')
-        ) =~ /^[Yy]/
-      )
-    {
-
-        # try to bootstrap ourselves from sudo
-        print << ".";
-*** Trying to re-execute the autoinstall process with 'sudo'...
-.
-        my $missing = join( ',', @Missing );
-        my $config = join( ',',
-            UNIVERSAL::isa( $Config, 'HASH' ) ? %{$Config} : @{$Config} )
-          if $Config;
-
-        return
-          unless system( 'sudo', $^X, $0, "--config=$config",
-            "--installdeps=$missing" );
-
-        print << ".";
-*** The 'sudo' command exited with error!  Resuming...
-.
-    }
-
-    return _prompt(
-        qq(
-==> Should we try to install the required module(s) anyway?), 'n'
-    ) =~ /^[Yy]/;
-}
-
-# load a module and return the version it reports
-sub _load {
-    my $mod  = pop;    # class/instance doesn't matter
-    my $file = $mod;
-
-    $file =~ s|::|/|g;
-    $file .= '.pm';
-
-    local $@;
-    return eval { require $file; $mod->VERSION } || ( $@ ? undef: 0 );
-}
-
-# Load CPAN.pm and it's configuration
-sub _load_cpan {
-    return if $CPAN::VERSION and $CPAN::Config and not @_;
-    require CPAN;
-    if ( $CPAN::HandleConfig::VERSION ) {
-        # Newer versions of CPAN have a HandleConfig module
-        CPAN::HandleConfig->load;
-    } else {
-    	# Older versions had the load method in Config directly
-        CPAN::Config->load;
-    }
-}
-
-# compare two versions, either use Sort::Versions or plain comparison
-# return values same as <=>
-sub _version_cmp {
-    my ( $cur, $min ) = @_;
-    return -1 unless defined $cur;  # if 0 keep comparing
-    return 1 unless $min;
-
-    $cur =~ s/\s+$//;
-
-    # check for version numbers that are not in decimal format
-    if ( ref($cur) or ref($min) or $cur =~ /v|\..*\./ or $min =~ /v|\..*\./ ) {
-        if ( ( $version::VERSION or defined( _load('version') )) and
-             version->can('new') 
-            ) {
-
-            # use version.pm if it is installed.
-            return version->new($cur) <=> version->new($min);
-        }
-        elsif ( $Sort::Versions::VERSION or defined( _load('Sort::Versions') ) )
-        {
-
-            # use Sort::Versions as the sorting algorithm for a.b.c versions
-            return Sort::Versions::versioncmp( $cur, $min );
-        }
-
-        warn "Cannot reliably compare non-decimal formatted versions.\n"
-          . "Please install version.pm or Sort::Versions.\n";
-    }
-
-    # plain comparison
-    local $^W = 0;    # shuts off 'not numeric' bugs
-    return $cur <=> $min;
-}
-
-# nothing; this usage is deprecated.
-sub main::PREREQ_PM { return {}; }
-
-sub _make_args {
-    my %args = @_;
-
-    $args{PREREQ_PM} = { %{ $args{PREREQ_PM} || {} }, @Existing, @Missing }
-      if $UnderCPAN or $TestOnly;
-
-    if ( $args{EXE_FILES} and -e 'MANIFEST' ) {
-        require ExtUtils::Manifest;
-        my $manifest = ExtUtils::Manifest::maniread('MANIFEST');
-
-        $args{EXE_FILES} =
-          [ grep { exists $manifest->{$_} } @{ $args{EXE_FILES} } ];
-    }
-
-    $args{test}{TESTS} ||= 't/*.t';
-    $args{test}{TESTS} = join( ' ',
-        grep { !exists( $DisabledTests{$_} ) }
-          map { glob($_) } split( /\s+/, $args{test}{TESTS} ) );
-
-    my $missing = join( ',', @Missing );
-    my $config =
-      join( ',', UNIVERSAL::isa( $Config, 'HASH' ) ? %{$Config} : @{$Config} )
-      if $Config;
-
-    $PostambleActions = (
-        ($missing and not $UnderCPAN)
-        ? "\$(PERL) $0 --config=$config --installdeps=$missing"
-        : "\$(NOECHO) \$(NOOP)"
-    );
-
-    return %args;
-}
-
-# a wrapper to ExtUtils::MakeMaker::WriteMakefile
-sub Write {
-    require Carp;
-    Carp::croak "WriteMakefile: Need even number of args" if @_ % 2;
-
-    if ($CheckOnly) {
-        print << ".";
-*** Makefile not written in check-only mode.
-.
-        return;
-    }
-
-    my %args = _make_args(@_);
-
-    no strict 'refs';
-
-    $PostambleUsed = 0;
-    local *MY::postamble = \&postamble unless defined &MY::postamble;
-    ExtUtils::MakeMaker::WriteMakefile(%args);
-
-    print << "." unless $PostambleUsed;
-*** WARNING: Makefile written with customized MY::postamble() without
-    including contents from Module::AutoInstall::postamble() --
-    auto installation features disabled.  Please contact the author.
-.
-
-    return 1;
-}
-
-sub postamble {
-    $PostambleUsed = 1;
-
-    return <<"END_MAKE";
-
-config :: installdeps
-\t\$(NOECHO) \$(NOOP)
-
-checkdeps ::
-\t\$(PERL) $0 --checkdeps
-
-installdeps ::
-\t$PostambleActions
-
-END_MAKE
-
-}
-
-1;
-
-__END__
-
-#line 1056
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install.pm b/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install.pm
deleted file mode 100644
index 51eda5d..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install.pm
+++ /dev/null
@@ -1,430 +0,0 @@
-#line 1
-package Module::Install;
-
-# For any maintainers:
-# The load order for Module::Install is a bit magic.
-# It goes something like this...
-#
-# IF ( host has Module::Install installed, creating author mode ) {
-#     1. Makefile.PL calls "use inc::Module::Install"
-#     2. $INC{inc/Module/Install.pm} set to installed version of inc::Module::Install
-#     3. The installed version of inc::Module::Install loads
-#     4. inc::Module::Install calls "require Module::Install"
-#     5. The ./inc/ version of Module::Install loads
-# } ELSE {
-#     1. Makefile.PL calls "use inc::Module::Install"
-#     2. $INC{inc/Module/Install.pm} set to ./inc/ version of Module::Install
-#     3. The ./inc/ version of Module::Install loads
-# }
-
-use 5.005;
-use strict 'vars';
-
-use vars qw{$VERSION $MAIN};
-BEGIN {
-	# All Module::Install core packages now require synchronised versions.
-	# This will be used to ensure we don't accidentally load old or
-	# different versions of modules.
-	# This is not enforced yet, but will be some time in the next few
-	# releases once we can make sure it won't clash with custom
-	# Module::Install extensions.
-	$VERSION = '0.91';
-
-	# Storage for the pseudo-singleton
-	$MAIN    = undef;
-
-	*inc::Module::Install::VERSION = *VERSION;
-	@inc::Module::Install::ISA     = __PACKAGE__;
-
-}
-
-
-
-
-
-# Whether or not inc::Module::Install is actually loaded, the
-# $INC{inc/Module/Install.pm} is what will still get set as long as
-# the caller loaded module this in the documented manner.
-# If not set, the caller may NOT have loaded the bundled version, and thus
-# they may not have a MI version that works with the Makefile.PL. This would
-# result in false errors or unexpected behaviour. And we don't want that.
-my $file = join( '/', 'inc', split /::/, __PACKAGE__ ) . '.pm';
-unless ( $INC{$file} ) { die <<"END_DIE" }
-
-Please invoke ${\__PACKAGE__} with:
-
-	use inc::${\__PACKAGE__};
-
-not:
-
-	use ${\__PACKAGE__};
-
-END_DIE
-
-
-
-
-
-# If the script that is loading Module::Install is from the future,
-# then make will detect this and cause it to re-run over and over
-# again. This is bad. Rather than taking action to touch it (which
-# is unreliable on some platforms and requires write permissions)
-# for now we should catch this and refuse to run.
-if ( -f $0 ) {
-	my $s = (stat($0))[9];
-
-	# If the modification time is only slightly in the future,
-	# sleep briefly to remove the problem.
-	my $a = $s - time;
-	if ( $a > 0 and $a < 5 ) { sleep 5 }
-
-	# Too far in the future, throw an error.
-	my $t = time;
-	if ( $s > $t ) { die <<"END_DIE" }
-
-Your installer $0 has a modification time in the future ($s > $t).
-
-This is known to create infinite loops in make.
-
-Please correct this, then run $0 again.
-
-END_DIE
-}
-
-
-
-
-
-# Build.PL was formerly supported, but no longer is due to excessive
-# difficulty in implementing every single feature twice.
-if ( $0 =~ /Build.PL$/i ) { die <<"END_DIE" }
-
-Module::Install no longer supports Build.PL.
-
-It was impossible to maintain duel backends, and has been deprecated.
-
-Please remove all Build.PL files and only use the Makefile.PL installer.
-
-END_DIE
-
-
-
-
-
-# To save some more typing in Module::Install installers, every...
-# use inc::Module::Install
-# ...also acts as an implicit use strict.
-$^H |= strict::bits(qw(refs subs vars));
-
-
-
-
-
-use Cwd        ();
-use File::Find ();
-use File::Path ();
-use FindBin;
-
-sub autoload {
-	my $self = shift;
-	my $who  = $self->_caller;
-	my $cwd  = Cwd::cwd();
-	my $sym  = "${who}::AUTOLOAD";
-	$sym->{$cwd} = sub {
-		my $pwd = Cwd::cwd();
-		if ( my $code = $sym->{$pwd} ) {
-			# Delegate back to parent dirs
-			goto &$code unless $cwd eq $pwd;
-		}
-		$$sym =~ /([^:]+)$/ or die "Cannot autoload $who - $sym";
-		my $method = $1;
-		if ( uc($method) eq $method ) {
-			# Do nothing
-			return;
-		} elsif ( $method =~ /^_/ and $self->can($method) ) {
-			# Dispatch to the root M:I class
-			return $self->$method(@_);
-		}
-
-		# Dispatch to the appropriate plugin
-		unshift @_, ( $self, $1 );
-		goto &{$self->can('call')};
-	};
-}
-
-sub import {
-	my $class = shift;
-	my $self  = $class->new(@_);
-	my $who   = $self->_caller;
-
-	unless ( -f $self->{file} ) {
-		require "$self->{path}/$self->{dispatch}.pm";
-		File::Path::mkpath("$self->{prefix}/$self->{author}");
-		$self->{admin} = "$self->{name}::$self->{dispatch}"->new( _top => $self );
-		$self->{admin}->init;
-		@_ = ($class, _self => $self);
-		goto &{"$self->{name}::import"};
-	}
-
-	*{"${who}::AUTOLOAD"} = $self->autoload;
-	$self->preload;
-
-	# Unregister loader and worker packages so subdirs can use them again
-	delete $INC{"$self->{file}"};
-	delete $INC{"$self->{path}.pm"};
-
-	# Save to the singleton
-	$MAIN = $self;
-
-	return 1;
-}
-
-sub preload {
-	my $self = shift;
-	unless ( $self->{extensions} ) {
-		$self->load_extensions(
-			"$self->{prefix}/$self->{path}", $self
-		);
-	}
-
-	my @exts = @{$self->{extensions}};
-	unless ( @exts ) {
-		@exts = $self->{admin}->load_all_extensions;
-	}
-
-	my %seen;
-	foreach my $obj ( @exts ) {
-		while (my ($method, $glob) = each %{ref($obj) . '::'}) {
-			next unless $obj->can($method);
-			next if $method =~ /^_/;
-			next if $method eq uc($method);
-			$seen{$method}++;
-		}
-	}
-
-	my $who = $self->_caller;
-	foreach my $name ( sort keys %seen ) {
-		*{"${who}::$name"} = sub {
-			${"${who}::AUTOLOAD"} = "${who}::$name";
-			goto &{"${who}::AUTOLOAD"};
-		};
-	}
-}
-
-sub new {
-	my ($class, %args) = @_;
-
-	# ignore the prefix on extension modules built from top level.
-	my $base_path = Cwd::abs_path($FindBin::Bin);
-	unless ( Cwd::abs_path(Cwd::cwd()) eq $base_path ) {
-		delete $args{prefix};
-	}
-
-	return $args{_self} if $args{_self};
-
-	$args{dispatch} ||= 'Admin';
-	$args{prefix}   ||= 'inc';
-	$args{author}   ||= ($^O eq 'VMS' ? '_author' : '.author');
-	$args{bundle}   ||= 'inc/BUNDLES';
-	$args{base}     ||= $base_path;
-	$class =~ s/^\Q$args{prefix}\E:://;
-	$args{name}     ||= $class;
-	$args{version}  ||= $class->VERSION;
-	unless ( $args{path} ) {
-		$args{path}  = $args{name};
-		$args{path}  =~ s!::!/!g;
-	}
-	$args{file}     ||= "$args{base}/$args{prefix}/$args{path}.pm";
-	$args{wrote}      = 0;
-
-	bless( \%args, $class );
-}
-
-sub call {
-	my ($self, $method) = @_;
-	my $obj = $self->load($method) or return;
-        splice(@_, 0, 2, $obj);
-	goto &{$obj->can($method)};
-}
-
-sub load {
-	my ($self, $method) = @_;
-
-	$self->load_extensions(
-		"$self->{prefix}/$self->{path}", $self
-	) unless $self->{extensions};
-
-	foreach my $obj (@{$self->{extensions}}) {
-		return $obj if $obj->can($method);
-	}
-
-	my $admin = $self->{admin} or die <<"END_DIE";
-The '$method' method does not exist in the '$self->{prefix}' path!
-Please remove the '$self->{prefix}' directory and run $0 again to load it.
-END_DIE
-
-	my $obj = $admin->load($method, 1);
-	push @{$self->{extensions}}, $obj;
-
-	$obj;
-}
-
-sub load_extensions {
-	my ($self, $path, $top) = @_;
-
-	unless ( grep { ! ref $_ and lc $_ eq lc $self->{prefix} } @INC ) {
-		unshift @INC, $self->{prefix};
-	}
-
-	foreach my $rv ( $self->find_extensions($path) ) {
-		my ($file, $pkg) = @{$rv};
-		next if $self->{pathnames}{$pkg};
-
-		local $@;
-		my $new = eval { require $file; $pkg->can('new') };
-		unless ( $new ) {
-			warn $@ if $@;
-			next;
-		}
-		$self->{pathnames}{$pkg} = delete $INC{$file};
-		push @{$self->{extensions}}, &{$new}($pkg, _top => $top );
-	}
-
-	$self->{extensions} ||= [];
-}
-
-sub find_extensions {
-	my ($self, $path) = @_;
-
-	my @found;
-	File::Find::find( sub {
-		my $file = $File::Find::name;
-		return unless $file =~ m!^\Q$path\E/(.+)\.pm\Z!is;
-		my $subpath = $1;
-		return if lc($subpath) eq lc($self->{dispatch});
-
-		$file = "$self->{path}/$subpath.pm";
-		my $pkg = "$self->{name}::$subpath";
-		$pkg =~ s!/!::!g;
-
-		# If we have a mixed-case package name, assume case has been preserved
-		# correctly.  Otherwise, root through the file to locate the case-preserved
-		# version of the package name.
-		if ( $subpath eq lc($subpath) || $subpath eq uc($subpath) ) {
-			my $content = Module::Install::_read($subpath . '.pm');
-			my $in_pod  = 0;
-			foreach ( split //, $content ) {
-				$in_pod = 1 if /^=\w/;
-				$in_pod = 0 if /^=cut/;
-				next if ($in_pod || /^=cut/);  # skip pod text
-				next if /^\s*#/;               # and comments
-				if ( m/^\s*package\s+($pkg)\s*;/i ) {
-					$pkg = $1;
-					last;
-				}
-			}
-		}
-
-		push @found, [ $file, $pkg ];
-	}, $path ) if -d $path;
-
-	@found;
-}
-
-
-
-
-
-#####################################################################
-# Common Utility Functions
-
-sub _caller {
-	my $depth = 0;
-	my $call  = caller($depth);
-	while ( $call eq __PACKAGE__ ) {
-		$depth++;
-		$call = caller($depth);
-	}
-	return $call;
-}
-
-sub _read {
-	local *FH;
-	if ( $] >= 5.006 ) {
-		open( FH, '<', $_[0] ) or die "open($_[0]): $!";
-	} else {
-		open( FH, "< $_[0]"  ) or die "open($_[0]): $!";
-	}
-	my $string = do { local $/; <FH> };
-	close FH or die "close($_[0]): $!";
-	return $string;
-}
-
-sub _readperl {
-	my $string = Module::Install::_read($_[0]);
-	$string =~ s/(?:\015{1,2}\012|\015|\012)/\n/sg;
-	$string =~ s/(\n)\n*__(?:DATA|END)__\b.*\z/$1/s;
-	$string =~ s/\n\n=\w+.+?\n\n=cut\b.+?\n+/\n\n/sg;
-	return $string;
-}
-
-sub _readpod {
-	my $string = Module::Install::_read($_[0]);
-	$string =~ s/(?:\015{1,2}\012|\015|\012)/\n/sg;
-	return $string if $_[0] =~ /\.pod\z/;
-	$string =~ s/(^|\n=cut\b.+?\n+)[^=\s].+?\n(\n=\w+|\z)/$1$2/sg;
-	$string =~ s/\n*=pod\b[^\n]*\n+/\n\n/sg;
-	$string =~ s/\n*=cut\b[^\n]*\n+/\n\n/sg;
-	$string =~ s/^\n+//s;
-	return $string;
-}
-
-sub _write {
-	local *FH;
-	if ( $] >= 5.006 ) {
-		open( FH, '>', $_[0] ) or die "open($_[0]): $!";
-	} else {
-		open( FH, "> $_[0]"  ) or die "open($_[0]): $!";
-	}
-	foreach ( 1 .. $#_ ) {
-		print FH $_[$_] or die "print($_[0]): $!";
-	}
-	close FH or die "close($_[0]): $!";
-}
-
-# _version is for processing module versions (eg, 1.03_05) not
-# Perl versions (eg, 5.8.1).
-sub _version ($) {
-	my $s = shift || 0;
-	my $d =()= $s =~ /(\.)/g;
-	if ( $d >= 2 ) {
-		# Normalise multipart versions
-		$s =~ s/(\.)(\d{1,3})/sprintf("$1%03d",$2)/eg;
-	}
-	$s =~ s/^(\d+)\.?//;
-	my $l = $1 || 0;
-	my @v = map {
-		$_ . '0' x (3 - length $_)
-	} $s =~ /(\d{1,3})\D?/g;
-	$l = $l . '.' . join '', @v if @v;
-	return $l + 0;
-}
-
-sub _cmp ($$) {
-	_version($_[0]) <=> _version($_[1]);
-}
-
-# Cloned from Params::Util::_CLASS
-sub _CLASS ($) {
-	(
-		defined $_[0]
-		and
-		! ref $_[0]
-		and
-		$_[0] =~ m/^[^\W\d]\w*(?:::\w+)*\z/s
-	) ? $_[0] : undef;
-}
-
-1;
-
-# Copyright 2008 - 2009 Adam Kennedy.
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/AutoInstall.pm b/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/AutoInstall.pm
deleted file mode 100644
index 58dd026..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/AutoInstall.pm
+++ /dev/null
@@ -1,61 +0,0 @@
-#line 1
-package Module::Install::AutoInstall;
-
-use strict;
-use Module::Install::Base ();
-
-use vars qw{$VERSION @ISA $ISCORE};
-BEGIN {
-	$VERSION = '0.91';
-	@ISA     = 'Module::Install::Base';
-	$ISCORE  = 1;
-}
-
-sub AutoInstall { $_[0] }
-
-sub run {
-    my $self = shift;
-    $self->auto_install_now(@_);
-}
-
-sub write {
-    my $self = shift;
-    $self->auto_install(@_);
-}
-
-sub auto_install {
-    my $self = shift;
-    return if $self->{done}++;
-
-    # Flatten array of arrays into a single array
-    my @core = map @$_, map @$_, grep ref,
-               $self->build_requires, $self->requires;
-
-    my @config = @_;
-
-    # We'll need Module::AutoInstall
-    $self->include('Module::AutoInstall');
-    require Module::AutoInstall;
-
-    Module::AutoInstall->import(
-        (@config ? (-config => \@config) : ()),
-        (@core   ? (-core   => \@core)   : ()),
-        $self->features,
-    );
-
-    $self->makemaker_args( Module::AutoInstall::_make_args() );
-
-    my $class = ref($self);
-    $self->postamble(
-        "# --- $class section:\n" .
-        Module::AutoInstall::postamble()
-    );
-}
-
-sub auto_install_now {
-    my $self = shift;
-    $self->auto_install(@_);
-    Module::AutoInstall::do_install();
-}
-
-1;
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/Base.pm b/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/Base.pm
deleted file mode 100644
index 60a74d2..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/Base.pm
+++ /dev/null
@@ -1,78 +0,0 @@
-#line 1
-package Module::Install::Base;
-
-use strict 'vars';
-use vars qw{$VERSION};
-BEGIN {
-	$VERSION = '0.91';
-}
-
-# Suspend handler for "redefined" warnings
-BEGIN {
-	my $w = $SIG{__WARN__};
-	$SIG{__WARN__} = sub { $w };
-}
-
-#line 42
-
-sub new {
-	my $class = shift;
-	unless ( defined &{"${class}::call"} ) {
-		*{"${class}::call"} = sub { shift->_top->call(@_) };
-	}
-	unless ( defined &{"${class}::load"} ) {
-		*{"${class}::load"} = sub { shift->_top->load(@_) };
-	}
-	bless { @_ }, $class;
-}
-
-#line 61
-
-sub AUTOLOAD {
-	local $@;
-	my $func = eval { shift->_top->autoload } or return;
-	goto &$func;
-}
-
-#line 75
-
-sub _top {
-	$_[0]->{_top};
-}
-
-#line 90
-
-sub admin {
-	$_[0]->_top->{admin}
-	or
-	Module::Install::Base::FakeAdmin->new;
-}
-
-#line 106
-
-sub is_admin {
-	$_[0]->admin->VERSION;
-}
-
-sub DESTROY {}
-
-package Module::Install::Base::FakeAdmin;
-
-my $fake;
-
-sub new {
-	$fake ||= bless(\@_, $_[0]);
-}
-
-sub AUTOLOAD {}
-
-sub DESTROY {}
-
-# Restore warning handler
-BEGIN {
-	$SIG{__WARN__} = $SIG{__WARN__}->();
-}
-
-1;
-
-#line 154
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/Can.pm b/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/Can.pm
deleted file mode 100644
index e65e4f6..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/Can.pm
+++ /dev/null
@@ -1,81 +0,0 @@
-#line 1
-package Module::Install::Can;
-
-use strict;
-use Config                ();
-use File::Spec            ();
-use ExtUtils::MakeMaker   ();
-use Module::Install::Base ();
-
-use vars qw{$VERSION @ISA $ISCORE};
-BEGIN {
-	$VERSION = '0.91';
-	@ISA     = 'Module::Install::Base';
-	$ISCORE  = 1;
-}
-
-# check if we can load some module
-### Upgrade this to not have to load the module if possible
-sub can_use {
-	my ($self, $mod, $ver) = @_;
-	$mod =~ s{::|\\}{/}g;
-	$mod .= '.pm' unless $mod =~ /\.pm$/i;
-
-	my $pkg = $mod;
-	$pkg =~ s{/}{::}g;
-	$pkg =~ s{\.pm$}{}i;
-
-	local $@;
-	eval { require $mod; $pkg->VERSION($ver || 0); 1 };
-}
-
-# check if we can run some command
-sub can_run {
-	my ($self, $cmd) = @_;
-
-	my $_cmd = $cmd;
-	return $_cmd if (-x $_cmd or $_cmd = MM->maybe_command($_cmd));
-
-	for my $dir ((split /$Config::Config{path_sep}/, $ENV{PATH}), '.') {
-		next if $dir eq '';
-		my $abs = File::Spec->catfile($dir, $_[1]);
-		return $abs if (-x $abs or $abs = MM->maybe_command($abs));
-	}
-
-	return;
-}
-
-# can we locate a (the) C compiler
-sub can_cc {
-	my $self   = shift;
-	my @chunks = split(/ /, $Config::Config{cc}) or return;
-
-	# $Config{cc} may contain args; try to find out the program part
-	while (@chunks) {
-		return $self->can_run("@chunks") || (pop(@chunks), next);
-	}
-
-	return;
-}
-
-# Fix Cygwin bug on maybe_command();
-if ( $^O eq 'cygwin' ) {
-	require ExtUtils::MM_Cygwin;
-	require ExtUtils::MM_Win32;
-	if ( ! defined(&ExtUtils::MM_Cygwin::maybe_command) ) {
-		*ExtUtils::MM_Cygwin::maybe_command = sub {
-			my ($self, $file) = @_;
-			if ($file =~ m{^/cygdrive/}i and ExtUtils::MM_Win32->can('maybe_command')) {
-				ExtUtils::MM_Win32->maybe_command($file);
-			} else {
-				ExtUtils::MM_Unix->maybe_command($file);
-			}
-		}
-	}
-}
-
-1;
-
-__END__
-
-#line 156
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/Fetch.pm b/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/Fetch.pm
deleted file mode 100644
index 05f2079..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/Fetch.pm
+++ /dev/null
@@ -1,93 +0,0 @@
-#line 1
-package Module::Install::Fetch;
-
-use strict;
-use Module::Install::Base ();
-
-use vars qw{$VERSION @ISA $ISCORE};
-BEGIN {
-	$VERSION = '0.91';
-	@ISA     = 'Module::Install::Base';
-	$ISCORE  = 1;
-}
-
-sub get_file {
-    my ($self, %args) = @_;
-    my ($scheme, $host, $path, $file) =
-        $args{url} =~ m|^(\w+)://([^/]+)(.+)/(.+)| or return;
-
-    if ( $scheme eq 'http' and ! eval { require LWP::Simple; 1 } ) {
-        $args{url} = $args{ftp_url}
-            or (warn("LWP support unavailable!\n"), return);
-        ($scheme, $host, $path, $file) =
-            $args{url} =~ m|^(\w+)://([^/]+)(.+)/(.+)| or return;
-    }
-
-    $|++;
-    print "Fetching '$file' from $host... ";
-
-    unless (eval { require Socket; Socket::inet_aton($host) }) {
-        warn "'$host' resolve failed!\n";
-        return;
-    }
-
-    return unless $scheme eq 'ftp' or $scheme eq 'http';
-
-    require Cwd;
-    my $dir = Cwd::getcwd();
-    chdir $args{local_dir} or return if exists $args{local_dir};
-
-    if (eval { require LWP::Simple; 1 }) {
-        LWP::Simple::mirror($args{url}, $file);
-    }
-    elsif (eval { require Net::FTP; 1 }) { eval {
-        # use Net::FTP to get past firewall
-        my $ftp = Net::FTP->new($host, Passive => 1, Timeout => 600);
-        $ftp->login("anonymous", 'anonymous at example.com');
-        $ftp->cwd($path);
-        $ftp->binary;
-        $ftp->get($file) or (warn("$!\n"), return);
-        $ftp->quit;
-    } }
-    elsif (my $ftp = $self->can_run('ftp')) { eval {
-        # no Net::FTP, fallback to ftp.exe
-        require FileHandle;
-        my $fh = FileHandle->new;
-
-        local $SIG{CHLD} = 'IGNORE';
-        unless ($fh->open("|$ftp -n")) {
-            warn "Couldn't open ftp: $!\n";
-            chdir $dir; return;
-        }
-
-        my @dialog = split(/\n/, <<"END_FTP");
-open $host
-user anonymous anonymous\@example.com
-cd $path
-binary
-get $file $file
-quit
-END_FTP
-        foreach (@dialog) { $fh->print("$_\n") }
-        $fh->close;
-    } }
-    else {
-        warn "No working 'ftp' program available!\n";
-        chdir $dir; return;
-    }
-
-    unless (-f $file) {
-        warn "Fetching failed: $@\n";
-        chdir $dir; return;
-    }
-
-    return if exists $args{size} and -s $file != $args{size};
-    system($args{run}) if exists $args{run};
-    unlink($file) if $args{remove};
-
-    print(((!exists $args{check_for} or -e $args{check_for})
-        ? "done!" : "failed! ($!)"), "\n");
-    chdir $dir; return !$?;
-}
-
-1;
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/Include.pm b/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/Include.pm
deleted file mode 100644
index 7e792e0..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/Include.pm
+++ /dev/null
@@ -1,34 +0,0 @@
-#line 1
-package Module::Install::Include;
-
-use strict;
-use Module::Install::Base ();
-
-use vars qw{$VERSION @ISA $ISCORE};
-BEGIN {
-	$VERSION = '0.91';
-	@ISA     = 'Module::Install::Base';
-	$ISCORE  = 1;
-}
-
-sub include {
-	shift()->admin->include(@_);
-}
-
-sub include_deps {
-	shift()->admin->include_deps(@_);
-}
-
-sub auto_include {
-	shift()->admin->auto_include(@_);
-}
-
-sub auto_include_deps {
-	shift()->admin->auto_include_deps(@_);
-}
-
-sub auto_include_dependent_dists {
-	shift()->admin->auto_include_dependent_dists(@_);
-}
-
-1;
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/Makefile.pm b/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/Makefile.pm
deleted file mode 100644
index 98779db..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/Makefile.pm
+++ /dev/null
@@ -1,268 +0,0 @@
-#line 1
-package Module::Install::Makefile;
-
-use strict 'vars';
-use ExtUtils::MakeMaker   ();
-use Module::Install::Base ();
-
-use vars qw{$VERSION @ISA $ISCORE};
-BEGIN {
-	$VERSION = '0.91';
-	@ISA     = 'Module::Install::Base';
-	$ISCORE  = 1;
-}
-
-sub Makefile { $_[0] }
-
-my %seen = ();
-
-sub prompt {
-	shift;
-
-	# Infinite loop protection
-	my @c = caller();
-	if ( ++$seen{"$c[1]|$c[2]|$_[0]"} > 3 ) {
-		die "Caught an potential prompt infinite loop ($c[1]|$c[2]|$_[0])";
-	}
-
-	# In automated testing, always use defaults
-	if ( $ENV{AUTOMATED_TESTING} and ! $ENV{PERL_MM_USE_DEFAULT} ) {
-		local $ENV{PERL_MM_USE_DEFAULT} = 1;
-		goto &ExtUtils::MakeMaker::prompt;
-	} else {
-		goto &ExtUtils::MakeMaker::prompt;
-	}
-}
-
-sub makemaker_args {
-	my $self = shift;
-	my $args = ( $self->{makemaker_args} ||= {} );
-	%$args = ( %$args, @_ );
-	return $args;
-}
-
-# For mm args that take multiple space-seperated args,
-# append an argument to the current list.
-sub makemaker_append {
-	my $self = sShift;
-	my $name = shift;
-	my $args = $self->makemaker_args;
-	$args->{name} = defined $args->{$name}
-		? join( ' ', $args->{name}, @_ )
-		: join( ' ', @_ );
-}
-
-sub build_subdirs {
-	my $self    = shift;
-	my $subdirs = $self->makemaker_args->{DIR} ||= [];
-	for my $subdir (@_) {
-		push @$subdirs, $subdir;
-	}
-}
-
-sub clean_files {
-	my $self  = shift;
-	my $clean = $self->makemaker_args->{clean} ||= {};
-	  %$clean = (
-		%$clean,
-		FILES => join ' ', grep { length $_ } ($clean->{FILES} || (), @_),
-	);
-}
-
-sub realclean_files {
-	my $self      = shift;
-	my $realclean = $self->makemaker_args->{realclean} ||= {};
-	  %$realclean = (
-		%$realclean,
-		FILES => join ' ', grep { length $_ } ($realclean->{FILES} || (), @_),
-	);
-}
-
-sub libs {
-	my $self = shift;
-	my $libs = ref $_[0] ? shift : [ shift ];
-	$self->makemaker_args( LIBS => $libs );
-}
-
-sub inc {
-	my $self = shift;
-	$self->makemaker_args( INC => shift );
-}
-
-my %test_dir = ();
-
-sub _wanted_t {
-	/\.t$/ and -f $_ and $test_dir{$File::Find::dir} = 1;
-}
-
-sub tests_recursive {
-	my $self = shift;
-	if ( $self->tests ) {
-		die "tests_recursive will not work if tests are already defined";
-	}
-	my $dir = shift || 't';
-	unless ( -d $dir ) {
-		die "tests_recursive dir '$dir' does not exist";
-	}
-	%test_dir = ();
-	require File::Find;
-	File::Find::find( \&_wanted_t, $dir );
-	$self->tests( join ' ', map { "$_/*.t" } sort keys %test_dir );
-}
-
-sub write {
-	my $self = shift;
-	die "&Makefile->write() takes no arguments\n" if @_;
-
-	# Check the current Perl version
-	my $perl_version = $self->perl_version;
-	if ( $perl_version ) {
-		eval "use $perl_version; 1"
-			or die "ERROR: perl: Version $] is installed, "
-			. "but we need version >= $perl_version";
-	}
-
-	# Make sure we have a new enough MakeMaker
-	require ExtUtils::MakeMaker;
-
-	if ( $perl_version and $self->_cmp($perl_version, '5.006') >= 0 ) {
-		# MakeMaker can complain about module versions that include
-		# an underscore, even though its own version may contain one!
-		# Hence the funny regexp to get rid of it.  See RT #35800
-		# for details.
-		$self->build_requires( 'ExtUtils::MakeMaker' => $ExtUtils::MakeMaker::VERSION =~ /^(\d+\.\d+)/ );
-		$self->configure_requires( 'ExtUtils::MakeMaker' => $ExtUtils::MakeMaker::VERSION =~ /^(\d+\.\d+)/ );
-	} else {
-		# Allow legacy-compatibility with 5.005 by depending on the
-		# most recent EU:MM that supported 5.005.
-		$self->build_requires( 'ExtUtils::MakeMaker' => 6.42 );
-		$self->configure_requires( 'ExtUtils::MakeMaker' => 6.42 );
-	}
-
-	# Generate the MakeMaker params
-	my $args = $self->makemaker_args;
-	$args->{DISTNAME} = $self->name;
-	$args->{NAME}     = $self->module_name || $self->name;
-	$args->{VERSION}  = $self->version;
-	$args->{NAME}     =~ s/-/::/g;
-	if ( $self->tests ) {
-		$args->{test} = { TESTS => $self->tests };
-	}
-	if ( $] >= 5.005 ) {
-		$args->{ABSTRACT} = $self->abstract;
-		$args->{AUTHOR}   = $self->author;
-	}
-	if ( eval($ExtUtils::MakeMaker::VERSION) >= 6.10 ) {
-		$args->{NO_META} = 1;
-	}
-	if ( eval($ExtUtils::MakeMaker::VERSION) > 6.17 and $self->sign ) {
-		$args->{SIGN} = 1;
-	}
-	unless ( $self->is_admin ) {
-		delete $args->{SIGN};
-	}
-
-	# Merge both kinds of requires into prereq_pm
-	my $prereq = ($args->{PREREQ_PM} ||= {});
-	%$prereq = ( %$prereq,
-		map { @$_ }
-		map { @$_ }
-		grep $_,
-		($self->configure_requires, $self->build_requires, $self->requires)
-	);
-
-	# Remove any reference to perl, PREREQ_PM doesn't support it
-	delete $args->{PREREQ_PM}->{perl};
-
-	# merge both kinds of requires into prereq_pm
-	my $subdirs = ($args->{DIR} ||= []);
-	if ($self->bundles) {
-		foreach my $bundle (@{ $self->bundles }) {
-			my ($file, $dir) = @$bundle;
-			push @$subdirs, $dir if -d $dir;
-			delete $prereq->{$file};
-		}
-	}
-
-	if ( my $perl_version = $self->perl_version ) {
-		eval "use $perl_version; 1"
-			or die "ERROR: perl: Version $] is installed, "
-			. "but we need version >= $perl_version";
-	}
-
-	$args->{INSTALLDIRS} = $self->installdirs;
-
-	my %args = map { ( $_ => $args->{$_} ) } grep {defined($args->{$_})} keys %$args;
-
-	my $user_preop = delete $args{dist}->{PREOP};
-	if (my $preop = $self->admin->preop($user_preop)) {
-		foreach my $key ( keys %$preop ) {
-			$args{dist}->{$key} = $preop->{$key};
-		}
-	}
-
-	my $mm = ExtUtils::MakeMaker::WriteMakefile(%args);
-	$self->fix_up_makefile($mm->{FIRST_MAKEFILE} || 'Makefile');
-}
-
-sub fix_up_makefile {
-	my $self          = shift;
-	my $makefile_name = shift;
-	my $top_class     = ref($self->_top) || '';
-	my $top_version   = $self->_top->VERSION || '';
-
-	my $preamble = $self->preamble
-		? "# Preamble by $top_class $top_version\n"
-			. $self->preamble
-		: '';
-	my $postamble = "# Postamble by $top_class $top_version\n"
-		. ($self->postamble || '');
-
-	local *MAKEFILE;
-	open MAKEFILE, "< $makefile_name" or die "fix_up_makefile: Couldn't open $makefile_name: $!";
-	my $makefile = do { local $/; <MAKEFILE> };
-	close MAKEFILE or die $!;
-
-	$makefile =~ s/\b(test_harness\(\$\(TEST_VERBOSE\), )/$1'inc', /;
-	$makefile =~ s/( -I\$\(INST_ARCHLIB\))/ -Iinc$1/g;
-	$makefile =~ s/( "-I\$\(INST_LIB\)")/ "-Iinc"$1/g;
-	$makefile =~ s/^(FULLPERL = .*)/$1 "-Iinc"/m;
-	$makefile =~ s/^(PERL = .*)/$1 "-Iinc"/m;
-
-	# Module::Install will never be used to build the Core Perl
-	# Sometimes PERL_LIB and PERL_ARCHLIB get written anyway, which breaks
-	# PREFIX/PERL5LIB, and thus, install_share. Blank them if they exist
-	$makefile =~ s/^PERL_LIB = .+/PERL_LIB =/m;
-	#$makefile =~ s/^PERL_ARCHLIB = .+/PERL_ARCHLIB =/m;
-
-	# Perl 5.005 mentions PERL_LIB explicitly, so we have to remove that as well.
-	$makefile =~ s/(\"?)-I\$\(PERL_LIB\)\1//g;
-
-	# XXX - This is currently unused; not sure if it breaks other MM-users
-	# $makefile =~ s/^pm_to_blib\s+:\s+/pm_to_blib :: /mg;
-
-	open  MAKEFILE, "> $makefile_name" or die "fix_up_makefile: Couldn't open $makefile_name: $!";
-	print MAKEFILE  "$preamble$makefile$postamble" or die $!;
-	close MAKEFILE  or die $!;
-
-	1;
-}
-
-sub preamble {
-	my ($self, $text) = @_;
-	$self->{preamble} = $text . $self->{preamble} if defined $text;
-	$self->{preamble};
-}
-
-sub postamble {
-	my ($self, $text) = @_;
-	$self->{postamble} ||= $self->admin->postamble;
-	$self->{postamble} .= $text if defined $text;
-	$self->{postamble}
-}
-
-1;
-
-__END__
-
-#line 394
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/Metadata.pm b/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/Metadata.pm
deleted file mode 100644
index 653193d..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/Metadata.pm
+++ /dev/null
@@ -1,624 +0,0 @@
-#line 1
-package Module::Install::Metadata;
-
-use strict 'vars';
-use Module::Install::Base ();
-
-use vars qw{$VERSION @ISA $ISCORE};
-BEGIN {
-	$VERSION = '0.91';
-	@ISA     = 'Module::Install::Base';
-	$ISCORE  = 1;
-}
-
-my @boolean_keys = qw{
-	sign
-};
-
-my @scalar_keys = qw{
-	name
-	module_name
-	abstract
-	author
-	version
-	distribution_type
-	tests
-	installdirs
-};
-
-my @tuple_keys = qw{
-	configure_requires
-	build_requires
-	requires
-	recommends
-	bundles
-	resources
-};
-
-my @resource_keys = qw{
-	homepage
-	bugtracker
-	repository
-};
-
-my @array_keys = qw{
-	keywords
-};
-
-sub Meta              { shift          }
-sub Meta_BooleanKeys  { @boolean_keys  }
-sub Meta_ScalarKeys   { @scalar_keys   }
-sub Meta_TupleKeys    { @tuple_keys    }
-sub Meta_ResourceKeys { @resource_keys }
-sub Meta_ArrayKeys    { @array_keys    }
-
-foreach my $key ( @boolean_keys ) {
-	*$key = sub {
-		my $self = shift;
-		if ( defined wantarray and not @_ ) {
-			return $self->{values}->{$key};
-		}
-		$self->{values}->{$key} = ( @_ ? $_[0] : 1 );
-		return $self;
-	};
-}
-
-foreach my $key ( @scalar_keys ) {
-	*$key = sub {
-		my $self = shift;
-		return $self->{values}->{$key} if defined wantarray and !@_;
-		$self->{values}->{$key} = shift;
-		return $self;
-	};
-}
-
-foreach my $key ( @array_keys ) {
-	*$key = sub {
-		my $self = shift;
-		return $self->{values}->{$key} if defined wantarray and !@_;
-		$self->{values}->{$key} ||= [];
-		push @{$self->{values}->{$key}}, @_;
-		return $self;
-	};
-}
-
-foreach my $key ( @resource_keys ) {
-	*$key = sub {
-		my $self = shift;
-		unless ( @_ ) {
-			return () unless $self->{values}->{resources};
-			return map  { $_->[1] }
-			       grep { $_->[0] eq $key }
-			       @{ $self->{values}->{resources} };
-		}
-		return $self->{values}->{resources}->{$key} unless @_;
-		my $uri = shift or die(
-			"Did not provide a value to $key()"
-		);
-		$self->resources( $key => $uri );
-		return 1;
-	};
-}
-
-foreach my $key ( grep { $_ ne "resources" } @tuple_keys) {
-	*$key = sub {
-		my $self = shift;
-		return $self->{values}->{$key} unless @_;
-		my @added;
-		while ( @_ ) {
-			my $module  = shift or last;
-			my $version = shift || 0;
-			push @added, [ $module, $version ];
-		}
-		push @{ $self->{values}->{$key} }, @added;
-		return map {@$_} @added;
-	};
-}
-
-# Resource handling
-my %lc_resource = map { $_ => 1 } qw{
-	homepage
-	license
-	bugtracker
-	repository
-};
-
-sub resources {
-	my $self = shift;
-	while ( @_ ) {
-		my $name  = shift or last;
-		my $value = shift or next;
-		if ( $name eq lc $name and ! $lc_resource{$name} ) {
-			die("Unsupported reserved lowercase resource '$name'");
-		}
-		$self->{values}->{resources} ||= [];
-		push @{ $self->{values}->{resources} }, [ $name, $value ];
-	}
-	$self->{values}->{resources};
-}
-
-# Aliases for build_requires that will have alternative
-# meanings in some future version of META.yml.
-sub test_requires     { shift->build_requires(@_) }
-sub install_requires  { shift->build_requires(@_) }
-
-# Aliases for installdirs options
-sub install_as_core   { $_[0]->installdirs('perl')   }
-sub install_as_cpan   { $_[0]->installdirs('site')   }
-sub install_as_site   { $_[0]->installdirs('site')   }
-sub install_as_vendor { $_[0]->installdirs('vendor') }
-
-sub dynamic_config {
-	my $self = shift;
-	unless ( @_ ) {
-		warn "You MUST provide an explicit true/false value to dynamic_config\n";
-		return $self;
-	}
-	$self->{values}->{dynamic_config} = $_[0] ? 1 : 0;
-	return 1;
-}
-
-sub perl_version {
-	my $self = shift;
-	return $self->{values}->{perl_version} unless @_;
-	my $version = shift or die(
-		"Did not provide a value to perl_version()"
-	);
-
-	# Normalize the version
-	$version = $self->_perl_version($version);
-
-	# We don't support the reall old versions
-	unless ( $version >= 5.005 ) {
-		die "Module::Install only supports 5.005 or newer (use ExtUtils::MakeMaker)\n";
-	}
-
-	$self->{values}->{perl_version} = $version;
-}
-
-#Stolen from M::B
-my %license_urls = (
-    perl         => 'http://dev.perl.org/licenses/',
-    apache       => 'http://apache.org/licenses/LICENSE-2.0',
-    artistic     => 'http://opensource.org/licenses/artistic-license.php',
-    artistic_2   => 'http://opensource.org/licenses/artistic-license-2.0.php',
-    lgpl         => 'http://opensource.org/licenses/lgpl-license.php',
-    lgpl2        => 'http://opensource.org/licenses/lgpl-2.1.php',
-    lgpl3        => 'http://opensource.org/licenses/lgpl-3.0.html',
-    bsd          => 'http://opensource.org/licenses/bsd-license.php',
-    gpl          => 'http://opensource.org/licenses/gpl-license.php',
-    gpl2         => 'http://opensource.org/licenses/gpl-2.0.php',
-    gpl3         => 'http://opensource.org/licenses/gpl-3.0.html',
-    mit          => 'http://opensource.org/licenses/mit-license.php',
-    mozilla      => 'http://opensource.org/licenses/mozilla1.1.php',
-    open_source  => undef,
-    unrestricted => undef,
-    restrictive  => undef,
-    unknown      => undef,
-);
-
-sub license {
-	my $self = shift;
-	return $self->{values}->{license} unless @_;
-	my $license = shift or die(
-		'Did not provide a value to license()'
-	);
-	$self->{values}->{license} = $license;
-
-	# Automatically fill in license URLs
-	if ( $license_urls{$license} ) {
-		$self->resources( license => $license_urls{$license} );
-	}
-
-	return 1;
-}
-
-sub all_from {
-	my ( $self, $file ) = @_;
-
-	unless ( defined($file) ) {
-		my $name = $self->name or die(
-			"all_from called with no args without setting name() first"
-		);
-		$file = join('/', 'lib', split(/-/, $name)) . '.pm';
-		$file =~ s{.*/}{} unless -e $file;
-		unless ( -e $file ) {
-			die("all_from cannot find $file from $name");
-		}
-	}
-	unless ( -f $file ) {
-		die("The path '$file' does not exist, or is not a file");
-	}
-
-	# Some methods pull from POD instead of code.
-	# If there is a matching .pod, use that instead
-	my $pod = $file;
-	$pod =~ s/\.pm$/.pod/i;
-	$pod = $file unless -e $pod;
-
-	# Pull the different values
-	$self->name_from($file)         unless $self->name;
-	$self->version_from($file)      unless $self->version;
-	$self->perl_version_from($file) unless $self->perl_version;
-	$self->author_from($pod)        unless $self->author;
-	$self->license_from($pod)       unless $self->license;
-	$self->abstract_from($pod)      unless $self->abstract;
-
-	return 1;
-}
-
-sub provides {
-	my $self     = shift;
-	my $provides = ( $self->{values}->{provides} ||= {} );
-	%$provides = (%$provides, @_) if @_;
-	return $provides;
-}
-
-sub auto_provides {
-	my $self = shift;
-	return $self unless $self->is_admin;
-	unless (-e 'MANIFEST') {
-		warn "Cannot deduce auto_provides without a MANIFEST, skipping\n";
-		return $self;
-	}
-	# Avoid spurious warnings as we are not checking manifest here.
-	local $SIG{__WARN__} = sub {1};
-	require ExtUtils::Manifest;
-	local *ExtUtils::Manifest::manicheck = sub { return };
-
-	require Module::Build;
-	my $build = Module::Build->new(
-		dist_name    => $self->name,
-		dist_version => $self->version,
-		license      => $self->license,
-	);
-	$self->provides( %{ $build->find_dist_packages || {} } );
-}
-
-sub feature {
-	my $self     = shift;
-	my $name     = shift;
-	my $features = ( $self->{values}->{features} ||= [] );
-	my $mods;
-
-	if ( @_ == 1 and ref( $_[0] ) ) {
-		# The user used ->feature like ->features by passing in the second
-		# argument as a reference.  Accomodate for that.
-		$mods = $_[0];
-	} else {
-		$mods = \@_;
-	}
-
-	my $count = 0;
-	push @$features, (
-		$name => [
-			map {
-				ref($_) ? ( ref($_) eq 'HASH' ) ? %$_ : @$_ : $_
-			} @$mods
-		]
-	);
-
-	return @$features;
-}
-
-sub features {
-	my $self = shift;
-	while ( my ( $name, $mods ) = splice( @_, 0, 2 ) ) {
-		$self->feature( $name, @$mods );
-	}
-	return $self->{values}->{features}
-		? @{ $self->{values}->{features} }
-		: ();
-}
-
-sub no_index {
-	my $self = shift;
-	my $type = shift;
-	push @{ $self->{values}->{no_index}->{$type} }, @_ if $type;
-	return $self->{values}->{no_index};
-}
-
-sub read {
-	my $self = shift;
-	$self->include_deps( 'YAML::Tiny', 0 );
-
-	require YAML::Tiny;
-	my $data = YAML::Tiny::LoadFile('META.yml');
-
-	# Call methods explicitly in case user has already set some values.
-	while ( my ( $key, $value ) = each %$data ) {
-		next unless $self->can($key);
-		if ( ref $value eq 'HASH' ) {
-			while ( my ( $module, $version ) = each %$value ) {
-				$self->can($key)->($self, $module => $version );
-			}
-		} else {
-			$self->can($key)->($self, $value);
-		}
-	}
-	return $self;
-}
-
-sub write {
-	my $self = shift;
-	return $self unless $self->is_admin;
-	$self->admin->write_meta;
-	return $self;
-}
-
-sub version_from {
-	require ExtUtils::MM_Unix;
-	my ( $self, $file ) = @_;
-	$self->version( ExtUtils::MM_Unix->parse_version($file) );
-}
-
-sub abstract_from {
-	require ExtUtils::MM_Unix;
-	my ( $self, $file ) = @_;
-	$self->abstract(
-		bless(
-			{ DISTNAME => $self->name },
-			'ExtUtils::MM_Unix'
-		)->parse_abstract($file)
-	 );
-}
-
-# Add both distribution and module name
-sub name_from {
-	my ($self, $file) = @_;
-	if (
-		Module::Install::_read($file) =~ m/
-		^ \s*
-		package \s*
-		([\w:]+)
-		\s* ;
-		/ixms
-	) {
-		my ($name, $module_name) = ($1, $1);
-		$name =~ s{::}{-}g;
-		$self->name($name);
-		unless ( $self->module_name ) {
-			$self->module_name($module_name);
-		}
-	} else {
-		die("Cannot determine name from $file\n");
-	}
-}
-
-sub perl_version_from {
-	my $self = shift;
-	if (
-		Module::Install::_read($_[0]) =~ m/
-		^
-		(?:use|require) \s*
-		v?
-		([\d_\.]+)
-		\s* ;
-		/ixms
-	) {
-		my $perl_version = $1;
-		$perl_version =~ s{_}{}g;
-		$self->perl_version($perl_version);
-	} else {
-		warn "Cannot determine perl version info from $_[0]\n";
-		return;
-	}
-}
-
-sub author_from {
-	my $self    = shift;
-	my $content = Module::Install::_read($_[0]);
-	if ($content =~ m/
-		=head \d \s+ (?:authors?)\b \s*
-		([^\n]*)
-		|
-		=head \d \s+ (?:licen[cs]e|licensing|copyright|legal)\b \s*
-		.*? copyright .*? \d\d\d[\d.]+ \s* (?:\bby\b)? \s*
-		([^\n]*)
-	/ixms) {
-		my $author = $1 || $2;
-		$author =~ s{E<lt>}{<}g;
-		$author =~ s{E<gt>}{>}g;
-		$self->author($author);
-	} else {
-		warn "Cannot determine author info from $_[0]\n";
-	}
-}
-
-sub license_from {
-	my $self = shift;
-	if (
-		Module::Install::_read($_[0]) =~ m/
-		(
-			=head \d \s+
-			(?:licen[cs]e|licensing|copyright|legal)\b
-			.*?
-		)
-		(=head\\d.*|=cut.*|)
-		\z
-	/ixms ) {
-		my $license_text = $1;
-		my @phrases      = (
-			'under the same (?:terms|license) as (?:perl|the perl programming language) itself' => 'perl', 1,
-			'GNU general public license'         => 'gpl',         1,
-			'GNU public license'                 => 'gpl',         1,
-			'GNU lesser general public license'  => 'lgpl',        1,
-			'GNU lesser public license'          => 'lgpl',        1,
-			'GNU library general public license' => 'lgpl',        1,
-			'GNU library public license'         => 'lgpl',        1,
-			'BSD license'                        => 'bsd',         1,
-			'Artistic license'                   => 'artistic',    1,
-			'GPL'                                => 'gpl',         1,
-			'LGPL'                               => 'lgpl',        1,
-			'BSD'                                => 'bsd',         1,
-			'Artistic'                           => 'artistic',    1,
-			'MIT'                                => 'mit',         1,
-			'proprietary'                        => 'proprietary', 0,
-		);
-		while ( my ($pattern, $license, $osi) = splice(@phrases, 0, 3) ) {
-			$pattern =~ s{\s+}{\\s+}g;
-			if ( $license_text =~ /\b$pattern\b/i ) {
-				$self->license($license);
-				return 1;
-			}
-		}
-	}
-
-	warn "Cannot determine license info from $_[0]\n";
-	return 'unknown';
-}
-
-sub _extract_bugtracker {
-	my @links   = $_[0] =~ m#L<(\Qhttp://rt.cpan.org/\E[^>]+)>#g;
-	my %links;
-	@links{@links}=();
-	@links=keys %links;
-	return @links;
-}
-
-sub bugtracker_from {
-	my $self    = shift;
-	my $content = Module::Install::_read($_[0]);
-	my @links   = _extract_bugtracker($content);
-	unless ( @links ) {
-		warn "Cannot determine bugtracker info from $_[0]\n";
-		return 0;
-	}
-	if ( @links > 1 ) {
-		warn "Found more than on rt.cpan.org link in $_[0]\n";
-		return 0;
-	}
-
-	# Set the bugtracker
-	bugtracker( $links[0] );
-	return 1;
-}
-
-sub requires_from {
-	my $self     = shift;
-	my $content  = Module::Install::_readperl($_[0]);
-	my @requires = $content =~ m/^use\s+([^\W\d]\w*(?:::\w+)*)\s+([\d\.]+)/mg;
-	while ( @requires ) {
-		my $module  = shift @requires;
-		my $version = shift @requires;
-		$self->requires( $module => $version );
-	}
-}
-
-sub test_requires_from {
-	my $self     = shift;
-	my $content  = Module::Install::_readperl($_[0]);
-	my @requires = $content =~ m/^use\s+([^\W\d]\w*(?:::\w+)*)\s+([\d\.]+)/mg;
-	while ( @requires ) {
-		my $module  = shift @requires;
-		my $version = shift @requires;
-		$self->test_requires( $module => $version );
-	}
-}
-
-# Convert triple-part versions (eg, 5.6.1 or 5.8.9) to
-# numbers (eg, 5.006001 or 5.008009).
-# Also, convert double-part versions (eg, 5.8)
-sub _perl_version {
-	my $v = $_[-1];
-	$v =~ s/^([1-9])\.([1-9]\d?\d?)$/sprintf("%d.%03d",$1,$2)/e;
-	$v =~ s/^([1-9])\.([1-9]\d?\d?)\.(0|[1-9]\d?\d?)$/sprintf("%d.%03d%03d",$1,$2,$3 || 0)/e;
-	$v =~ s/(\.\d\d\d)000$/$1/;
-	$v =~ s/_.+$//;
-	if ( ref($v) ) {
-		# Numify
-		$v = $v + 0;
-	}
-	return $v;
-}
-
-
-
-
-
-######################################################################
-# MYMETA Support
-
-sub WriteMyMeta {
-	die "WriteMyMeta has been deprecated";
-}
-
-sub write_mymeta_yaml {
-	my $self = shift;
-
-	# We need YAML::Tiny to write the MYMETA.yml file
-	unless ( eval { require YAML::Tiny; 1; } ) {
-		return 1;
-	}
-
-	# Generate the data
-	my $meta = $self->_write_mymeta_data or return 1;
-
-	# Save as the MYMETA.yml file
-	print "Writing MYMETA.yml\n";
-	YAML::Tiny::DumpFile('MYMETA.yml', $meta);
-}
-
-sub write_mymeta_json {
-	my $self = shift;
-
-	# We need JSON to write the MYMETA.json file
-	unless ( eval { require JSON; 1; } ) {
-		return 1;
-	}
-
-	# Generate the data
-	my $meta = $self->_write_mymeta_data or return 1;
-
-	# Save as the MYMETA.yml file
-	print "Writing MYMETA.json\n";
-	Module::Install::_write(
-		'MYMETA.json',
-		JSON->new->pretty(1)->canonical->encode($meta),
-	);
-}
-
-sub _write_mymeta_data {
-	my $self = shift;
-
-	# If there's no existing META.yml there is nothing we can do
-	return undef unless -f 'META.yml';
-
-	# We need Parse::CPAN::Meta to load the file
-	unless ( eval { require Parse::CPAN::Meta; 1; } ) {
-		return undef;
-	}
-
-	# Merge the perl version into the dependencies
-	my $val  = $self->Meta->{values};
-	my $perl = delete $val->{perl_version};
-	if ( $perl ) {
-		$val->{requires} ||= [];
-		my $requires = $val->{requires};
-
-		# Canonize to three-dot version after Perl 5.6
-		if ( $perl >= 5.006 ) {
-			$perl =~ s{^(\d+)\.(\d\d\d)(\d*)}{join('.', $1, int($2||0), int($3||0))}e
-		}
-		unshift @$requires, [ perl => $perl ];
-	}
-
-	# Load the advisory META.yml file
-	my @yaml = Parse::CPAN::Meta::LoadFile('META.yml');
-	my $meta = $yaml[0];
-
-	# Overwrite the non-configure dependency hashs
-	delete $meta->{requires};
-	delete $meta->{build_requires};
-	delete $meta->{recommends};
-	if ( exists $val->{requires} ) {
-		$meta->{requires} = { map { @$_ } @{ $val->{requires} } };
-	}
-	if ( exists $val->{build_requires} ) {
-		$meta->{build_requires} = { map { @$_ } @{ $val->{build_requires} } };
-	}
-
-	return $meta;
-}
-
-1;
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/Win32.pm b/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/Win32.pm
deleted file mode 100644
index f2f99df..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/Win32.pm
+++ /dev/null
@@ -1,64 +0,0 @@
-#line 1
-package Module::Install::Win32;
-
-use strict;
-use Module::Install::Base ();
-
-use vars qw{$VERSION @ISA $ISCORE};
-BEGIN {
-	$VERSION = '0.91';
-	@ISA     = 'Module::Install::Base';
-	$ISCORE  = 1;
-}
-
-# determine if the user needs nmake, and download it if needed
-sub check_nmake {
-	my $self = shift;
-	$self->load('can_run');
-	$self->load('get_file');
-
-	require Config;
-	return unless (
-		$^O eq 'MSWin32'                     and
-		$Config::Config{make}                and
-		$Config::Config{make} =~ /^nmake\b/i and
-		! $self->can_run('nmake')
-	);
-
-	print "The required 'nmake' executable not found, fetching it...\n";
-
-	require File::Basename;
-	my $rv = $self->get_file(
-		url       => 'http://download.microsoft.com/download/vc15/Patch/1.52/W95/EN-US/Nmake15.exe',
-		ftp_url   => 'ftp://ftp.microsoft.com/Softlib/MSLFILES/Nmake15.exe',
-		local_dir => File::Basename::dirname($^X),
-		size      => 51928,
-		run       => 'Nmake15.exe /o > nul',
-		check_for => 'Nmake.exe',
-		remove    => 1,
-	);
-
-	die <<'END_MESSAGE' unless $rv;
-
--------------------------------------------------------------------------------
-
-Since you are using Microsoft Windows, you will need the 'nmake' utility
-before installation. It's available at:
-
-  http://download.microsoft.com/download/vc15/Patch/1.52/W95/EN-US/Nmake15.exe
-      or
-  ftp://ftp.microsoft.com/Softlib/MSLFILES/Nmake15.exe
-
-Please download the file manually, save it to a directory in %PATH% (e.g.
-C:\WINDOWS\COMMAND\), then launch the MS-DOS command line shell, "cd" to
-that directory, and run "Nmake15.exe" from there; that will create the
-'nmake.exe' file needed by this module.
-
-You may then resume the installation process described in README.
-
--------------------------------------------------------------------------------
-END_MESSAGE
-
-}
-
-1;
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/WriteAll.pm b/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/WriteAll.pm
deleted file mode 100644
index 12471e5..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/WriteAll.pm
+++ /dev/null
@@ -1,60 +0,0 @@
-#line 1
-package Module::Install::WriteAll;
-
-use strict;
-use Module::Install::Base ();
-
-use vars qw{$VERSION @ISA $ISCORE};
-BEGIN {
-	$VERSION = '0.91';;
-	@ISA     = qw{Module::Install::Base};
-	$ISCORE  = 1;
-}
-
-sub WriteAll {
-	my $self = shift;
-	my %args = (
-		meta        => 1,
-		sign        => 0,
-		inline      => 0,
-		check_nmake => 1,
-		@_,
-	);
-
-	$self->sign(1)                if $args{sign};
-	$self->admin->WriteAll(%args) if $self->is_admin;
-
-	$self->check_nmake if $args{check_nmake};
-	unless ( $self->makemaker_args->{PL_FILES} ) {
-		$self->makemaker_args( PL_FILES => {} );
-	}
-
-	# Until ExtUtils::MakeMaker support MYMETA.yml, make sure
-	# we clean it up properly ourself.
-	$self->realclean_files('MYMETA.yml');
-
-	if ( $args{inline} ) {
-		$self->Inline->write;
-	} else {
-		$self->Makefile->write;
-	}
-
-	# The Makefile write process adds a couple of dependencies,
-	# so write the META.yml files after the Makefile.
-	if ( $args{meta} ) {
-		$self->Meta->write;
-	}
-
-	# Experimental support for MYMETA
-	if ( $ENV{X_MYMETA} ) {
-		if ( $ENV{X_MYMETA} eq 'JSON' ) {
-			$self->Meta->write_mymeta_json;
-		} else {
-			$self->Meta->write_mymeta_yaml;
-		}
-	}
-
-	return 1;
-}
-
-1;
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/lib/Catalyst/Plugin/Authorization/ACL.pm b/sources/Catalyst-Plugin-Authorization-ACL/lib/Catalyst/Plugin/Authorization/ACL.pm
deleted file mode 100644
index 6c2cfd5..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/lib/Catalyst/Plugin/Authorization/ACL.pm
+++ /dev/null
@@ -1,525 +0,0 @@
-package Catalyst::Plugin::Authorization::ACL;
-
-use namespace::autoclean;
-use Moose;
-use mro 'c3';
-with 'Catalyst::ClassData';
-use Scalar::Util ();
-use Catalyst::Plugin::Authorization::ACL::Engine qw/$DENIED $ALLOWED/;
-
-# TODO
-# refactor forcibly_allow_access so that the guts are cleaner
-
-__PACKAGE__->mk_classdata("_acl_engine");
-
-our $VERSION = '0.15';
-
-my $FORCE_ALLOW = bless {}, __PACKAGE__ . "::Exception";
-
-sub execute {
-    my ( $c, $class, $action ) = @_;
-
-    if (    Scalar::Util::blessed($action)
-        and $action->name ne "access_denied"
-        and $action->name ne "ACL error rethrower" )
-    {
-        eval { $c->_acl_engine->check_action_rules( $c, $action ) };
-
-        if ( my $err = $@ ) {
-            my $force_allow = $c->acl_access_denied( $class, $action, $err );
-            return unless $force_allow;
-        }
-        else {
-            $c->acl_access_allowed( $class, $action );
-        }
-
-    }
-
-    $c->maybe::next::method( $class, $action );
-}
-
-sub acl_allow_root_internals {
-    my ( $app, $cmp ) = @_;
-
-    foreach my $action ( qw/begin auto end/ ) {
-        $app->allow_access("/$action") if $app->get_action($action, "/");
-    }
-}
-
-sub setup_actions {
-    my $app = shift;
-    my $ret = $app->maybe::next::method(@_);
-
-    $app->_acl_engine(
-        Catalyst::Plugin::Authorization::ACL::Engine->new($app) );
-
-    if ( my $config = $app->config->{acl} ) {
-        foreach my $action ( qw/allow deny/ ) {
-            my $method = "${action}_access";
-            if ( my $paths = $config->{$action} ) {
-                $app->$method( $_ ) for @$paths;
-            }
-
-            my $cond = ( $action eq "allow" ? "if" : "unless" );
-            $method .= "_$cond";
-
-            if ( my $args = $config->{"${action}_$cond"} ) {
-                my ( $cond, @paths ) = @$args;
-                $app->$method( $cond, $_ ) for @paths;
-            }
-        }
-    }
-
-    $ret;
-}
-
-sub deny_access_unless {
-    my $c = shift;
-    $c->_acl_engine->add_deny(@_);
-}
-
-sub deny_access_unless_any {
-    my ($c, $path, $roles) = @_;
-
-    $c->deny_access_unless($path, sub {
-        my ($c, $action) = @_;
-
-        return $c->check_any_user_role(@$roles);
-    });
-}
-
-sub deny_access {
-    my $c = shift;
-    $c->deny_access_unless( @_, undef );
-}
-
-sub allow_access_if {
-    my $c = shift;
-    $c->_acl_engine->add_allow(@_);
-}
-
-sub allow_access_if_any {
-    my ($c, $path, $roles) = @_;
-
-    $c->allow_access_if($path, sub {
-        my ($c, $action) = @_;
-
-        return $c->check_any_user_role(@$roles);
-    });
-}
-
-sub allow_access {
-    my $c = shift;
-    $c->allow_access_if( @_, 1 );
-}
-
-sub acl_add_rule {
-    my $c = shift;
-    $c->_acl_engine->add_rule(@_);
-}
-
-sub acl_access_denied {
-    my ( $c, $class, $action, $err ) = @_;
-
-    my $namespace = $action->namespace;
-
-    if ( my $handler =
-        ( $c->get_actions( "access_denied", $namespace ) )[-1] )
-    {
-        local $c->{_acl_forcibly_allowed} = undef;
-
-        (my $path = $handler->reverse) =~ s!^/?!/!;
-
-        eval { $c->detach( $path, [$action, $err] ) };
-
-        return 1 if $c->{_acl_forcibly_allowed};
-
-        die $@ || $Catalyst::DETACH;
-    }
-    else {
-        $c->execute(
-            $class,
-            bless(
-                {
-                    code => sub { die $err },
-                    name => "ACL error rethrower",
-                },
-                "Catalyst::Action"
-            ),
-        );
-
-        return;
-    }
-}
-
-sub forcibly_allow_access {
-    my $c = shift;
-    $c->{_acl_forcibly_allowed} = 1;
-    die $Catalyst::DETACH;
-}
-
-sub acl_access_allowed {
-
-}
-
-__PACKAGE__->meta->make_immutable;
-__PACKAGE__;
-
-__END__
-
-=pod
-
-=head1 NAME
-
-Catalyst::Plugin::Authorization::ACL - ACL support for Catalyst applications.
-
-=head1 SYNOPSIS
-
-        use Catalyst qw/
-                Authentication
-                Authorization::Roles
-                Authorization::ACL
-        /;
-
-        __PACKAGE__->setup;
-
-        __PACKAGE__->deny_access_unless(
-                "/foo/bar",
-                [qw/nice_role/],
-        );
-
-        __PACKAGE__->allow_access_if(
-                "/foo/bar/gorch",
-                sub { return $boolean },
-        );
-
-=head1 DESCRIPTION
-
-This module provides Access Control List style path protection, with arbitrary
-rules for L<Catalyst> applications. It operates only on the L<Catalyst>
-private namespace, at least at the moment.
-
-The two hierarchies of actions and controllers in L<Catalyst> are:
-
-=over 4
-
-=item Private Namespace
-
-Every action has its own private path. This path reflects the Perl namespaces
-the actions were born in, and the namespaces of their controllers.
-
-=item External Namespace
-
-Some actions are also directly accessible from the outside, via a URL.
-
-The private and external paths will be the same, if you are using Local actions. Alternatively you can use C<Path>, C<Regex>, or C<Global> to specify a different external path for your action.
-
-=back
-
-The ACL module currently only knows to exploit the private namespace. In the
-future extensions may be made to support external namespaces as well.
-
-Various types of rules are supported, see the list under L</RULES>.
-
-When a path is visited, rules are tested one after the other, with the most
-exact rule fitting the path first, and continuing up the path. Testing
-continues until a rule explcitly allows or denies access.
-
-=head1 METHODS
-
-=head2 allow_access_if
-
-Arguments: $path, $rule
-
-Check the rule condition and allow access to the actions under C<$path> if
-the rule returns true.
-
-This is normally useful to allow acces only to a specific part of a tree whose
-parent has a C<deny_access_unless> clause attached to it.
-
-If the rule test returns false access is not denied or allowed. Instead
-the next rule in the chain will be checked - in this sense the combinatory
-behavior of these rules is like logical B<OR>.
-
-=head2 allow_access_if_any
-
-Arguments: $path, \@roles
-
-Same as above for any role in the list.
-
-=head2 deny_access_unless
-
-Arguments: $path, $rule
-
-Check the rule condition and disallow access if the rule returns false.
-
-This is normally useful to restrict access to any portion of the application
-unless a certain condition can be met.
-
-If the rule test returns true access is not allowed or denied. Instead the
-next rule in the chain will be checked - in this sense the combinatory
-behavior of these rules is like logical B<AND>.
-
-=head2 deny_access_unless_any
-
-Arguments: $path, \@roles
-
-Same as above for any role in the list.
-
-=head2 allow_access
-
-=head2 deny_access
-
-Arguments: $path
-
-Unconditionally allow or deny access to a path.
-
-=head2 acl_add_rule
-
-Arguments: $path, $rule, [ $filter ]
-
-Manually add a rule to all the actions under C<$path> using the more flexible
-(but more verbose) method:
-
-    __PACKAGE__->acl_add_rule(
-        "/foo",
-        sub { ... }, # see FLEXIBLE RULES below
-        sub {
-            my $action = shift;
-            # return a true value if you want to apply the rule to this action
-            # called for all the actions under "/foo"
-        }
-    };
-
-In this case the rule must be a sub reference (or method name) to be invoked on
-$c.
-
-The default filter will skip all actions starting with an underscore, namely
-C<_DISPATCH>, C<_AUTO>, etc (but not C<auto>, C<begin>, et al).
-
-=head2 acl_access_denied
-
-Arguments: $c, $class, $action, $err
-
-=head2 acl_access_allowed
-
-Arguments: $c, $class, $action
-
-The default event handlers for access denied or allowed conditions. See below
-on handling access violations.
-
-=head2 acl_allow_root_internals
-
-Adds rules that permit access to the root controller (YourApp.pm) C<auto>,
-C<begin> and C<end> unconditionally.
-
-=head1 EXTENDED METHODS
-
-=head2 execute
-
-The hook for rule evaluation
-
-=head2 setup_actions
-
-=head1 RULE EVALUATION
-
-When a rule is attached to an action the "distance" from the path it was
-specified in is recorded. The closer the path is to the rule, the earlier it
-will be checked.
-
-Any rule can either explicitly deny or explicitly allow access to a particular
-action. If a rule does not explicitly allow or permit access, the next rule is
-checked, until the list of rules is finished. If no rule has determined a
-policy, access to the path will be permitted.
-
-=head1 PATHS
-
-To apply a rule to an action or group of actions you must supply a path.
-
-This path is what you should see dumped at the begining of the L<Catalyst>
-server's debug output.
-
-For example, for the C<foo> action defined at the root level of your
-application, specify C</foo>. Under the C<Moose> controller (e.g.
-C<MyApp::C::Moose>, the action C<bar> will be C</moose/bar>).
-
-The "distance" a path has from an action that is contained in it is the the
-difference in the number of slashes between the path of the action, and the
-path to which the rule was applied.
-
-=head1 RULES
-
-=head2 Easy Rules
-
-There are several kinds of rules you can create without using the complex
-interface described in L</FLEXIBLE RULES>.
-
-The easy rules are all predicate list oriented. C<allow_access_if> will
-explicitly allow access if the predicate is true, and C<deny_access_unless>
-will explicitly disallow if the predicate is false.
-
-=over 4
-
-=item Role Lists
-
-  __PACAKGE__->deny_access_unless_any( "/foo/bar", [qw/admin moose_trainer/] );
-
-When the role is evaluated the L<Catalyst::Plugin::Authorization::Roles> will
-be used to check whether the currently logged in user has the specified roles.
-
-If L</allow_access_if_any> is used, the presence of B<any> of the roles in
-the list will immediately permit access, and if L</deny_access_unless_any> is
-used, the lack of B<all> of the roles will immediately deny access.
-
-Similarly, if C<allow_access_if> is used, the presence of B<all> the roles will
-immediately permit access, and if C<deny_access_unless> is used, the lack of
-B<any> of the roles will immediately deny access.
-
-When specifying a role list without the
-L<Catalyst::Plugin::Authorization::Roles> plugin loaded the ACL engine will
-throw an error.
-
-=item Predicate Code Reference / Method Name
-
-The code reference or method is invoked with the context and the action
-objects. The boolean return value will determine the behavior of the rule.
-
-    __PACKAGE__->allow_access_if( "/gorch", sub { ... } );
-    __PACKAGE__->deny_access_unless( "/moose", "method_name" );
-
-When specifying a method name the rule engine ensures that it can be invoked
-using L<UNIVERSAL/can>.
-
-=item Constant
-
-You can use C<undef>, C<0> and C<''> to use as a constant false predicate, or
-C<1> to use as a constant true predicate.
-
-=back
-
-=head2 Flexible Rules
-
-These rules are the most annoying to write but provide the most flexibility.
-
-All access control is performed using exceptions -
-C<$Catalyst::Plugin::Authorization::ACL::Engine::DENIED>, and
-C<$Catalyst::Plugin::Authorization::ACL::Engine::ALLOWED> (these can be
-imported from the engine module).
-
-If no rule decides to explicitly allow or deny access, access will be
-permitted.
-
-Here is a rule that will always break out of rule processing by either
-explicitly allowing or denying access based on how much mojo the current
-user has:
-
-    __PACKAGE__->acl_add_rule(
-        "/foo",
-        sub {
-            my ( $c, $action ) = @_;
-
-            if ( $c->user->mojo > 50 ) {
-                die $ALLOWED;
-            } else {
-                die $DENIED;
-            }
-        }
-    );
-
-=head1 HANDLING DENIAL
-
-There are two plugin methods that can be called when a rule makes a decision
-about an action:
-
-=over 4
-
-=item acl_access_allowed
-
-A no-op
-
-=item acl_access_denied
-
-Looks for a private action named C<access_denied> from the denied action's
-controller and outwards (much like C<auto>), and if none is found throws an
-access denied exception.
-
-=item forcibly_allow_access
-
-Within an C<access_denied> action this will immediately cause the blocked
-action to be executed anyway.
-
-=back
-
-This means that you have several alternatives:
-
-=head2 Provide an C<access_denied> action
-
-    package MyApp::Controller::Foo;
-
-    sub access_denied : Private {
-        my ( $self, $c, $action ) = @_;
-
-        ...
-        $c->forcibly_allow_access
-            if $you->mean_it eq "really";
-    }
-
-If you call C<forcibly_allow_access> then the blocked action will be
-immediately unblocked. Otherwise the execution of the action will cease, and
-return to it's caller or end.
-
-=head2 Cleanup in C<end>
-
-    sub end : Private {
-        my ( $self, $c ) = @_;
-
-        if ( $c->error and $c->error->[-1] eq "access denied" ) {
-            $c->error(0); # clear the error
-
-            # access denied
-        } else {
-            # normal end
-        }
-    }
-
-=head2 Override the plugin event handler methods
-
-    package MyApp;
-
-    sub acl_access_allowed {
-        my ( $c, $class, $action ) = @_;
-        ...
-    }
-
-    sub acl_access_denied {
-        my ( $c, $class, $action, $err ) = @_;
-        ...
-    }
-
-C<$class> is the controller class the C<$action> object was going to be
-executed in, and C<$err> is the exception cought during rule evaluation, if
-any (access is denied if a rule raises an exception).
-
-=head1 SEE ALSO
-
-L<Catalyst::Plugin::Authentication>, L<Catalyst::Plugin::Authorization::Roles>,
-L<http://catalyst.perl.org/calendar/2005/24>
-
-=head1 AUTHOR
-
-Yuval Kogman E<lt>nothingmuch at woobling.orgE<gt>
-
-=head1 CONTRIBUTORS
-
-castaway: Jess Robinson
-
-caelum: Rafael Kitover E<lt>rkitover at cpan.orgE<gt>
-
-=head1 COPYRIGHT & LICENSE
-
-Copyright (c) 2008,2009 the aforementioned authors.
-
-This library is free software; you can redistribute it and/or modify
-it under the same terms as Perl itself. 
-
-=cut
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/lib/Catalyst/Plugin/Authorization/ACL/Engine.pm b/sources/Catalyst-Plugin-Authorization-ACL/lib/Catalyst/Plugin/Authorization/ACL/Engine.pm
deleted file mode 100644
index 6744161..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/lib/Catalyst/Plugin/Authorization/ACL/Engine.pm
+++ /dev/null
@@ -1,359 +0,0 @@
-package Catalyst::Plugin::Authorization::ACL::Engine;
-
-use namespace::autoclean;
-use Moose;
-extends qw/Moose::Object Exporter/;
-
-# I heart stevan
-use Class::Throwable;
-use Tree::Simple;
-use Tree::Simple::Visitor::FindByPath;
-use Tree::Simple::Visitor::GetAllDescendents;
-use Carp qw/croak/;
-use List::Util 'first';
-
-has app     => (is => 'rw');
-has actions => (is => 'ro', isa => 'HashRef', default => sub { {} });
-has _app_actions_tree => (is => 'ro', isa => 'Tree::Simple', lazy_build => 1);
-
-our $DENIED  = bless {}, __PACKAGE__ . "::Denied";
-our $ALLOWED = bless {}, __PACKAGE__ . "::Allowed";
-
-our @EXPORT_OK = qw/$DENIED $ALLOWED/;
-
-sub BUILDARGS {
-    my ($self, $c) = @_;
-    return +{ app => $c };
-}
-
-sub _build__app_actions_tree {
-    my $self = shift;
-    my $root = Tree::Simple->new('/', Tree::Simple->ROOT);
-    my $app  = $self->app;
-
-    my @actions = grep defined, map {
-        my $controller = $_;
-        map $controller->action_for($_->name), $controller->get_action_methods
-    } grep $_->isa('Catalyst::Controller'), values %{ $app->components };
-
-    for my $action (@actions) {
-        my @path = split '/', $action->reverse;
-        my $name = pop @path;
-
-        if (@path) {
-            my $by_path = Tree::Simple::Visitor::FindByPath->new;
-            $by_path->setSearchPath(@path);
-            $root->accept($by_path);
-
-            if (my $namespace_node = $by_path->getResult) {
-                $namespace_node->addChild(Tree::Simple->new($action));
-                next;
-            }
-        }
-
-        my $node = $root;
-        for my $el (@path) {
-            if (my $found = first { $_->getNodeValue eq $el }
-                @{ $node->getAllChildren }) {
-                $node = $found;
-            }
-            else {
-                $node = Tree::Simple->new($el, $node);
-            }
-        }
-
-        $node->addChild(Tree::Simple->new($action));
-    }
-
-    return $root;
-}
-
-sub add_deny {
-    my ( $self, $spec, $condition ) = @_;
-
-    my $test = $self->fudge_condition($condition);
-
-    $self->add_rule(
-        $spec,
-        sub {
-            my $c = shift;
-            die $DENIED unless $c->$test(@_);
-        },
-    );
-}
-
-sub add_allow {
-    my ( $self, $spec, $condition ) = @_;
-
-    my $test = $self->fudge_condition($condition);
-
-    $self->add_rule(
-        $spec,
-        sub {
-            my $c = shift;
-            die $ALLOWED if $c->$test(@_);
-        },
-    );
-}
-
-sub fudge_condition {
-    my ( $self, $condition ) = @_;
-
-    # make almost anything into a code ref/method name
-
-    if (!defined($condition)
-        # no warnings
-        or $condition eq '1'
-        or $condition eq '0'
-        or $condition eq "" )
-    {
-        return sub { $condition };
-    }
-    elsif ( my $reftype = ref $condition ) {
-        $reftype eq "CODE" and return $condition;
-
-        # if it's not a code ref and it's a ref, we only know
-        # how to deal with it if it's an array of roles
-        $reftype ne "ARRAY"
-          and die "Can't interpret '$condition' as an ACL condition";
-
-        # but to check roles we need the appropriate plugin
-        $self->app->isa("Catalyst::Plugin::Authorization::Roles")
-          or die "Can't use role list as an ACL condition unless "
-          . "the Authorization::Roles plugin is also loaded.";
-
-        # return a test that will check for the roles
-        return sub {
-            my $c = shift;
-            $c->check_user_roles(@$condition);
-        };
-    }
-    elsif ( $self->app->can($condition) ) {
-        return $condition;    # just a method name
-    }
-    else {
-        croak "Can't use '$condition' as an ACL "
-          . "condition unless \$c->can('$condition').";
-    }
-}
-
-sub add_rule {
-    my ( $self, $path, $rule, $filter ) = @_;
-    $filter ||= sub { $_[0]->name !~ /^_/ };    # internal actions are not ACL'd
-
-    my $d = $self->app->dispatcher;
-
-    my $cxt = _pretty_caller();
-
-    $self->{cxt_info}{$rule} = $cxt;
-
-    my ( $ns, $name ) = $path =~ m#^/?(.*?)/?([^/]+)$#;
-
-    if ( my $action = $d->get_action( $name, $ns ) ) {
-        $self->app->log->debug(
-            "Adding ACL rule from $cxt to the action $path with sort index 0")
-          if $self->app->debug;
-        $self->append_rule_to_action( $action, 0, $rule, $cxt );
-    }
-    else {
-        my @path = grep { $_ ne "" } split( "/", $path );
-        my $tree = $self->_app_actions_tree;
-
-        my $subtree = @path
-          ? do {
-            my $by_path = Tree::Simple::Visitor::FindByPath->new;
-            $by_path->setSearchPath(@path);
-            $tree->accept($by_path);
-
-            $by_path->getResult
-              || Catalyst::Exception->throw(
-                    "The path '$path' does not exist (traversal hit a dead end "
-                  . "at: @{[ map { $_->getNodeValue } $by_path->getResults ]})"
-              );
-          }
-          : $tree;
-        my $root_depth = $subtree->getDepth;
-
-        my $descendents = Tree::Simple::Visitor::GetAllDescendents->new;
-        $descendents->setNodeFilter( sub { $_[0] } );    #
-        $subtree->accept($descendents);
-
-        $self->app->log->debug(
-            "Adding ACL rule from $cxt to all the actions under $path")
-          if $self->app->debug;
-
-        foreach my $action_node ( $descendents->getResults ) {
-            next unless $action_node->isLeaf;
-
-            my ( $action, $depth ) =
-              ( $action_node->getNodeValue, $action_node->getDepth );
-
-            next unless $filter->($action);
-
-            my $sort_index =
-              ( $depth - $root_depth )
-              ;    # how far an action is from the origin of the ACL
-            $self->app->log->debug("... $action at sort index $sort_index")
-              if $self->app->debug;
-            $self->append_rule_to_action( $action, $sort_index, $rule, $cxt,
-            );
-        }
-    }
-}
-
-sub get_cxt_for_rule {
-    my ( $self, $rule ) = @_;
-    $self->{cxt_info}{$rule};
-}
-
-sub append_rule_to_action {
-    my ( $self, $action, $sort_index, $rule, $cxt ) = @_;
-    $sort_index = 0 if $sort_index < 0;
-    push @{ $self->get_action_data($action)->{rules_radix}[$sort_index] ||=
-          [] }, $rule;
-
-}
-
-sub get_action_data {
-    my ( $self, $action ) = @_;
-    $self->actions->{ $action->reverse } ||= { action => $action };
-}
-
-sub get_rules {
-    my ( $self, $action ) = @_;
-
-    map { $_ ? @$_ : () }
-      @{ ( $self->get_action_data($action) || return () )->{rules_radix} };
-}
-
-sub check_action_rules {
-    my ( $self, $c, $action ) = @_;
-
-    my $last_rule;
-
-    my $rule_exception;
-
-    {
-        local $SIG{__DIE__}; # nobody messes with us!
-        local $@;
-
-        eval {
-            foreach my $rule ( $self->get_rules($action) )
-            {
-                $c->log->debug( "running ACL rule $rule defined at "
-                      . $self->get_cxt_for_rule($rule)
-                      . " on $action" )
-                  if $c->debug;
-                $last_rule = $rule;
-                $c->$rule($action);
-            }
-        };
-
-        $rule_exception = $@;
-    }
-
-    if ($rule_exception) {
-        if ( ref $rule_exception and $rule_exception == $DENIED ) {
-            die "Access to $action denied by rule $last_rule (defined at "
-              . $self->get_cxt_for_rule($last_rule) . ").\n";
-        }
-        elsif ( ref $rule_exception and $rule_exception == $ALLOWED ) {
-            $c->log->debug(
-                    "Access to $action allowed by rule $last_rule (defined at "
-                  . $self->get_cxt_for_rule($last_rule)
-                  . ")" )
-              if $c->debug;
-            return;
-        }
-        else {
-
-            # unknown exception
-            # FIXME - add context (the user should know what rule
-            # generated the exception, and where it was added)
-            Class::Throwable->throw(
-                "An error occurred while evaluating ACL rules.", $rule_exception );
-        }
-    }
-
-    # no rules means allow by default
-}
-
-sub _pretty_caller {
-    my ( undef, $file, $line ) = _find_caller();
-    return "$file line $line";
-}
-
-sub _find_caller {
-    for ( my $i = 2 ; ; $i++ ) {
-        my @caller = caller($i) or die "Error determining caller";
-        return @caller if $caller[0] !~ /^Catalyst::Plugin::Authorization::ACL/;
-    }
-}
-
-__PACKAGE__->meta->make_immutable;
-
-__PACKAGE__;
-
-__END__
-
-=pod
-
-=head1 NAME
-
-Catalyst::Plugin::Authorization::ACL::Engine - The backend that computes ACL
-checks for L<Catalyst::Plugin::Authorization::ACL>.
-
-=head1 SYNOPSIS
-
-	# internal
-
-=head1 METHODS
-
-=over 4
-
-=item new $app
-
-Create a new rule engine for $app
-
-=item add_allow $cond
-
-=item add_deny $cond
-
-fudge C<$cond>, make cond into a rule, and C<add_rule>
-
-=item add_rule $path, $rule
-
-Add rule to all actions under $path
-
-=item append_rule_to_action $action, $index, $rule, $cxt
-
-Append C<$rule> to C<$action> in slot C<$index>, and store context info C<$cxt>
-for error reporting.
-
-=item check_action_rules $action
-
-Evaluate the rules for an action
-
-=item fudge_condition $thingy
-
-Converts a C<$thingy> into a subref, for DWIM goodness. See the main ACL docs.
-
-=item get_action_data $action
-
-=item get_cxt_for_rule $rule
-
-=item get_rules
-
-=back
-
-=head1 DESCRIPTION
-
-This is the engine which executes the access control checks for
-L<Catalyst::Plugin::Authorization::ACL>. Please use that module directly.
-
-=head1 TODO
-
-    * external uris -> private paths
-
-=cut
-
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/t/01use.t b/sources/Catalyst-Plugin-Authorization-ACL/t/01use.t
deleted file mode 100644
index 7737a00..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/t/01use.t
+++ /dev/null
@@ -1,3 +0,0 @@
-use Test::More tests => 1;
-
-use_ok('Catalyst::Plugin::Authorization::ACL');
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/t/02pod.t b/sources/Catalyst-Plugin-Authorization-ACL/t/02pod.t
deleted file mode 100644
index 1647794..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/t/02pod.t
+++ /dev/null
@@ -1,7 +0,0 @@
-use Test::More;
-
-eval "use Test::Pod 1.14";
-plan skip_all => 'Test::Pod 1.14 required' if $@;
-plan skip_all => 'set TEST_POD to enable this test' unless $ENV{TEST_POD};
-
-all_pod_files_ok();
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp.pm b/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp.pm
deleted file mode 100644
index c967bef..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp.pm
+++ /dev/null
@@ -1,78 +0,0 @@
-package ACLTestApp;
-
-use strict;
-use warnings;
-no warnings 'uninitialized';
-
-use Catalyst qw/
-	Session
-	Session::Store::Dummy
-	Session::State::Cookie
-
-	Authentication
-	Authentication::Store::Minimal
-	Authentication::Credential::Password
-
-	Authorization::Roles
-	Authorization::ACL
-/;
-
-use Catalyst::Plugin::Authorization::ACL::Engine qw/$DENIED $ALLOWED/;
-
-__PACKAGE__->config(
-    authentication => {
-        users => {
-            foo => {
-                password => "bar",
-                os => "windows",
-            },
-            gorch => {
-                password => "moose",
-                roles => [qw/child/],
-                os => "linux",
-            },
-            quxx => {
-                password => "ding",
-                roles => [qw/zoo_worker moose_trainer/],
-                os => "osx",
-            },
-        },
-    },
-    acl => {
-        deny => ["/restricted"],
-    }
-);
-
-__PACKAGE__->setup;
-
-__PACKAGE__->allow_access_if("/", sub { 1 }); # just to test that / can be applied to
-
-__PACKAGE__->deny_access_unless_any("/lioncage", [qw/zoo_worker lion_tamer/]);
-
-# this now in config
-# __PACKAGE__->deny_access_unless("/restricted", sub { 0 }); # no one can access
-
-__PACKAGE__->deny_access_unless("/zoo", sub {
-	my ( $c, $action ) = @_;
-	$c->user;
-}); # only people who have bought a ticket can enter
-
-__PACKAGE__->deny_access_unless("/zoo/rabbit", ["child"]); # the petting zoo is for children
-
-__PACKAGE__->deny_access_unless("/zoo/moose", [qw/moose_trainer/]);
-
-__PACKAGE__->acl_add_rule("/zoo/penguins/tux", sub {
-	my ( $c, $action ) = @_;
-	my $user = $c->user;
-	die ( ( $user && $user->os eq "linux" ) ? 
-                $Catalyst::Plugin::Authorization::ACL::Engine::ALLOWED : 
-                $Catalyst::Plugin::Authorization::ACL::Engine::DENIED );
-});
-
-__PACKAGE__->allow_access_if("/zoo/penguins/madagascar", sub { 
-	my ( $c, $action ) = @_;
-	my $user = $c->user;
-	$user && $user->os ne "windows";
-});
-
-__PACKAGE__
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp/Controller/Auth.pm b/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp/Controller/Auth.pm
deleted file mode 100644
index 1459556..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp/Controller/Auth.pm
+++ /dev/null
@@ -1,43 +0,0 @@
-#!/usr/bin/perl
-
-package ACLTestApp::Controller::Auth;
-use base qw/Catalyst::Controller/;
-
-use strict;
-use warnings;
-
-sub login : Local {
-	my ( $self, $c ) = @_;
-	$c->res->body( $c->login ? "login successful" : "login failed" );
-}
-
-sub logout : Local {
-	my ( $self, $c ) = @_;
-	$c->logout;
-	$c->res->body( "goodbye" );
-}
-
-sub check : Local {
-	my ( $self, $c ) = @_;
-	$c->res->body( $c->user ? "logged in" : "guest" );
-}
-
-__PACKAGE__;
-
-__END__
-
-=pod
-
-=head1 NAME
-
-ACLTestApp::Controller::Auth - 
-
-=head1 SYNOPSIS
-
-	use ACLTestApp::Controller::Auth;
-
-=head1 DESCRIPTION
-
-=cut
-
-
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp/Controller/LionCage.pm b/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp/Controller/LionCage.pm
deleted file mode 100644
index 0c129b9..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp/Controller/LionCage.pm
+++ /dev/null
@@ -1,32 +0,0 @@
-#!/usr/bin/perl
-
-package ACLTestApp::Controller::LionCage;
-use base qw/Catalyst::Controller/;
-
-use strict;
-use warnings;
-
-sub default : Private {
-	my ( $self, $c ) = @_;
-	$c->res->body( "no-one is allowed in here" );
-}
-
-__PACKAGE__;
-
-__END__
-
-=pod
-
-=head1 NAME
-
-ACLTestApp::Controller::LionCage - 
-
-=head1 SYNOPSIS
-
-	use ACLTestApp::Controller::LionCage;
-
-=head1 DESCRIPTION
-
-=cut
-
-
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp/Controller/Root.pm b/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp/Controller/Root.pm
deleted file mode 100644
index f1266a1..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp/Controller/Root.pm
+++ /dev/null
@@ -1,32 +0,0 @@
-package ACLTestApp::Controller::Root;
-
-use strict;
-use warnings;
-no warnings 'uninitialized';
-use base 'Catalyst::Controller';
-__PACKAGE__->config->{namespace} = '';
-
-sub restricted : Local {
-	my ( $self, $c ) = @_;
-	$c->res->body( "restricted" );
-}
-
-sub default : Private {
-	my ( $self, $c ) = @_;
-	$c->res->body( "welcome to the zoo!" );
-	
-}
-
-sub access_denied : Private {
-    my ( $self, $c ) = @_;
-    $c->res->body($c->res->body . 'denied');
-}
-
-sub end : Private {
-    my ( $self, $c ) = @_;
-    if ($c->res->body !~ /denied/) {
-        $c->res->body($c->res->body . 'allowed');
-    }
-}
-
-__PACKAGE__;
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp/Controller/Zoo.pm b/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp/Controller/Zoo.pm
deleted file mode 100644
index 839fb68..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp/Controller/Zoo.pm
+++ /dev/null
@@ -1,42 +0,0 @@
-#!/usr/bin/perl
-
-package ACLTestApp::Controller::Zoo;
-use base qw/Catalyst::Controller/;
-
-use strict;
-use warnings;
-
-sub moose : Local {
-	my ( $self, $c ) = @_;
-	$c->res->body("moose");
-}
-
-sub elk : Local {
-	my ( $self, $c ) = @_;
-	$c->res->body("elk ");
-}
-
-sub rabbit : Local {
-	my ( $self, $c ) = @_;
-	$c->res->body("rabbit ");
-}
-
-__PACKAGE__;
-
-__END__
-
-=pod
-
-=head1 NAME
-
-ACLTestApp::Controller::Zoo - 
-
-=head1 SYNOPSIS
-
-	use ACLTestApp::Controller::Zoo;
-
-=head1 DESCRIPTION
-
-=cut
-
-
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp/Controller/Zoo/Penguins.pm b/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp/Controller/Zoo/Penguins.pm
deleted file mode 100644
index 776522f..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp/Controller/Zoo/Penguins.pm
+++ /dev/null
@@ -1,41 +0,0 @@
-#!/usr/bin/perl
-
-package ACLTestApp::Controller::Zoo::Penguins;
-use base qw/Catalyst::Controller/;
-
-use strict;
-use warnings;
-
-sub emperor : Local {
-	my ( $self, $c ) = @_;
-	$c->res->body("emperor penguin");
-}
-
-sub tux : Local {
-	my ( $self, $c ) = @_;
-	$c->res->body("tux");
-}
-
-sub madagascar : Local {
-	my ( $self, $c ) = @_;
-	$c->res->body("madagascar");
-}
-
-__PACKAGE__;
-
-__END__
-
-=pod
-
-=head1 NAME
-
-ACLTestApp::Controller::Zoo - 
-
-=head1 SYNOPSIS
-
-	use ACLTestApp::Controller::Zoo;
-
-=head1 DESCRIPTION
-
-=cut
-
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp2.pm b/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp2.pm
deleted file mode 100644
index 43407d8..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp2.pm
+++ /dev/null
@@ -1,17 +0,0 @@
-package ACLTestApp2;
-
-use strict;
-use warnings;
-no warnings 'uninitialized';
-
-use Catalyst qw/
-  Authorization::ACL
-/;
-
-__PACKAGE__->setup;
-
-__PACKAGE__->deny_access("/");
-
-__PACKAGE__->allow_access("/bar");
-
-__PACKAGE__;
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp2/Controller/Root.pm b/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp2/Controller/Root.pm
deleted file mode 100644
index e903cc5..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp2/Controller/Root.pm
+++ /dev/null
@@ -1,44 +0,0 @@
-package ACLTestApp2::Controller::Root;
-
-use strict;
-use warnings;
-no warnings 'uninitialized';
-use base 'Catalyst::Controller';
-__PACKAGE__->config->{namespace} = '';
-
-sub foo : Local {
-    my ( $self, $c ) = @_;
-    $c->res->body( $c->res->body . "foo");
-}
-
-sub bar : Local {
-    my ( $self, $c ) = @_;
-    $c->res->body( $c->res->body . "bar");
-}
-
-sub gorch : Local {
-    my ( $self, $c, $frozjob ) = @_;
-    $c->res->body( $c->res->body . "gorch");
-    $c->res->body( $c->res->body . "&frozjob=$frozjob");
-}
-
-sub end : Private {
-    my ( $self, $c ) = @_;
-
-    $c->res->body( join " ",
-        ( $c->stash->{denied} || @{ $c->error } ? "denied" : "allowed" ),
-        $c->res->body );
-}
-
-sub access_denied : Private {
-    my ( $self, $c, $action, $error ) = @_;
-
-    $c->res->header( 'X-Catalyst-ACL-Param-Action' => $action->reverse, 'X-Catalyst-ACL-Param-Error' => $error );
-    $c->res->body( join " ", "handled", $c->res->body );
-
-    $c->stash->{denied} = 1;
-
-    $c->forcibly_allow_access if $c->action->name eq "gorch";
-}
-
-__PACKAGE__;
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/t/live_app.t b/sources/Catalyst-Plugin-Authorization-ACL/t/live_app.t
deleted file mode 100644
index bd5e68e..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/t/live_app.t
+++ /dev/null
@@ -1,103 +0,0 @@
-#!/usr/bin/perl
-
-use strict;
-use warnings;
-
-use lib "t/lib";
-
-use Test::More;
-
-BEGIN {
-    eval {
-		require Test::WWW::Mechanize::Catalyst;
-		require Catalyst::Plugin::Authorization::Roles;
-		require Catalyst::Plugin::Authentication;
-		require Catalyst::Plugin::Session;
-		require Catalyst::Plugin::Session::State::Cookie;
-    } or plan 'skip_all' => "A bunch of plugins are required for this test... Look in the source if you really care... $@";
-    plan tests => 97;
-}
-
-use Test::WWW::Mechanize::Catalyst 'ACLTestApp';
-
-my $m = Test::WWW::Mechanize::Catalyst->new;
-
-my $u = "http://localhost";
-
-is_allowed("", "welcome");
-
-is_denied("restricted");
-is_denied("lioncage");
-is_denied("zoo/elk");
-is_denied("zoo/moose");
-is_denied("zoo/rabbit");
-is_denied("zoo/penguins/emperor");
-is_denied("zoo/penguins/tux");
-is_denied("zoo/penguins/madagascar");
-
-login(qw/foo bar/);
-
-is_allowed("auth/check", "logged in");
-
-is_denied("restricted");
-is_denied("lioncage");
-is_allowed("zoo/elk");
-is_denied("zoo/moose");
-is_denied("zoo/rabbit");
-is_allowed("zoo/penguins/emperor");
-is_denied("zoo/penguins/tux");
-is_allowed("zoo/penguins/madagascar");
-
-is_allowed("auth/logout");
-
-is_denied("restricted");
-is_denied("lioncage");
-is_denied("zoo/elk");
-is_denied("zoo/moose");
-is_denied("zoo/rabbit");
-is_denied("zoo/penguins/emperor");
-is_denied("zoo/penguins/tux");
-is_denied("zoo/penguins/madagascar");
-
-login(qw/gorch moose/);
-
-is_allowed("zoo/elk");
-is_denied("zoo/moose");
-is_allowed("zoo/rabbit");
-is_denied("lioncage");
-is_denied("restricted");
-is_allowed("zoo/penguins/emperor");
-is_allowed("zoo/penguins/tux");
-is_allowed("zoo/penguins/madagascar");
-
-login(qw/quxx ding/);
-
-is_allowed("zoo/elk");
-is_allowed("zoo/moose");
-is_denied("zoo/rabbit");
-is_allowed("lioncage");
-is_denied("restricted");
-is_allowed("zoo/penguins/emperor");
-is_denied("zoo/penguins/tux");
-is_allowed("zoo/penguins/madagascar");
-
-sub login {
-	my ( $l, $p ) = @_;
-	is_allowed("auth/login?login=$l&password=$p", "login successful");
-}
-
-sub is_denied {
-	my $path = shift;
-	local $Test::Builder::Level = 2;
-	$m->get_ok("$u/$path", "get '$path'");
-	$m->content_is("denied", "access to '$path' is denied");
-}
-
-sub is_allowed {
-	my ( $path, $contains ) = @_;
-	$path ||= "";
-	$m->get_ok("$u/$path", "get '$path'");
-	$m->content_contains( $contains, "'$path' contains '$contains'") if $contains;
-	$m->content_like(qr/allowed$/, "access to '$path' is allowed");
-}
-
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/t/more_live_app.t b/sources/Catalyst-Plugin-Authorization-ACL/t/more_live_app.t
deleted file mode 100644
index 6187079..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/t/more_live_app.t
+++ /dev/null
@@ -1,43 +0,0 @@
-#!/usr/bin/perl
-
-use strict;
-use warnings;
-
-use lib "t/lib";
-
-use Test::More;
-
-BEGIN {
-    eval {
-		require Test::WWW::Mechanize::Catalyst;
-    } or plan 'skip_all' => "Test::WWW::Mechanize::Catalyst required";
-    plan tests => 14;
-}
-
-use Test::WWW::Mechanize::Catalyst 'ACLTestApp2';
-
-my $m = Test::WWW::Mechanize::Catalyst->new;
-
-my $u = "http://localhost";
-
-$m->get_ok( "$u/foo", "get foo" );
-$m->content_contains( "", "access to end forbidden" );
-
-$m->get_ok( "$u/bar", "get bar" );
-$m->content_contains( "bar", "access to end forbidden" );
-
-ACLTestApp2->acl_allow_root_internals;
-
-$m->get_ok( "$u/foo", "get foo" );
-$m->content_contains( "denied handled", "denied, handled" );
-
-$m->get_ok( "$u/bar", "get bar" );
-$m->content_contains( "allowed bar", "allowed" );
-
-$m->get_ok( "$u/gorch", "get gorch" );
-$m->content_contains( "denied handled gorch", "denied but overridden by handler" );
-
-$m->get_ok( "$u/gorch/wozzle", "get gorch" );
-$m->content_contains( "frozjob=wozzle", "overriden acces has params intact" );
-is( $m->res->header( 'X-Catalyst-ACL-Param-Action' ), 'gorch', '$action param to access_denied' );
-like( $m->res->header( 'X-Catalyst-ACL-Param-Error' ), qr{Access to gorch denied by rule}, '$error param to access_denied' );

-- 
Alioth's /usr/local/bin/git-commit-notice on /srv/git.debian.org/git/pkg-perl/packages/libcatalyst-modules-perl.git



More information about the Pkg-perl-cvs-commits mailing list