[libcatalyst-modules-perl] 01/01: replace bundled Catalyst-Plugin-Authorization-ACL with a dependency on libcatalyst-plugin-authorization-acl-perl
Damyan Ivanov
dmn at moszumanska.debian.org
Thu May 15 07:01:03 UTC 2014
This is an automated email from the git hooks/post-receive script.
dmn pushed a commit to branch master
in repository libcatalyst-modules-perl.
commit 642feb8162689cec01b401bb8e1da7883eaddf80
Author: Damyan Ivanov <dmn at debian.org>
Date: Thu May 15 07:00:40 2014 +0000
replace bundled Catalyst-Plugin-Authorization-ACL with a dependency on libcatalyst-plugin-authorization-acl-perl
---
bundle/05/Catalyst-Plugin-Authorization-ACL | 1 -
debian/control | 1 +
debian/copyright | 7 -
.../pod-spelling.patch | 16 -
.../Catalyst-Plugin-Authorization-ACL/series | 1 -
sources/Catalyst-Plugin-Authorization-ACL/Changes | 56 --
sources/Catalyst-Plugin-Authorization-ACL/MANIFEST | 31 -
sources/Catalyst-Plugin-Authorization-ACL/META.yml | 46 --
.../Catalyst-Plugin-Authorization-ACL/Makefile.PL | 33 -
sources/Catalyst-Plugin-Authorization-ACL/README | 314 --------
sources/Catalyst-Plugin-Authorization-ACL/TODO | 22 -
.../inc/Module/AutoInstall.pm | 805 ---------------------
.../inc/Module/Install.pm | 430 -----------
.../inc/Module/Install/AutoInstall.pm | 61 --
.../inc/Module/Install/Base.pm | 78 --
.../inc/Module/Install/Can.pm | 81 ---
.../inc/Module/Install/Fetch.pm | 93 ---
.../inc/Module/Install/Include.pm | 34 -
.../inc/Module/Install/Makefile.pm | 268 -------
.../inc/Module/Install/Metadata.pm | 624 ----------------
.../inc/Module/Install/Win32.pm | 64 --
.../inc/Module/Install/WriteAll.pm | 60 --
.../lib/Catalyst/Plugin/Authorization/ACL.pm | 525 --------------
.../Catalyst/Plugin/Authorization/ACL/Engine.pm | 359 ---------
.../Catalyst-Plugin-Authorization-ACL/t/01use.t | 3 -
.../Catalyst-Plugin-Authorization-ACL/t/02pod.t | 7 -
.../t/lib/ACLTestApp.pm | 78 --
.../t/lib/ACLTestApp/Controller/Auth.pm | 43 --
.../t/lib/ACLTestApp/Controller/LionCage.pm | 32 -
.../t/lib/ACLTestApp/Controller/Root.pm | 32 -
.../t/lib/ACLTestApp/Controller/Zoo.pm | 42 --
.../t/lib/ACLTestApp/Controller/Zoo/Penguins.pm | 41 --
.../t/lib/ACLTestApp2.pm | 17 -
.../t/lib/ACLTestApp2/Controller/Root.pm | 44 --
.../Catalyst-Plugin-Authorization-ACL/t/live_app.t | 103 ---
.../t/more_live_app.t | 43 --
36 files changed, 1 insertion(+), 4494 deletions(-)
diff --git a/bundle/05/Catalyst-Plugin-Authorization-ACL b/bundle/05/Catalyst-Plugin-Authorization-ACL
deleted file mode 120000
index 5b0b6a3..0000000
--- a/bundle/05/Catalyst-Plugin-Authorization-ACL
+++ /dev/null
@@ -1 +0,0 @@
-../../sources/Catalyst-Plugin-Authorization-ACL
\ No newline at end of file
diff --git a/debian/control b/debian/control
index c26f206..9658a5a 100644
--- a/debian/control
+++ b/debian/control
@@ -105,6 +105,7 @@ Depends: ${misc:Depends},
libcatalyst-action-renderview-perl,
libcatalyst-authentication-credential-authen-simple-perl,
libcatalyst-authentication-store-dbix-class-perl,
+ libcatalyst-plugin-authorization-acl-perl,
libcatalyst-component-instancepercontext-perl,
libcatalyst-controller-formbuilder-perl,
libcatalyst-controller-html-formfu-perl,
diff --git a/debian/copyright b/debian/copyright
index 43d4d7f..e06a928 100644
--- a/debian/copyright
+++ b/debian/copyright
@@ -9,13 +9,6 @@ Copyright: 2005-2006, Florian Ragwitz <rafl at debian.org>
2010-2013, gregor herrmann <gregoa at debian.org>
License: Artistic or GPL-1+
-Files: sources/Catalyst-Plugin-Authorization-ACL
-Copyright: 2005-2009, Yuval Kogman <nothingmuch at woobling.org>
- 2005-2009, Jess Robinson <cpan at desert-island.me.uk>
- 2005-2009, Rafael Kitover <rkitover at cpan.org>
-X-Upstream-Maintainers: Rafael Kitover <rkitover at cpan.org>
-License: Artistic or GPL-1+
-
Files: sources/Catalyst-Plugin-Session-Store-DBIC
Copyright: 2006-2009, Daniel Westermann-Clark <danieltwc at cpan.org>
X-Upstream-Maintainers: Florian Ragwitz <rafl at debian.org>
diff --git a/debian/patches/Catalyst-Plugin-Authorization-ACL/pod-spelling.patch b/debian/patches/Catalyst-Plugin-Authorization-ACL/pod-spelling.patch
deleted file mode 100644
index ac2b69b..0000000
--- a/debian/patches/Catalyst-Plugin-Authorization-ACL/pod-spelling.patch
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: POD spelling
- begining -> beginning
-Author: Damyan Ivanov <dmn at debian.org>
-Forwarded: https://rt.cpan.org/Ticket/Display?id=95566
-
---- a/lib/Catalyst/Plugin/Authorization/ACL.pm
-+++ b/lib/Catalyst/Plugin/Authorization/ACL.pm
-@@ -336,7 +336,7 @@ policy, access to the path will be permi
-
- To apply a rule to an action or group of actions you must supply a path.
-
--This path is what you should see dumped at the begining of the L<Catalyst>
-+This path is what you should see dumped at the beginning of the L<Catalyst>
- server's debug output.
-
- For example, for the C<foo> action defined at the root level of your
diff --git a/debian/patches/Catalyst-Plugin-Authorization-ACL/series b/debian/patches/Catalyst-Plugin-Authorization-ACL/series
deleted file mode 100644
index ad85da2..0000000
--- a/debian/patches/Catalyst-Plugin-Authorization-ACL/series
+++ /dev/null
@@ -1 +0,0 @@
-pod-spelling.patch
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/Changes b/sources/Catalyst-Plugin-Authorization-ACL/Changes
deleted file mode 100644
index 95bf002..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/Changes
+++ /dev/null
@@ -1,56 +0,0 @@
-Revision history for Perl extension Catalyst::Plugin::Authorization::ACL
-
-0.15 2009-10-18 05:56:51
- - apply fix from RT#50604 (filter undef actions when building tree)
-
-0.14 2009-09-30 22:20:41
- - add 'deny_access_unless_any' and 'allow_access_if_any' as shortcuts
- for any role in a list
- - fix 'uninitialized' warning in tests
-
-0.13 2009-09-26 03:34:16
- - fix use of $dispatcher->tree warning
- - fix actions in testapp warning
-
-0.12 2009-09-25 09:35:51
- - workaround for a test failure on some configurations of Strawberry
- Perl
- - add test_requires for things the tests depend on
-
-0.11 2009-04-21
- - switch from NEXT to MRO::Compat
-
-0.10 2008-10-13
- - fix access_denied action support
-
-0.09 2008-08-22
- - fix the overwriting of $c->req->args for access_denied handlers
-
-0.08 2006-07-21 20:01:00
- - protect ACL::Engine from custom $SIG{__DIE__} handlers
-
-0.07 2006-07-05 23:15:27
- - support for ACL setup in app config
- - bug fix for private access_denied action
-
-0.06 2005-12-25 20:37:00
- - Added forcibly_allow_access, proper denial handling
- - allow for constant conditions
- - i think there was something else
-
-0.05 2005-12-25 20:37:00
- - Forgot to changelog this release ;-)
-
-0.04 2005-12-08 10:15:00
- - Fix a bug with ACLs on "/"
-
-0.03 2005-12-04 22:07:00
- - Maybe some tiny doc fixes
- - No longer relies on Test::Plan which had some trouble with windows
- and was used incorrectly anyhow ;-)
-
-0.02 ???
- - can't recall, may have been drunk
-
-0.01 ???
- - Initial release.
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/MANIFEST b/sources/Catalyst-Plugin-Authorization-ACL/MANIFEST
deleted file mode 100644
index f93fb8c..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/MANIFEST
+++ /dev/null
@@ -1,31 +0,0 @@
-Changes
-inc/Module/AutoInstall.pm
-inc/Module/Install.pm
-inc/Module/Install/AutoInstall.pm
-inc/Module/Install/Base.pm
-inc/Module/Install/Can.pm
-inc/Module/Install/Fetch.pm
-inc/Module/Install/Include.pm
-inc/Module/Install/Makefile.pm
-inc/Module/Install/Metadata.pm
-inc/Module/Install/Win32.pm
-inc/Module/Install/WriteAll.pm
-lib/Catalyst/Plugin/Authorization/ACL.pm
-lib/Catalyst/Plugin/Authorization/ACL/Engine.pm
-Makefile.PL
-MANIFEST This list of files
-META.yml
-README
-t/01use.t
-t/02pod.t
-t/lib/ACLTestApp.pm
-t/lib/ACLTestApp/Controller/Auth.pm
-t/lib/ACLTestApp/Controller/LionCage.pm
-t/lib/ACLTestApp/Controller/Root.pm
-t/lib/ACLTestApp/Controller/Zoo.pm
-t/lib/ACLTestApp/Controller/Zoo/Penguins.pm
-t/lib/ACLTestApp2.pm
-t/lib/ACLTestApp2/Controller/Root.pm
-t/live_app.t
-t/more_live_app.t
-TODO
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/META.yml b/sources/Catalyst-Plugin-Authorization-ACL/META.yml
deleted file mode 100644
index d6d2284..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/META.yml
+++ /dev/null
@@ -1,46 +0,0 @@
----
-abstract: 'ACL support for Catalyst applications.'
-author:
- - 'Yuval Kogman <nothingmuch at woobling.org>'
-build_requires:
- Catalyst::Plugin::Session: 0
- Catalyst::Plugin::Session::State::Cookie: 0
- ExtUtils::MakeMaker: 6.42
- Test::More: 0
- Test::WWW::Mechanize::Catalyst: 0
-configure_requires:
- ExtUtils::MakeMaker: 6.42
-distribution_type: module
-generated_by: 'Module::Install version 0.91'
-license: perl
-meta-spec:
- url: http://module-build.sourceforge.net/META-spec-v1.4.html
- version: 1.4
-name: Catalyst-Plugin-Authorization-ACL
-no_index:
- directory:
- - inc
- - t
-provides:
- Catalyst::Plugin::Authorization::ACL:
- file: lib/Catalyst/Plugin/Authorization/ACL.pm
- version: 0.15
- Catalyst::Plugin::Authorization::ACL::Engine:
- file: lib/Catalyst/Plugin/Authorization/ACL/Engine.pm
-requires:
- Catalyst::Plugin::Authentication: 0
- Catalyst::Plugin::Authorization::Roles: 0
- Catalyst::Runtime: 5.80013
- Class::Data::Inheritable: 0
- Class::Throwable: 0
- MRO::Compat: 0
- Moose: 0
- Tree::Simple: 0
- Tree::Simple::Visitor::FindByPath: 0
- Tree::Simple::Visitor::GetAllDescendents: 0
- namespace::autoclean: 0
- perl: 5.8.0
-resources:
- license: http://dev.perl.org/licenses/
- repository: http://dev.catalyst.perl.org/repos/Catalyst/trunk/Catalyst-Plugin-Authorization-ACL/
-version: 0.15
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/Makefile.PL b/sources/Catalyst-Plugin-Authorization-ACL/Makefile.PL
deleted file mode 100644
index 7b54e33..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/Makefile.PL
+++ /dev/null
@@ -1,33 +0,0 @@
-use inc::Module::Install 0.91;
-
-if ( -e 'MANIFEST.SKIP' ) {
- system( 'pod2text lib/Catalyst/Plugin/Authorization/ACL.pm > README' );
-}
-
-perl_version '5.008';
-
-name 'Catalyst-Plugin-Authorization-ACL';
-all_from 'lib/Catalyst/Plugin/Authorization/ACL.pm';
-
-test_requires 'Test::More';
-test_requires 'Catalyst::Plugin::Session';
-test_requires 'Catalyst::Plugin::Session::State::Cookie';
-test_requires 'Test::WWW::Mechanize::Catalyst';
-
-requires 'Catalyst::Runtime' => '5.80013';
-requires 'Catalyst::Plugin::Authentication';
-requires 'Catalyst::Plugin::Authorization::Roles';
-requires 'Moose';
-requires 'MRO::Compat';
-requires 'namespace::autoclean';
-requires 'Class::Data::Inheritable';
-requires 'Class::Throwable';
-requires 'Tree::Simple';
-requires 'Tree::Simple::Visitor::FindByPath';
-requires 'Tree::Simple::Visitor::GetAllDescendents';
-
-resources repository => 'http://dev.catalyst.perl.org/repos/Catalyst/trunk/Catalyst-Plugin-Authorization-ACL/';
-
-auto_provides;
-auto_install;
-WriteAll;
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/README b/sources/Catalyst-Plugin-Authorization-ACL/README
deleted file mode 100644
index 3cced38..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/README
+++ /dev/null
@@ -1,314 +0,0 @@
-NAME
- Catalyst::Plugin::Authorization::ACL - ACL support for Catalyst
- applications.
-
-SYNOPSIS
- use Catalyst qw/
- Authentication
- Authorization::Roles
- Authorization::ACL
- /;
-
- __PACKAGE__->setup;
-
- __PACKAGE__->deny_access_unless(
- "/foo/bar",
- [qw/nice_role/],
- );
-
- __PACKAGE__->allow_access_if(
- "/foo/bar/gorch",
- sub { return $boolean },
- );
-
-DESCRIPTION
- This module provides Access Control List style path protection, with
- arbitrary rules for Catalyst applications. It operates only on the
- Catalyst private namespace, at least at the moment.
-
- The two hierarchies of actions and controllers in Catalyst are:
-
- Private Namespace
- Every action has its own private path. This path reflects the Perl
- namespaces the actions were born in, and the namespaces of their
- controllers.
-
- External Namespace
- Some actions are also directly accessible from the outside, via a
- URL.
-
- The private and external paths will be the same, if you are using
- Local actions. Alternatively you can use "Path", "Regex", or
- "Global" to specify a different external path for your action.
-
- The ACL module currently only knows to exploit the private namespace. In
- the future extensions may be made to support external namespaces as
- well.
-
- Various types of rules are supported, see the list under "RULES".
-
- When a path is visited, rules are tested one after the other, with the
- most exact rule fitting the path first, and continuing up the path.
- Testing continues until a rule explcitly allows or denies access.
-
-METHODS
- allow_access_if
- Arguments: $path, $rule
-
- Check the rule condition and allow access to the actions under $path if
- the rule returns true.
-
- This is normally useful to allow acces only to a specific part of a tree
- whose parent has a "deny_access_unless" clause attached to it.
-
- If the rule test returns false access is not denied or allowed. Instead
- the next rule in the chain will be checked - in this sense the
- combinatory behavior of these rules is like logical OR.
-
- allow_access_if_any
- Arguments: $path, \@roles
-
- Same as above for any role in the list.
-
- deny_access_unless
- Arguments: $path, $rule
-
- Check the rule condition and disallow access if the rule returns false.
-
- This is normally useful to restrict access to any portion of the
- application unless a certain condition can be met.
-
- If the rule test returns true access is not allowed or denied. Instead
- the next rule in the chain will be checked - in this sense the
- combinatory behavior of these rules is like logical AND.
-
- deny_access_unless_any
- Arguments: $path, \@roles
-
- Same as above for any role in the list.
-
- allow_access
- deny_access
- Arguments: $path
-
- Unconditionally allow or deny access to a path.
-
- acl_add_rule
- Arguments: $path, $rule, [ $filter ]
-
- Manually add a rule to all the actions under $path using the more
- flexible (but more verbose) method:
-
- __PACKAGE__->acl_add_rule(
- "/foo",
- sub { ... }, # see FLEXIBLE RULES below
- sub {
- my $action = shift;
- # return a true value if you want to apply the rule to this action
- # called for all the actions under "/foo"
- }
- };
-
- In this case the rule must be a sub reference (or method name) to be
- invoked on $c.
-
- The default filter will skip all actions starting with an underscore,
- namely "_DISPATCH", "_AUTO", etc (but not "auto", "begin", et al).
-
- acl_access_denied
- Arguments: $c, $class, $action, $err
-
- acl_access_allowed
- Arguments: $c, $class, $action
-
- The default event handlers for access denied or allowed conditions. See
- below on handling access violations.
-
- acl_allow_root_internals
- Adds rules that permit access to the root controller (YourApp.pm)
- "auto", "begin" and "end" unconditionally.
-
-EXTENDED METHODS
- execute
- The hook for rule evaluation
-
- setup_actions
-RULE EVALUATION
- When a rule is attached to an action the "distance" from the path it was
- specified in is recorded. The closer the path is to the rule, the
- earlier it will be checked.
-
- Any rule can either explicitly deny or explicitly allow access to a
- particular action. If a rule does not explicitly allow or permit access,
- the next rule is checked, until the list of rules is finished. If no
- rule has determined a policy, access to the path will be permitted.
-
-PATHS
- To apply a rule to an action or group of actions you must supply a path.
-
- This path is what you should see dumped at the begining of the Catalyst
- server's debug output.
-
- For example, for the "foo" action defined at the root level of your
- application, specify "/foo". Under the "Moose" controller (e.g.
- "MyApp::C::Moose", the action "bar" will be "/moose/bar").
-
- The "distance" a path has from an action that is contained in it is the
- the difference in the number of slashes between the path of the action,
- and the path to which the rule was applied.
-
-RULES
- Easy Rules
- There are several kinds of rules you can create without using the
- complex interface described in "FLEXIBLE RULES".
-
- The easy rules are all predicate list oriented. "allow_access_if" will
- explicitly allow access if the predicate is true, and
- "deny_access_unless" will explicitly disallow if the predicate is false.
-
- Role Lists
- __PACAKGE__->deny_access_unless_any( "/foo/bar", [qw/admin moose_trainer/] );
-
- When the role is evaluated the
- Catalyst::Plugin::Authorization::Roles will be used to check whether
- the currently logged in user has the specified roles.
-
- If "allow_access_if_any" is used, the presence of any of the roles
- in the list will immediately permit access, and if
- "deny_access_unless_any" is used, the lack of all of the roles will
- immediately deny access.
-
- Similarly, if "allow_access_if" is used, the presence of all the
- roles will immediately permit access, and if "deny_access_unless" is
- used, the lack of any of the roles will immediately deny access.
-
- When specifying a role list without the
- Catalyst::Plugin::Authorization::Roles plugin loaded the ACL engine
- will throw an error.
-
- Predicate Code Reference / Method Name
- The code reference or method is invoked with the context and the
- action objects. The boolean return value will determine the behavior
- of the rule.
-
- __PACKAGE__->allow_access_if( "/gorch", sub { ... } );
- __PACKAGE__->deny_access_unless( "/moose", "method_name" );
-
- When specifying a method name the rule engine ensures that it can be
- invoked using "can" in UNIVERSAL.
-
- Constant
- You can use "undef", 0 and '' to use as a constant false predicate,
- or 1 to use as a constant true predicate.
-
- Flexible Rules
- These rules are the most annoying to write but provide the most
- flexibility.
-
- All access control is performed using exceptions -
- $Catalyst::Plugin::Authorization::ACL::Engine::DENIED, and
- $Catalyst::Plugin::Authorization::ACL::Engine::ALLOWED (these can be
- imported from the engine module).
-
- If no rule decides to explicitly allow or deny access, access will be
- permitted.
-
- Here is a rule that will always break out of rule processing by either
- explicitly allowing or denying access based on how much mojo the current
- user has:
-
- __PACKAGE__->acl_add_rule(
- "/foo",
- sub {
- my ( $c, $action ) = @_;
-
- if ( $c->user->mojo > 50 ) {
- die $ALLOWED;
- } else {
- die $DENIED;
- }
- }
- );
-
-HANDLING DENIAL
- There are two plugin methods that can be called when a rule makes a
- decision about an action:
-
- acl_access_allowed
- A no-op
-
- acl_access_denied
- Looks for a private action named "access_denied" from the denied
- action's controller and outwards (much like "auto"), and if none is
- found throws an access denied exception.
-
- forcibly_allow_access
- Within an "access_denied" action this will immediately cause the
- blocked action to be executed anyway.
-
- This means that you have several alternatives:
-
- Provide an "access_denied" action
- package MyApp::Controller::Foo;
-
- sub access_denied : Private {
- my ( $self, $c, $action ) = @_;
-
- ...
- $c->forcibly_allow_access
- if $you->mean_it eq "really";
- }
-
- If you call "forcibly_allow_access" then the blocked action will be
- immediately unblocked. Otherwise the execution of the action will cease,
- and return to it's caller or end.
-
- Cleanup in "end"
- sub end : Private {
- my ( $self, $c ) = @_;
-
- if ( $c->error and $c->error->[-1] eq "access denied" ) {
- $c->error(0); # clear the error
-
- # access denied
- } else {
- # normal end
- }
- }
-
- Override the plugin event handler methods
- package MyApp;
-
- sub acl_access_allowed {
- my ( $c, $class, $action ) = @_;
- ...
- }
-
- sub acl_access_denied {
- my ( $c, $class, $action, $err ) = @_;
- ...
- }
-
- $class is the controller class the $action object was going to be
- executed in, and $err is the exception cought during rule evaluation, if
- any (access is denied if a rule raises an exception).
-
-SEE ALSO
- Catalyst::Plugin::Authentication,
- Catalyst::Plugin::Authorization::Roles,
- <http://catalyst.perl.org/calendar/2005/24>
-
-AUTHOR
- Yuval Kogman <nothingmuch at woobling.org>
-
-CONTRIBUTORS
- castaway: Jess Robinson
-
- caelum: Rafael Kitover <rkitover at cpan.org>
-
-COPYRIGHT & LICENSE
- Copyright (c) 2008,2009 the aforementioned authors.
-
- This library is free software; you can redistribute it and/or modify it
- under the same terms as Perl itself.
-
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/TODO b/sources/Catalyst-Plugin-Authorization-ACL/TODO
deleted file mode 100644
index e19477b..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/TODO
+++ /dev/null
@@ -1,22 +0,0 @@
-Need to rewrite ACL/Engiine to get rid of Dispatcher::tree warning:
-
-02:04 <@t0m> Caelum: split the path, call get_containers, call get_action on them.. Something like that..
-02:05 <@t0m> Caelum: They're gonna delegate to methods on the tree anway under the hood, but the tree should be an implementation detail as far as you're concerned.
-02:05 <@t0m> Or, just document how to do it write with Chained, and mark ACL as deprecated :)
-
-Check for any role...earlier on RT:
-
-> If you want to check for either role, do something like this, described in "Flexible Rules":
->
-> use Catalyst::Plugin::Authorization::ACL::Engine qw/$ALLOWED $DENIED/;
->
-> __PACAKGE__->deny_access_unless( "/foo/bar", sub {
-> my ($c, $action) = @_;
-> if ($c->check_any_user_role(qw/admin user/)) {
-> die $ALLOWED;
-> } else {
-> die $DENIED;
-> }
-> } );
->
-> Perhaps we should have a syntax to make this easier?
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/AutoInstall.pm b/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/AutoInstall.pm
deleted file mode 100644
index dfb8ef7..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/AutoInstall.pm
+++ /dev/null
@@ -1,805 +0,0 @@
-#line 1
-package Module::AutoInstall;
-
-use strict;
-use Cwd ();
-use ExtUtils::MakeMaker ();
-
-use vars qw{$VERSION};
-BEGIN {
- $VERSION = '1.03';
-}
-
-# special map on pre-defined feature sets
-my %FeatureMap = (
- '' => 'Core Features', # XXX: deprecated
- '-core' => 'Core Features',
-);
-
-# various lexical flags
-my ( @Missing, @Existing, %DisabledTests, $UnderCPAN, $HasCPANPLUS );
-my (
- $Config, $CheckOnly, $SkipInstall, $AcceptDefault, $TestOnly, $AllDeps
-);
-my ( $PostambleActions, $PostambleUsed );
-
-# See if it's a testing or non-interactive session
-_accept_default( $ENV{AUTOMATED_TESTING} or ! -t STDIN );
-_init();
-
-sub _accept_default {
- $AcceptDefault = shift;
-}
-
-sub missing_modules {
- return @Missing;
-}
-
-sub do_install {
- __PACKAGE__->install(
- [
- $Config
- ? ( UNIVERSAL::isa( $Config, 'HASH' ) ? %{$Config} : @{$Config} )
- : ()
- ],
- @Missing,
- );
-}
-
-# initialize various flags, and/or perform install
-sub _init {
- foreach my $arg (
- @ARGV,
- split(
- /[\s\t]+/,
- $ENV{PERL_AUTOINSTALL} || $ENV{PERL_EXTUTILS_AUTOINSTALL} || ''
- )
- )
- {
- if ( $arg =~ /^--config=(.*)$/ ) {
- $Config = [ split( ',', $1 ) ];
- }
- elsif ( $arg =~ /^--installdeps=(.*)$/ ) {
- __PACKAGE__->install( $Config, @Missing = split( /,/, $1 ) );
- exit 0;
- }
- elsif ( $arg =~ /^--default(?:deps)?$/ ) {
- $AcceptDefault = 1;
- }
- elsif ( $arg =~ /^--check(?:deps)?$/ ) {
- $CheckOnly = 1;
- }
- elsif ( $arg =~ /^--skip(?:deps)?$/ ) {
- $SkipInstall = 1;
- }
- elsif ( $arg =~ /^--test(?:only)?$/ ) {
- $TestOnly = 1;
- }
- elsif ( $arg =~ /^--all(?:deps)?$/ ) {
- $AllDeps = 1;
- }
- }
-}
-
-# overrides MakeMaker's prompt() to automatically accept the default choice
-sub _prompt {
- goto &ExtUtils::MakeMaker::prompt unless $AcceptDefault;
-
- my ( $prompt, $default ) = @_;
- my $y = ( $default =~ /^[Yy]/ );
-
- print $prompt, ' [', ( $y ? 'Y' : 'y' ), '/', ( $y ? 'n' : 'N' ), '] ';
- print "$default\n";
- return $default;
-}
-
-# the workhorse
-sub import {
- my $class = shift;
- my @args = @_ or return;
- my $core_all;
-
- print "*** $class version " . $class->VERSION . "\n";
- print "*** Checking for Perl dependencies...\n";
-
- my $cwd = Cwd::cwd();
-
- $Config = [];
-
- my $maxlen = length(
- (
- sort { length($b) <=> length($a) }
- grep { /^[^\-]/ }
- map {
- ref($_)
- ? ( ( ref($_) eq 'HASH' ) ? keys(%$_) : @{$_} )
- : ''
- }
- map { +{@args}->{$_} }
- grep { /^[^\-]/ or /^-core$/i } keys %{ +{@args} }
- )[0]
- );
-
- # We want to know if we're under CPAN early to avoid prompting, but
- # if we aren't going to try and install anything anyway then skip the
- # check entirely since we don't want to have to load (and configure)
- # an old CPAN just for a cosmetic message
-
- $UnderCPAN = _check_lock(1) unless $SkipInstall;
-
- while ( my ( $feature, $modules ) = splice( @args, 0, 2 ) ) {
- my ( @required, @tests, @skiptests );
- my $default = 1;
- my $conflict = 0;
-
- if ( $feature =~ m/^-(\w+)$/ ) {
- my $option = lc($1);
-
- # check for a newer version of myself
- _update_to( $modules, @_ ) and return if $option eq 'version';
-
- # sets CPAN configuration options
- $Config = $modules if $option eq 'config';
-
- # promote every features to core status
- $core_all = ( $modules =~ /^all$/i ) and next
- if $option eq 'core';
-
- next unless $option eq 'core';
- }
-
- print "[" . ( $FeatureMap{ lc($feature) } || $feature ) . "]\n";
-
- $modules = [ %{$modules} ] if UNIVERSAL::isa( $modules, 'HASH' );
-
- unshift @$modules, -default => &{ shift(@$modules) }
- if ( ref( $modules->[0] ) eq 'CODE' ); # XXX: bugward combatability
-
- while ( my ( $mod, $arg ) = splice( @$modules, 0, 2 ) ) {
- if ( $mod =~ m/^-(\w+)$/ ) {
- my $option = lc($1);
-
- $default = $arg if ( $option eq 'default' );
- $conflict = $arg if ( $option eq 'conflict' );
- @tests = @{$arg} if ( $option eq 'tests' );
- @skiptests = @{$arg} if ( $option eq 'skiptests' );
-
- next;
- }
-
- printf( "- %-${maxlen}s ...", $mod );
-
- if ( $arg and $arg =~ /^\D/ ) {
- unshift @$modules, $arg;
- $arg = 0;
- }
-
- # XXX: check for conflicts and uninstalls(!) them.
- my $cur = _load($mod);
- if (_version_cmp ($cur, $arg) >= 0)
- {
- print "loaded. ($cur" . ( $arg ? " >= $arg" : '' ) . ")\n";
- push @Existing, $mod => $arg;
- $DisabledTests{$_} = 1 for map { glob($_) } @skiptests;
- }
- else {
- if (not defined $cur) # indeed missing
- {
- print "missing." . ( $arg ? " (would need $arg)" : '' ) . "\n";
- }
- else
- {
- # no need to check $arg as _version_cmp ($cur, undef) would satisfy >= above
- print "too old. ($cur < $arg)\n";
- }
-
- push @required, $mod => $arg;
- }
- }
-
- next unless @required;
-
- my $mandatory = ( $feature eq '-core' or $core_all );
-
- if (
- !$SkipInstall
- and (
- $CheckOnly
- or ($mandatory and $UnderCPAN)
- or $AllDeps
- or _prompt(
- qq{==> Auto-install the }
- . ( @required / 2 )
- . ( $mandatory ? ' mandatory' : ' optional' )
- . qq{ module(s) from CPAN?},
- $default ? 'y' : 'n',
- ) =~ /^[Yy]/
- )
- )
- {
- push( @Missing, @required );
- $DisabledTests{$_} = 1 for map { glob($_) } @skiptests;
- }
-
- elsif ( !$SkipInstall
- and $default
- and $mandatory
- and
- _prompt( qq{==> The module(s) are mandatory! Really skip?}, 'n', )
- =~ /^[Nn]/ )
- {
- push( @Missing, @required );
- $DisabledTests{$_} = 1 for map { glob($_) } @skiptests;
- }
-
- else {
- $DisabledTests{$_} = 1 for map { glob($_) } @tests;
- }
- }
-
- if ( @Missing and not( $CheckOnly or $UnderCPAN ) ) {
- require Config;
- print
-"*** Dependencies will be installed the next time you type '$Config::Config{make}'.\n";
-
- # make an educated guess of whether we'll need root permission.
- print " (You may need to do that as the 'root' user.)\n"
- if eval '$>';
- }
- print "*** $class configuration finished.\n";
-
- chdir $cwd;
-
- # import to main::
- no strict 'refs';
- *{'main::WriteMakefile'} = \&Write if caller(0) eq 'main';
-}
-
-sub _running_under {
- my $thing = shift;
- print <<"END_MESSAGE";
-*** Since we're running under ${thing}, I'll just let it take care
- of the dependency's installation later.
-END_MESSAGE
- return 1;
-}
-
-# Check to see if we are currently running under CPAN.pm and/or CPANPLUS;
-# if we are, then we simply let it taking care of our dependencies
-sub _check_lock {
- return unless @Missing or @_;
-
- my $cpan_env = $ENV{PERL5_CPAN_IS_RUNNING};
-
- if ($ENV{PERL5_CPANPLUS_IS_RUNNING}) {
- return _running_under($cpan_env ? 'CPAN' : 'CPANPLUS');
- }
-
- require CPAN;
-
- if ($CPAN::VERSION > '1.89') {
- if ($cpan_env) {
- return _running_under('CPAN');
- }
- return; # CPAN.pm new enough, don't need to check further
- }
-
- # last ditch attempt, this -will- configure CPAN, very sorry
-
- _load_cpan(1); # force initialize even though it's already loaded
-
- # Find the CPAN lock-file
- my $lock = MM->catfile( $CPAN::Config->{cpan_home}, ".lock" );
- return unless -f $lock;
-
- # Check the lock
- local *LOCK;
- return unless open(LOCK, $lock);
-
- if (
- ( $^O eq 'MSWin32' ? _under_cpan() : <LOCK> == getppid() )
- and ( $CPAN::Config->{prerequisites_policy} || '' ) ne 'ignore'
- ) {
- print <<'END_MESSAGE';
-
-*** Since we're running under CPAN, I'll just let it take care
- of the dependency's installation later.
-END_MESSAGE
- return 1;
- }
-
- close LOCK;
- return;
-}
-
-sub install {
- my $class = shift;
-
- my $i; # used below to strip leading '-' from config keys
- my @config = ( map { s/^-// if ++$i; $_ } @{ +shift } );
-
- my ( @modules, @installed );
- while ( my ( $pkg, $ver ) = splice( @_, 0, 2 ) ) {
-
- # grep out those already installed
- if ( _version_cmp( _load($pkg), $ver ) >= 0 ) {
- push @installed, $pkg;
- }
- else {
- push @modules, $pkg, $ver;
- }
- }
-
- return @installed unless @modules; # nothing to do
- return @installed if _check_lock(); # defer to the CPAN shell
-
- print "*** Installing dependencies...\n";
-
- return unless _connected_to('cpan.org');
-
- my %args = @config;
- my %failed;
- local *FAILED;
- if ( $args{do_once} and open( FAILED, '.#autoinstall.failed' ) ) {
- while (<FAILED>) { chomp; $failed{$_}++ }
- close FAILED;
-
- my @newmod;
- while ( my ( $k, $v ) = splice( @modules, 0, 2 ) ) {
- push @newmod, ( $k => $v ) unless $failed{$k};
- }
- @modules = @newmod;
- }
-
- if ( _has_cpanplus() and not $ENV{PERL_AUTOINSTALL_PREFER_CPAN} ) {
- _install_cpanplus( \@modules, \@config );
- } else {
- _install_cpan( \@modules, \@config );
- }
-
- print "*** $class installation finished.\n";
-
- # see if we have successfully installed them
- while ( my ( $pkg, $ver ) = splice( @modules, 0, 2 ) ) {
- if ( _version_cmp( _load($pkg), $ver ) >= 0 ) {
- push @installed, $pkg;
- }
- elsif ( $args{do_once} and open( FAILED, '>> .#autoinstall.failed' ) ) {
- print FAILED "$pkg\n";
- }
- }
-
- close FAILED if $args{do_once};
-
- return @installed;
-}
-
-sub _install_cpanplus {
- my @modules = @{ +shift };
- my @config = _cpanplus_config( @{ +shift } );
- my $installed = 0;
-
- require CPANPLUS::Backend;
- my $cp = CPANPLUS::Backend->new;
- my $conf = $cp->configure_object;
-
- return unless $conf->can('conf') # 0.05x+ with "sudo" support
- or _can_write($conf->_get_build('base')); # 0.04x
-
- # if we're root, set UNINST=1 to avoid trouble unless user asked for it.
- my $makeflags = $conf->get_conf('makeflags') || '';
- if ( UNIVERSAL::isa( $makeflags, 'HASH' ) ) {
- # 0.03+ uses a hashref here
- $makeflags->{UNINST} = 1 unless exists $makeflags->{UNINST};
-
- } else {
- # 0.02 and below uses a scalar
- $makeflags = join( ' ', split( ' ', $makeflags ), 'UNINST=1' )
- if ( $makeflags !~ /\bUNINST\b/ and eval qq{ $> eq '0' } );
-
- }
- $conf->set_conf( makeflags => $makeflags );
- $conf->set_conf( prereqs => 1 );
-
-
-
- while ( my ( $key, $val ) = splice( @config, 0, 2 ) ) {
- $conf->set_conf( $key, $val );
- }
-
- my $modtree = $cp->module_tree;
- while ( my ( $pkg, $ver ) = splice( @modules, 0, 2 ) ) {
- print "*** Installing $pkg...\n";
-
- MY::preinstall( $pkg, $ver ) or next if defined &MY::preinstall;
-
- my $success;
- my $obj = $modtree->{$pkg};
-
- if ( $obj and _version_cmp( $obj->{version}, $ver ) >= 0 ) {
- my $pathname = $pkg;
- $pathname =~ s/::/\\W/;
-
- foreach my $inc ( grep { m/$pathname.pm/i } keys(%INC) ) {
- delete $INC{$inc};
- }
-
- my $rv = $cp->install( modules => [ $obj->{module} ] );
-
- if ( $rv and ( $rv->{ $obj->{module} } or $rv->{ok} ) ) {
- print "*** $pkg successfully installed.\n";
- $success = 1;
- } else {
- print "*** $pkg installation cancelled.\n";
- $success = 0;
- }
-
- $installed += $success;
- } else {
- print << ".";
-*** Could not find a version $ver or above for $pkg; skipping.
-.
- }
-
- MY::postinstall( $pkg, $ver, $success ) if defined &MY::postinstall;
- }
-
- return $installed;
-}
-
-sub _cpanplus_config {
- my @config = ();
- while ( @_ ) {
- my ($key, $value) = (shift(), shift());
- if ( $key eq 'prerequisites_policy' ) {
- if ( $value eq 'follow' ) {
- $value = CPANPLUS::Internals::Constants::PREREQ_INSTALL();
- } elsif ( $value eq 'ask' ) {
- $value = CPANPLUS::Internals::Constants::PREREQ_ASK();
- } elsif ( $value eq 'ignore' ) {
- $value = CPANPLUS::Internals::Constants::PREREQ_IGNORE();
- } else {
- die "*** Cannot convert option $key = '$value' to CPANPLUS version.\n";
- }
- } else {
- die "*** Cannot convert option $key to CPANPLUS version.\n";
- }
- }
- return @config;
-}
-
-sub _install_cpan {
- my @modules = @{ +shift };
- my @config = @{ +shift };
- my $installed = 0;
- my %args;
-
- _load_cpan();
- require Config;
-
- if (CPAN->VERSION < 1.80) {
- # no "sudo" support, probe for writableness
- return unless _can_write( MM->catfile( $CPAN::Config->{cpan_home}, 'sources' ) )
- and _can_write( $Config::Config{sitelib} );
- }
-
- # if we're root, set UNINST=1 to avoid trouble unless user asked for it.
- my $makeflags = $CPAN::Config->{make_install_arg} || '';
- $CPAN::Config->{make_install_arg} =
- join( ' ', split( ' ', $makeflags ), 'UNINST=1' )
- if ( $makeflags !~ /\bUNINST\b/ and eval qq{ $> eq '0' } );
-
- # don't show start-up info
- $CPAN::Config->{inhibit_startup_message} = 1;
-
- # set additional options
- while ( my ( $opt, $arg ) = splice( @config, 0, 2 ) ) {
- ( $args{$opt} = $arg, next )
- if $opt =~ /^force$/; # pseudo-option
- $CPAN::Config->{$opt} = $arg;
- }
-
- local $CPAN::Config->{prerequisites_policy} = 'follow';
-
- while ( my ( $pkg, $ver ) = splice( @modules, 0, 2 ) ) {
- MY::preinstall( $pkg, $ver ) or next if defined &MY::preinstall;
-
- print "*** Installing $pkg...\n";
-
- my $obj = CPAN::Shell->expand( Module => $pkg );
- my $success = 0;
-
- if ( $obj and _version_cmp( $obj->cpan_version, $ver ) >= 0 ) {
- my $pathname = $pkg;
- $pathname =~ s/::/\\W/;
-
- foreach my $inc ( grep { m/$pathname.pm/i } keys(%INC) ) {
- delete $INC{$inc};
- }
-
- my $rv = $args{force} ? CPAN::Shell->force( install => $pkg )
- : CPAN::Shell->install($pkg);
- $rv ||= eval {
- $CPAN::META->instance( 'CPAN::Distribution', $obj->cpan_file, )
- ->{install}
- if $CPAN::META;
- };
-
- if ( $rv eq 'YES' ) {
- print "*** $pkg successfully installed.\n";
- $success = 1;
- }
- else {
- print "*** $pkg installation failed.\n";
- $success = 0;
- }
-
- $installed += $success;
- }
- else {
- print << ".";
-*** Could not find a version $ver or above for $pkg; skipping.
-.
- }
-
- MY::postinstall( $pkg, $ver, $success ) if defined &MY::postinstall;
- }
-
- return $installed;
-}
-
-sub _has_cpanplus {
- return (
- $HasCPANPLUS = (
- $INC{'CPANPLUS/Config.pm'}
- or _load('CPANPLUS::Shell::Default')
- )
- );
-}
-
-# make guesses on whether we're under the CPAN installation directory
-sub _under_cpan {
- require Cwd;
- require File::Spec;
-
- my $cwd = File::Spec->canonpath( Cwd::cwd() );
- my $cpan = File::Spec->canonpath( $CPAN::Config->{cpan_home} );
-
- return ( index( $cwd, $cpan ) > -1 );
-}
-
-sub _update_to {
- my $class = __PACKAGE__;
- my $ver = shift;
-
- return
- if _version_cmp( _load($class), $ver ) >= 0; # no need to upgrade
-
- if (
- _prompt( "==> A newer version of $class ($ver) is required. Install?",
- 'y' ) =~ /^[Nn]/
- )
- {
- die "*** Please install $class $ver manually.\n";
- }
-
- print << ".";
-*** Trying to fetch it from CPAN...
-.
-
- # install ourselves
- _load($class) and return $class->import(@_)
- if $class->install( [], $class, $ver );
-
- print << '.'; exit 1;
-
-*** Cannot bootstrap myself. :-( Installation terminated.
-.
-}
-
-# check if we're connected to some host, using inet_aton
-sub _connected_to {
- my $site = shift;
-
- return (
- ( _load('Socket') and Socket::inet_aton($site) ) or _prompt(
- qq(
-*** Your host cannot resolve the domain name '$site', which
- probably means the Internet connections are unavailable.
-==> Should we try to install the required module(s) anyway?), 'n'
- ) =~ /^[Yy]/
- );
-}
-
-# check if a directory is writable; may create it on demand
-sub _can_write {
- my $path = shift;
- mkdir( $path, 0755 ) unless -e $path;
-
- return 1 if -w $path;
-
- print << ".";
-*** You are not allowed to write to the directory '$path';
- the installation may fail due to insufficient permissions.
-.
-
- if (
- eval '$>' and lc(`sudo -V`) =~ /version/ and _prompt(
- qq(
-==> Should we try to re-execute the autoinstall process with 'sudo'?),
- ((-t STDIN) ? 'y' : 'n')
- ) =~ /^[Yy]/
- )
- {
-
- # try to bootstrap ourselves from sudo
- print << ".";
-*** Trying to re-execute the autoinstall process with 'sudo'...
-.
- my $missing = join( ',', @Missing );
- my $config = join( ',',
- UNIVERSAL::isa( $Config, 'HASH' ) ? %{$Config} : @{$Config} )
- if $Config;
-
- return
- unless system( 'sudo', $^X, $0, "--config=$config",
- "--installdeps=$missing" );
-
- print << ".";
-*** The 'sudo' command exited with error! Resuming...
-.
- }
-
- return _prompt(
- qq(
-==> Should we try to install the required module(s) anyway?), 'n'
- ) =~ /^[Yy]/;
-}
-
-# load a module and return the version it reports
-sub _load {
- my $mod = pop; # class/instance doesn't matter
- my $file = $mod;
-
- $file =~ s|::|/|g;
- $file .= '.pm';
-
- local $@;
- return eval { require $file; $mod->VERSION } || ( $@ ? undef: 0 );
-}
-
-# Load CPAN.pm and it's configuration
-sub _load_cpan {
- return if $CPAN::VERSION and $CPAN::Config and not @_;
- require CPAN;
- if ( $CPAN::HandleConfig::VERSION ) {
- # Newer versions of CPAN have a HandleConfig module
- CPAN::HandleConfig->load;
- } else {
- # Older versions had the load method in Config directly
- CPAN::Config->load;
- }
-}
-
-# compare two versions, either use Sort::Versions or plain comparison
-# return values same as <=>
-sub _version_cmp {
- my ( $cur, $min ) = @_;
- return -1 unless defined $cur; # if 0 keep comparing
- return 1 unless $min;
-
- $cur =~ s/\s+$//;
-
- # check for version numbers that are not in decimal format
- if ( ref($cur) or ref($min) or $cur =~ /v|\..*\./ or $min =~ /v|\..*\./ ) {
- if ( ( $version::VERSION or defined( _load('version') )) and
- version->can('new')
- ) {
-
- # use version.pm if it is installed.
- return version->new($cur) <=> version->new($min);
- }
- elsif ( $Sort::Versions::VERSION or defined( _load('Sort::Versions') ) )
- {
-
- # use Sort::Versions as the sorting algorithm for a.b.c versions
- return Sort::Versions::versioncmp( $cur, $min );
- }
-
- warn "Cannot reliably compare non-decimal formatted versions.\n"
- . "Please install version.pm or Sort::Versions.\n";
- }
-
- # plain comparison
- local $^W = 0; # shuts off 'not numeric' bugs
- return $cur <=> $min;
-}
-
-# nothing; this usage is deprecated.
-sub main::PREREQ_PM { return {}; }
-
-sub _make_args {
- my %args = @_;
-
- $args{PREREQ_PM} = { %{ $args{PREREQ_PM} || {} }, @Existing, @Missing }
- if $UnderCPAN or $TestOnly;
-
- if ( $args{EXE_FILES} and -e 'MANIFEST' ) {
- require ExtUtils::Manifest;
- my $manifest = ExtUtils::Manifest::maniread('MANIFEST');
-
- $args{EXE_FILES} =
- [ grep { exists $manifest->{$_} } @{ $args{EXE_FILES} } ];
- }
-
- $args{test}{TESTS} ||= 't/*.t';
- $args{test}{TESTS} = join( ' ',
- grep { !exists( $DisabledTests{$_} ) }
- map { glob($_) } split( /\s+/, $args{test}{TESTS} ) );
-
- my $missing = join( ',', @Missing );
- my $config =
- join( ',', UNIVERSAL::isa( $Config, 'HASH' ) ? %{$Config} : @{$Config} )
- if $Config;
-
- $PostambleActions = (
- ($missing and not $UnderCPAN)
- ? "\$(PERL) $0 --config=$config --installdeps=$missing"
- : "\$(NOECHO) \$(NOOP)"
- );
-
- return %args;
-}
-
-# a wrapper to ExtUtils::MakeMaker::WriteMakefile
-sub Write {
- require Carp;
- Carp::croak "WriteMakefile: Need even number of args" if @_ % 2;
-
- if ($CheckOnly) {
- print << ".";
-*** Makefile not written in check-only mode.
-.
- return;
- }
-
- my %args = _make_args(@_);
-
- no strict 'refs';
-
- $PostambleUsed = 0;
- local *MY::postamble = \&postamble unless defined &MY::postamble;
- ExtUtils::MakeMaker::WriteMakefile(%args);
-
- print << "." unless $PostambleUsed;
-*** WARNING: Makefile written with customized MY::postamble() without
- including contents from Module::AutoInstall::postamble() --
- auto installation features disabled. Please contact the author.
-.
-
- return 1;
-}
-
-sub postamble {
- $PostambleUsed = 1;
-
- return <<"END_MAKE";
-
-config :: installdeps
-\t\$(NOECHO) \$(NOOP)
-
-checkdeps ::
-\t\$(PERL) $0 --checkdeps
-
-installdeps ::
-\t$PostambleActions
-
-END_MAKE
-
-}
-
-1;
-
-__END__
-
-#line 1056
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install.pm b/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install.pm
deleted file mode 100644
index 51eda5d..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install.pm
+++ /dev/null
@@ -1,430 +0,0 @@
-#line 1
-package Module::Install;
-
-# For any maintainers:
-# The load order for Module::Install is a bit magic.
-# It goes something like this...
-#
-# IF ( host has Module::Install installed, creating author mode ) {
-# 1. Makefile.PL calls "use inc::Module::Install"
-# 2. $INC{inc/Module/Install.pm} set to installed version of inc::Module::Install
-# 3. The installed version of inc::Module::Install loads
-# 4. inc::Module::Install calls "require Module::Install"
-# 5. The ./inc/ version of Module::Install loads
-# } ELSE {
-# 1. Makefile.PL calls "use inc::Module::Install"
-# 2. $INC{inc/Module/Install.pm} set to ./inc/ version of Module::Install
-# 3. The ./inc/ version of Module::Install loads
-# }
-
-use 5.005;
-use strict 'vars';
-
-use vars qw{$VERSION $MAIN};
-BEGIN {
- # All Module::Install core packages now require synchronised versions.
- # This will be used to ensure we don't accidentally load old or
- # different versions of modules.
- # This is not enforced yet, but will be some time in the next few
- # releases once we can make sure it won't clash with custom
- # Module::Install extensions.
- $VERSION = '0.91';
-
- # Storage for the pseudo-singleton
- $MAIN = undef;
-
- *inc::Module::Install::VERSION = *VERSION;
- @inc::Module::Install::ISA = __PACKAGE__;
-
-}
-
-
-
-
-
-# Whether or not inc::Module::Install is actually loaded, the
-# $INC{inc/Module/Install.pm} is what will still get set as long as
-# the caller loaded module this in the documented manner.
-# If not set, the caller may NOT have loaded the bundled version, and thus
-# they may not have a MI version that works with the Makefile.PL. This would
-# result in false errors or unexpected behaviour. And we don't want that.
-my $file = join( '/', 'inc', split /::/, __PACKAGE__ ) . '.pm';
-unless ( $INC{$file} ) { die <<"END_DIE" }
-
-Please invoke ${\__PACKAGE__} with:
-
- use inc::${\__PACKAGE__};
-
-not:
-
- use ${\__PACKAGE__};
-
-END_DIE
-
-
-
-
-
-# If the script that is loading Module::Install is from the future,
-# then make will detect this and cause it to re-run over and over
-# again. This is bad. Rather than taking action to touch it (which
-# is unreliable on some platforms and requires write permissions)
-# for now we should catch this and refuse to run.
-if ( -f $0 ) {
- my $s = (stat($0))[9];
-
- # If the modification time is only slightly in the future,
- # sleep briefly to remove the problem.
- my $a = $s - time;
- if ( $a > 0 and $a < 5 ) { sleep 5 }
-
- # Too far in the future, throw an error.
- my $t = time;
- if ( $s > $t ) { die <<"END_DIE" }
-
-Your installer $0 has a modification time in the future ($s > $t).
-
-This is known to create infinite loops in make.
-
-Please correct this, then run $0 again.
-
-END_DIE
-}
-
-
-
-
-
-# Build.PL was formerly supported, but no longer is due to excessive
-# difficulty in implementing every single feature twice.
-if ( $0 =~ /Build.PL$/i ) { die <<"END_DIE" }
-
-Module::Install no longer supports Build.PL.
-
-It was impossible to maintain duel backends, and has been deprecated.
-
-Please remove all Build.PL files and only use the Makefile.PL installer.
-
-END_DIE
-
-
-
-
-
-# To save some more typing in Module::Install installers, every...
-# use inc::Module::Install
-# ...also acts as an implicit use strict.
-$^H |= strict::bits(qw(refs subs vars));
-
-
-
-
-
-use Cwd ();
-use File::Find ();
-use File::Path ();
-use FindBin;
-
-sub autoload {
- my $self = shift;
- my $who = $self->_caller;
- my $cwd = Cwd::cwd();
- my $sym = "${who}::AUTOLOAD";
- $sym->{$cwd} = sub {
- my $pwd = Cwd::cwd();
- if ( my $code = $sym->{$pwd} ) {
- # Delegate back to parent dirs
- goto &$code unless $cwd eq $pwd;
- }
- $$sym =~ /([^:]+)$/ or die "Cannot autoload $who - $sym";
- my $method = $1;
- if ( uc($method) eq $method ) {
- # Do nothing
- return;
- } elsif ( $method =~ /^_/ and $self->can($method) ) {
- # Dispatch to the root M:I class
- return $self->$method(@_);
- }
-
- # Dispatch to the appropriate plugin
- unshift @_, ( $self, $1 );
- goto &{$self->can('call')};
- };
-}
-
-sub import {
- my $class = shift;
- my $self = $class->new(@_);
- my $who = $self->_caller;
-
- unless ( -f $self->{file} ) {
- require "$self->{path}/$self->{dispatch}.pm";
- File::Path::mkpath("$self->{prefix}/$self->{author}");
- $self->{admin} = "$self->{name}::$self->{dispatch}"->new( _top => $self );
- $self->{admin}->init;
- @_ = ($class, _self => $self);
- goto &{"$self->{name}::import"};
- }
-
- *{"${who}::AUTOLOAD"} = $self->autoload;
- $self->preload;
-
- # Unregister loader and worker packages so subdirs can use them again
- delete $INC{"$self->{file}"};
- delete $INC{"$self->{path}.pm"};
-
- # Save to the singleton
- $MAIN = $self;
-
- return 1;
-}
-
-sub preload {
- my $self = shift;
- unless ( $self->{extensions} ) {
- $self->load_extensions(
- "$self->{prefix}/$self->{path}", $self
- );
- }
-
- my @exts = @{$self->{extensions}};
- unless ( @exts ) {
- @exts = $self->{admin}->load_all_extensions;
- }
-
- my %seen;
- foreach my $obj ( @exts ) {
- while (my ($method, $glob) = each %{ref($obj) . '::'}) {
- next unless $obj->can($method);
- next if $method =~ /^_/;
- next if $method eq uc($method);
- $seen{$method}++;
- }
- }
-
- my $who = $self->_caller;
- foreach my $name ( sort keys %seen ) {
- *{"${who}::$name"} = sub {
- ${"${who}::AUTOLOAD"} = "${who}::$name";
- goto &{"${who}::AUTOLOAD"};
- };
- }
-}
-
-sub new {
- my ($class, %args) = @_;
-
- # ignore the prefix on extension modules built from top level.
- my $base_path = Cwd::abs_path($FindBin::Bin);
- unless ( Cwd::abs_path(Cwd::cwd()) eq $base_path ) {
- delete $args{prefix};
- }
-
- return $args{_self} if $args{_self};
-
- $args{dispatch} ||= 'Admin';
- $args{prefix} ||= 'inc';
- $args{author} ||= ($^O eq 'VMS' ? '_author' : '.author');
- $args{bundle} ||= 'inc/BUNDLES';
- $args{base} ||= $base_path;
- $class =~ s/^\Q$args{prefix}\E:://;
- $args{name} ||= $class;
- $args{version} ||= $class->VERSION;
- unless ( $args{path} ) {
- $args{path} = $args{name};
- $args{path} =~ s!::!/!g;
- }
- $args{file} ||= "$args{base}/$args{prefix}/$args{path}.pm";
- $args{wrote} = 0;
-
- bless( \%args, $class );
-}
-
-sub call {
- my ($self, $method) = @_;
- my $obj = $self->load($method) or return;
- splice(@_, 0, 2, $obj);
- goto &{$obj->can($method)};
-}
-
-sub load {
- my ($self, $method) = @_;
-
- $self->load_extensions(
- "$self->{prefix}/$self->{path}", $self
- ) unless $self->{extensions};
-
- foreach my $obj (@{$self->{extensions}}) {
- return $obj if $obj->can($method);
- }
-
- my $admin = $self->{admin} or die <<"END_DIE";
-The '$method' method does not exist in the '$self->{prefix}' path!
-Please remove the '$self->{prefix}' directory and run $0 again to load it.
-END_DIE
-
- my $obj = $admin->load($method, 1);
- push @{$self->{extensions}}, $obj;
-
- $obj;
-}
-
-sub load_extensions {
- my ($self, $path, $top) = @_;
-
- unless ( grep { ! ref $_ and lc $_ eq lc $self->{prefix} } @INC ) {
- unshift @INC, $self->{prefix};
- }
-
- foreach my $rv ( $self->find_extensions($path) ) {
- my ($file, $pkg) = @{$rv};
- next if $self->{pathnames}{$pkg};
-
- local $@;
- my $new = eval { require $file; $pkg->can('new') };
- unless ( $new ) {
- warn $@ if $@;
- next;
- }
- $self->{pathnames}{$pkg} = delete $INC{$file};
- push @{$self->{extensions}}, &{$new}($pkg, _top => $top );
- }
-
- $self->{extensions} ||= [];
-}
-
-sub find_extensions {
- my ($self, $path) = @_;
-
- my @found;
- File::Find::find( sub {
- my $file = $File::Find::name;
- return unless $file =~ m!^\Q$path\E/(.+)\.pm\Z!is;
- my $subpath = $1;
- return if lc($subpath) eq lc($self->{dispatch});
-
- $file = "$self->{path}/$subpath.pm";
- my $pkg = "$self->{name}::$subpath";
- $pkg =~ s!/!::!g;
-
- # If we have a mixed-case package name, assume case has been preserved
- # correctly. Otherwise, root through the file to locate the case-preserved
- # version of the package name.
- if ( $subpath eq lc($subpath) || $subpath eq uc($subpath) ) {
- my $content = Module::Install::_read($subpath . '.pm');
- my $in_pod = 0;
- foreach ( split //, $content ) {
- $in_pod = 1 if /^=\w/;
- $in_pod = 0 if /^=cut/;
- next if ($in_pod || /^=cut/); # skip pod text
- next if /^\s*#/; # and comments
- if ( m/^\s*package\s+($pkg)\s*;/i ) {
- $pkg = $1;
- last;
- }
- }
- }
-
- push @found, [ $file, $pkg ];
- }, $path ) if -d $path;
-
- @found;
-}
-
-
-
-
-
-#####################################################################
-# Common Utility Functions
-
-sub _caller {
- my $depth = 0;
- my $call = caller($depth);
- while ( $call eq __PACKAGE__ ) {
- $depth++;
- $call = caller($depth);
- }
- return $call;
-}
-
-sub _read {
- local *FH;
- if ( $] >= 5.006 ) {
- open( FH, '<', $_[0] ) or die "open($_[0]): $!";
- } else {
- open( FH, "< $_[0]" ) or die "open($_[0]): $!";
- }
- my $string = do { local $/; <FH> };
- close FH or die "close($_[0]): $!";
- return $string;
-}
-
-sub _readperl {
- my $string = Module::Install::_read($_[0]);
- $string =~ s/(?:\015{1,2}\012|\015|\012)/\n/sg;
- $string =~ s/(\n)\n*__(?:DATA|END)__\b.*\z/$1/s;
- $string =~ s/\n\n=\w+.+?\n\n=cut\b.+?\n+/\n\n/sg;
- return $string;
-}
-
-sub _readpod {
- my $string = Module::Install::_read($_[0]);
- $string =~ s/(?:\015{1,2}\012|\015|\012)/\n/sg;
- return $string if $_[0] =~ /\.pod\z/;
- $string =~ s/(^|\n=cut\b.+?\n+)[^=\s].+?\n(\n=\w+|\z)/$1$2/sg;
- $string =~ s/\n*=pod\b[^\n]*\n+/\n\n/sg;
- $string =~ s/\n*=cut\b[^\n]*\n+/\n\n/sg;
- $string =~ s/^\n+//s;
- return $string;
-}
-
-sub _write {
- local *FH;
- if ( $] >= 5.006 ) {
- open( FH, '>', $_[0] ) or die "open($_[0]): $!";
- } else {
- open( FH, "> $_[0]" ) or die "open($_[0]): $!";
- }
- foreach ( 1 .. $#_ ) {
- print FH $_[$_] or die "print($_[0]): $!";
- }
- close FH or die "close($_[0]): $!";
-}
-
-# _version is for processing module versions (eg, 1.03_05) not
-# Perl versions (eg, 5.8.1).
-sub _version ($) {
- my $s = shift || 0;
- my $d =()= $s =~ /(\.)/g;
- if ( $d >= 2 ) {
- # Normalise multipart versions
- $s =~ s/(\.)(\d{1,3})/sprintf("$1%03d",$2)/eg;
- }
- $s =~ s/^(\d+)\.?//;
- my $l = $1 || 0;
- my @v = map {
- $_ . '0' x (3 - length $_)
- } $s =~ /(\d{1,3})\D?/g;
- $l = $l . '.' . join '', @v if @v;
- return $l + 0;
-}
-
-sub _cmp ($$) {
- _version($_[0]) <=> _version($_[1]);
-}
-
-# Cloned from Params::Util::_CLASS
-sub _CLASS ($) {
- (
- defined $_[0]
- and
- ! ref $_[0]
- and
- $_[0] =~ m/^[^\W\d]\w*(?:::\w+)*\z/s
- ) ? $_[0] : undef;
-}
-
-1;
-
-# Copyright 2008 - 2009 Adam Kennedy.
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/AutoInstall.pm b/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/AutoInstall.pm
deleted file mode 100644
index 58dd026..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/AutoInstall.pm
+++ /dev/null
@@ -1,61 +0,0 @@
-#line 1
-package Module::Install::AutoInstall;
-
-use strict;
-use Module::Install::Base ();
-
-use vars qw{$VERSION @ISA $ISCORE};
-BEGIN {
- $VERSION = '0.91';
- @ISA = 'Module::Install::Base';
- $ISCORE = 1;
-}
-
-sub AutoInstall { $_[0] }
-
-sub run {
- my $self = shift;
- $self->auto_install_now(@_);
-}
-
-sub write {
- my $self = shift;
- $self->auto_install(@_);
-}
-
-sub auto_install {
- my $self = shift;
- return if $self->{done}++;
-
- # Flatten array of arrays into a single array
- my @core = map @$_, map @$_, grep ref,
- $self->build_requires, $self->requires;
-
- my @config = @_;
-
- # We'll need Module::AutoInstall
- $self->include('Module::AutoInstall');
- require Module::AutoInstall;
-
- Module::AutoInstall->import(
- (@config ? (-config => \@config) : ()),
- (@core ? (-core => \@core) : ()),
- $self->features,
- );
-
- $self->makemaker_args( Module::AutoInstall::_make_args() );
-
- my $class = ref($self);
- $self->postamble(
- "# --- $class section:\n" .
- Module::AutoInstall::postamble()
- );
-}
-
-sub auto_install_now {
- my $self = shift;
- $self->auto_install(@_);
- Module::AutoInstall::do_install();
-}
-
-1;
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/Base.pm b/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/Base.pm
deleted file mode 100644
index 60a74d2..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/Base.pm
+++ /dev/null
@@ -1,78 +0,0 @@
-#line 1
-package Module::Install::Base;
-
-use strict 'vars';
-use vars qw{$VERSION};
-BEGIN {
- $VERSION = '0.91';
-}
-
-# Suspend handler for "redefined" warnings
-BEGIN {
- my $w = $SIG{__WARN__};
- $SIG{__WARN__} = sub { $w };
-}
-
-#line 42
-
-sub new {
- my $class = shift;
- unless ( defined &{"${class}::call"} ) {
- *{"${class}::call"} = sub { shift->_top->call(@_) };
- }
- unless ( defined &{"${class}::load"} ) {
- *{"${class}::load"} = sub { shift->_top->load(@_) };
- }
- bless { @_ }, $class;
-}
-
-#line 61
-
-sub AUTOLOAD {
- local $@;
- my $func = eval { shift->_top->autoload } or return;
- goto &$func;
-}
-
-#line 75
-
-sub _top {
- $_[0]->{_top};
-}
-
-#line 90
-
-sub admin {
- $_[0]->_top->{admin}
- or
- Module::Install::Base::FakeAdmin->new;
-}
-
-#line 106
-
-sub is_admin {
- $_[0]->admin->VERSION;
-}
-
-sub DESTROY {}
-
-package Module::Install::Base::FakeAdmin;
-
-my $fake;
-
-sub new {
- $fake ||= bless(\@_, $_[0]);
-}
-
-sub AUTOLOAD {}
-
-sub DESTROY {}
-
-# Restore warning handler
-BEGIN {
- $SIG{__WARN__} = $SIG{__WARN__}->();
-}
-
-1;
-
-#line 154
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/Can.pm b/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/Can.pm
deleted file mode 100644
index e65e4f6..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/Can.pm
+++ /dev/null
@@ -1,81 +0,0 @@
-#line 1
-package Module::Install::Can;
-
-use strict;
-use Config ();
-use File::Spec ();
-use ExtUtils::MakeMaker ();
-use Module::Install::Base ();
-
-use vars qw{$VERSION @ISA $ISCORE};
-BEGIN {
- $VERSION = '0.91';
- @ISA = 'Module::Install::Base';
- $ISCORE = 1;
-}
-
-# check if we can load some module
-### Upgrade this to not have to load the module if possible
-sub can_use {
- my ($self, $mod, $ver) = @_;
- $mod =~ s{::|\\}{/}g;
- $mod .= '.pm' unless $mod =~ /\.pm$/i;
-
- my $pkg = $mod;
- $pkg =~ s{/}{::}g;
- $pkg =~ s{\.pm$}{}i;
-
- local $@;
- eval { require $mod; $pkg->VERSION($ver || 0); 1 };
-}
-
-# check if we can run some command
-sub can_run {
- my ($self, $cmd) = @_;
-
- my $_cmd = $cmd;
- return $_cmd if (-x $_cmd or $_cmd = MM->maybe_command($_cmd));
-
- for my $dir ((split /$Config::Config{path_sep}/, $ENV{PATH}), '.') {
- next if $dir eq '';
- my $abs = File::Spec->catfile($dir, $_[1]);
- return $abs if (-x $abs or $abs = MM->maybe_command($abs));
- }
-
- return;
-}
-
-# can we locate a (the) C compiler
-sub can_cc {
- my $self = shift;
- my @chunks = split(/ /, $Config::Config{cc}) or return;
-
- # $Config{cc} may contain args; try to find out the program part
- while (@chunks) {
- return $self->can_run("@chunks") || (pop(@chunks), next);
- }
-
- return;
-}
-
-# Fix Cygwin bug on maybe_command();
-if ( $^O eq 'cygwin' ) {
- require ExtUtils::MM_Cygwin;
- require ExtUtils::MM_Win32;
- if ( ! defined(&ExtUtils::MM_Cygwin::maybe_command) ) {
- *ExtUtils::MM_Cygwin::maybe_command = sub {
- my ($self, $file) = @_;
- if ($file =~ m{^/cygdrive/}i and ExtUtils::MM_Win32->can('maybe_command')) {
- ExtUtils::MM_Win32->maybe_command($file);
- } else {
- ExtUtils::MM_Unix->maybe_command($file);
- }
- }
- }
-}
-
-1;
-
-__END__
-
-#line 156
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/Fetch.pm b/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/Fetch.pm
deleted file mode 100644
index 05f2079..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/Fetch.pm
+++ /dev/null
@@ -1,93 +0,0 @@
-#line 1
-package Module::Install::Fetch;
-
-use strict;
-use Module::Install::Base ();
-
-use vars qw{$VERSION @ISA $ISCORE};
-BEGIN {
- $VERSION = '0.91';
- @ISA = 'Module::Install::Base';
- $ISCORE = 1;
-}
-
-sub get_file {
- my ($self, %args) = @_;
- my ($scheme, $host, $path, $file) =
- $args{url} =~ m|^(\w+)://([^/]+)(.+)/(.+)| or return;
-
- if ( $scheme eq 'http' and ! eval { require LWP::Simple; 1 } ) {
- $args{url} = $args{ftp_url}
- or (warn("LWP support unavailable!\n"), return);
- ($scheme, $host, $path, $file) =
- $args{url} =~ m|^(\w+)://([^/]+)(.+)/(.+)| or return;
- }
-
- $|++;
- print "Fetching '$file' from $host... ";
-
- unless (eval { require Socket; Socket::inet_aton($host) }) {
- warn "'$host' resolve failed!\n";
- return;
- }
-
- return unless $scheme eq 'ftp' or $scheme eq 'http';
-
- require Cwd;
- my $dir = Cwd::getcwd();
- chdir $args{local_dir} or return if exists $args{local_dir};
-
- if (eval { require LWP::Simple; 1 }) {
- LWP::Simple::mirror($args{url}, $file);
- }
- elsif (eval { require Net::FTP; 1 }) { eval {
- # use Net::FTP to get past firewall
- my $ftp = Net::FTP->new($host, Passive => 1, Timeout => 600);
- $ftp->login("anonymous", 'anonymous at example.com');
- $ftp->cwd($path);
- $ftp->binary;
- $ftp->get($file) or (warn("$!\n"), return);
- $ftp->quit;
- } }
- elsif (my $ftp = $self->can_run('ftp')) { eval {
- # no Net::FTP, fallback to ftp.exe
- require FileHandle;
- my $fh = FileHandle->new;
-
- local $SIG{CHLD} = 'IGNORE';
- unless ($fh->open("|$ftp -n")) {
- warn "Couldn't open ftp: $!\n";
- chdir $dir; return;
- }
-
- my @dialog = split(/\n/, <<"END_FTP");
-open $host
-user anonymous anonymous\@example.com
-cd $path
-binary
-get $file $file
-quit
-END_FTP
- foreach (@dialog) { $fh->print("$_\n") }
- $fh->close;
- } }
- else {
- warn "No working 'ftp' program available!\n";
- chdir $dir; return;
- }
-
- unless (-f $file) {
- warn "Fetching failed: $@\n";
- chdir $dir; return;
- }
-
- return if exists $args{size} and -s $file != $args{size};
- system($args{run}) if exists $args{run};
- unlink($file) if $args{remove};
-
- print(((!exists $args{check_for} or -e $args{check_for})
- ? "done!" : "failed! ($!)"), "\n");
- chdir $dir; return !$?;
-}
-
-1;
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/Include.pm b/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/Include.pm
deleted file mode 100644
index 7e792e0..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/Include.pm
+++ /dev/null
@@ -1,34 +0,0 @@
-#line 1
-package Module::Install::Include;
-
-use strict;
-use Module::Install::Base ();
-
-use vars qw{$VERSION @ISA $ISCORE};
-BEGIN {
- $VERSION = '0.91';
- @ISA = 'Module::Install::Base';
- $ISCORE = 1;
-}
-
-sub include {
- shift()->admin->include(@_);
-}
-
-sub include_deps {
- shift()->admin->include_deps(@_);
-}
-
-sub auto_include {
- shift()->admin->auto_include(@_);
-}
-
-sub auto_include_deps {
- shift()->admin->auto_include_deps(@_);
-}
-
-sub auto_include_dependent_dists {
- shift()->admin->auto_include_dependent_dists(@_);
-}
-
-1;
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/Makefile.pm b/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/Makefile.pm
deleted file mode 100644
index 98779db..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/Makefile.pm
+++ /dev/null
@@ -1,268 +0,0 @@
-#line 1
-package Module::Install::Makefile;
-
-use strict 'vars';
-use ExtUtils::MakeMaker ();
-use Module::Install::Base ();
-
-use vars qw{$VERSION @ISA $ISCORE};
-BEGIN {
- $VERSION = '0.91';
- @ISA = 'Module::Install::Base';
- $ISCORE = 1;
-}
-
-sub Makefile { $_[0] }
-
-my %seen = ();
-
-sub prompt {
- shift;
-
- # Infinite loop protection
- my @c = caller();
- if ( ++$seen{"$c[1]|$c[2]|$_[0]"} > 3 ) {
- die "Caught an potential prompt infinite loop ($c[1]|$c[2]|$_[0])";
- }
-
- # In automated testing, always use defaults
- if ( $ENV{AUTOMATED_TESTING} and ! $ENV{PERL_MM_USE_DEFAULT} ) {
- local $ENV{PERL_MM_USE_DEFAULT} = 1;
- goto &ExtUtils::MakeMaker::prompt;
- } else {
- goto &ExtUtils::MakeMaker::prompt;
- }
-}
-
-sub makemaker_args {
- my $self = shift;
- my $args = ( $self->{makemaker_args} ||= {} );
- %$args = ( %$args, @_ );
- return $args;
-}
-
-# For mm args that take multiple space-seperated args,
-# append an argument to the current list.
-sub makemaker_append {
- my $self = sShift;
- my $name = shift;
- my $args = $self->makemaker_args;
- $args->{name} = defined $args->{$name}
- ? join( ' ', $args->{name}, @_ )
- : join( ' ', @_ );
-}
-
-sub build_subdirs {
- my $self = shift;
- my $subdirs = $self->makemaker_args->{DIR} ||= [];
- for my $subdir (@_) {
- push @$subdirs, $subdir;
- }
-}
-
-sub clean_files {
- my $self = shift;
- my $clean = $self->makemaker_args->{clean} ||= {};
- %$clean = (
- %$clean,
- FILES => join ' ', grep { length $_ } ($clean->{FILES} || (), @_),
- );
-}
-
-sub realclean_files {
- my $self = shift;
- my $realclean = $self->makemaker_args->{realclean} ||= {};
- %$realclean = (
- %$realclean,
- FILES => join ' ', grep { length $_ } ($realclean->{FILES} || (), @_),
- );
-}
-
-sub libs {
- my $self = shift;
- my $libs = ref $_[0] ? shift : [ shift ];
- $self->makemaker_args( LIBS => $libs );
-}
-
-sub inc {
- my $self = shift;
- $self->makemaker_args( INC => shift );
-}
-
-my %test_dir = ();
-
-sub _wanted_t {
- /\.t$/ and -f $_ and $test_dir{$File::Find::dir} = 1;
-}
-
-sub tests_recursive {
- my $self = shift;
- if ( $self->tests ) {
- die "tests_recursive will not work if tests are already defined";
- }
- my $dir = shift || 't';
- unless ( -d $dir ) {
- die "tests_recursive dir '$dir' does not exist";
- }
- %test_dir = ();
- require File::Find;
- File::Find::find( \&_wanted_t, $dir );
- $self->tests( join ' ', map { "$_/*.t" } sort keys %test_dir );
-}
-
-sub write {
- my $self = shift;
- die "&Makefile->write() takes no arguments\n" if @_;
-
- # Check the current Perl version
- my $perl_version = $self->perl_version;
- if ( $perl_version ) {
- eval "use $perl_version; 1"
- or die "ERROR: perl: Version $] is installed, "
- . "but we need version >= $perl_version";
- }
-
- # Make sure we have a new enough MakeMaker
- require ExtUtils::MakeMaker;
-
- if ( $perl_version and $self->_cmp($perl_version, '5.006') >= 0 ) {
- # MakeMaker can complain about module versions that include
- # an underscore, even though its own version may contain one!
- # Hence the funny regexp to get rid of it. See RT #35800
- # for details.
- $self->build_requires( 'ExtUtils::MakeMaker' => $ExtUtils::MakeMaker::VERSION =~ /^(\d+\.\d+)/ );
- $self->configure_requires( 'ExtUtils::MakeMaker' => $ExtUtils::MakeMaker::VERSION =~ /^(\d+\.\d+)/ );
- } else {
- # Allow legacy-compatibility with 5.005 by depending on the
- # most recent EU:MM that supported 5.005.
- $self->build_requires( 'ExtUtils::MakeMaker' => 6.42 );
- $self->configure_requires( 'ExtUtils::MakeMaker' => 6.42 );
- }
-
- # Generate the MakeMaker params
- my $args = $self->makemaker_args;
- $args->{DISTNAME} = $self->name;
- $args->{NAME} = $self->module_name || $self->name;
- $args->{VERSION} = $self->version;
- $args->{NAME} =~ s/-/::/g;
- if ( $self->tests ) {
- $args->{test} = { TESTS => $self->tests };
- }
- if ( $] >= 5.005 ) {
- $args->{ABSTRACT} = $self->abstract;
- $args->{AUTHOR} = $self->author;
- }
- if ( eval($ExtUtils::MakeMaker::VERSION) >= 6.10 ) {
- $args->{NO_META} = 1;
- }
- if ( eval($ExtUtils::MakeMaker::VERSION) > 6.17 and $self->sign ) {
- $args->{SIGN} = 1;
- }
- unless ( $self->is_admin ) {
- delete $args->{SIGN};
- }
-
- # Merge both kinds of requires into prereq_pm
- my $prereq = ($args->{PREREQ_PM} ||= {});
- %$prereq = ( %$prereq,
- map { @$_ }
- map { @$_ }
- grep $_,
- ($self->configure_requires, $self->build_requires, $self->requires)
- );
-
- # Remove any reference to perl, PREREQ_PM doesn't support it
- delete $args->{PREREQ_PM}->{perl};
-
- # merge both kinds of requires into prereq_pm
- my $subdirs = ($args->{DIR} ||= []);
- if ($self->bundles) {
- foreach my $bundle (@{ $self->bundles }) {
- my ($file, $dir) = @$bundle;
- push @$subdirs, $dir if -d $dir;
- delete $prereq->{$file};
- }
- }
-
- if ( my $perl_version = $self->perl_version ) {
- eval "use $perl_version; 1"
- or die "ERROR: perl: Version $] is installed, "
- . "but we need version >= $perl_version";
- }
-
- $args->{INSTALLDIRS} = $self->installdirs;
-
- my %args = map { ( $_ => $args->{$_} ) } grep {defined($args->{$_})} keys %$args;
-
- my $user_preop = delete $args{dist}->{PREOP};
- if (my $preop = $self->admin->preop($user_preop)) {
- foreach my $key ( keys %$preop ) {
- $args{dist}->{$key} = $preop->{$key};
- }
- }
-
- my $mm = ExtUtils::MakeMaker::WriteMakefile(%args);
- $self->fix_up_makefile($mm->{FIRST_MAKEFILE} || 'Makefile');
-}
-
-sub fix_up_makefile {
- my $self = shift;
- my $makefile_name = shift;
- my $top_class = ref($self->_top) || '';
- my $top_version = $self->_top->VERSION || '';
-
- my $preamble = $self->preamble
- ? "# Preamble by $top_class $top_version\n"
- . $self->preamble
- : '';
- my $postamble = "# Postamble by $top_class $top_version\n"
- . ($self->postamble || '');
-
- local *MAKEFILE;
- open MAKEFILE, "< $makefile_name" or die "fix_up_makefile: Couldn't open $makefile_name: $!";
- my $makefile = do { local $/; <MAKEFILE> };
- close MAKEFILE or die $!;
-
- $makefile =~ s/\b(test_harness\(\$\(TEST_VERBOSE\), )/$1'inc', /;
- $makefile =~ s/( -I\$\(INST_ARCHLIB\))/ -Iinc$1/g;
- $makefile =~ s/( "-I\$\(INST_LIB\)")/ "-Iinc"$1/g;
- $makefile =~ s/^(FULLPERL = .*)/$1 "-Iinc"/m;
- $makefile =~ s/^(PERL = .*)/$1 "-Iinc"/m;
-
- # Module::Install will never be used to build the Core Perl
- # Sometimes PERL_LIB and PERL_ARCHLIB get written anyway, which breaks
- # PREFIX/PERL5LIB, and thus, install_share. Blank them if they exist
- $makefile =~ s/^PERL_LIB = .+/PERL_LIB =/m;
- #$makefile =~ s/^PERL_ARCHLIB = .+/PERL_ARCHLIB =/m;
-
- # Perl 5.005 mentions PERL_LIB explicitly, so we have to remove that as well.
- $makefile =~ s/(\"?)-I\$\(PERL_LIB\)\1//g;
-
- # XXX - This is currently unused; not sure if it breaks other MM-users
- # $makefile =~ s/^pm_to_blib\s+:\s+/pm_to_blib :: /mg;
-
- open MAKEFILE, "> $makefile_name" or die "fix_up_makefile: Couldn't open $makefile_name: $!";
- print MAKEFILE "$preamble$makefile$postamble" or die $!;
- close MAKEFILE or die $!;
-
- 1;
-}
-
-sub preamble {
- my ($self, $text) = @_;
- $self->{preamble} = $text . $self->{preamble} if defined $text;
- $self->{preamble};
-}
-
-sub postamble {
- my ($self, $text) = @_;
- $self->{postamble} ||= $self->admin->postamble;
- $self->{postamble} .= $text if defined $text;
- $self->{postamble}
-}
-
-1;
-
-__END__
-
-#line 394
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/Metadata.pm b/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/Metadata.pm
deleted file mode 100644
index 653193d..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/Metadata.pm
+++ /dev/null
@@ -1,624 +0,0 @@
-#line 1
-package Module::Install::Metadata;
-
-use strict 'vars';
-use Module::Install::Base ();
-
-use vars qw{$VERSION @ISA $ISCORE};
-BEGIN {
- $VERSION = '0.91';
- @ISA = 'Module::Install::Base';
- $ISCORE = 1;
-}
-
-my @boolean_keys = qw{
- sign
-};
-
-my @scalar_keys = qw{
- name
- module_name
- abstract
- author
- version
- distribution_type
- tests
- installdirs
-};
-
-my @tuple_keys = qw{
- configure_requires
- build_requires
- requires
- recommends
- bundles
- resources
-};
-
-my @resource_keys = qw{
- homepage
- bugtracker
- repository
-};
-
-my @array_keys = qw{
- keywords
-};
-
-sub Meta { shift }
-sub Meta_BooleanKeys { @boolean_keys }
-sub Meta_ScalarKeys { @scalar_keys }
-sub Meta_TupleKeys { @tuple_keys }
-sub Meta_ResourceKeys { @resource_keys }
-sub Meta_ArrayKeys { @array_keys }
-
-foreach my $key ( @boolean_keys ) {
- *$key = sub {
- my $self = shift;
- if ( defined wantarray and not @_ ) {
- return $self->{values}->{$key};
- }
- $self->{values}->{$key} = ( @_ ? $_[0] : 1 );
- return $self;
- };
-}
-
-foreach my $key ( @scalar_keys ) {
- *$key = sub {
- my $self = shift;
- return $self->{values}->{$key} if defined wantarray and !@_;
- $self->{values}->{$key} = shift;
- return $self;
- };
-}
-
-foreach my $key ( @array_keys ) {
- *$key = sub {
- my $self = shift;
- return $self->{values}->{$key} if defined wantarray and !@_;
- $self->{values}->{$key} ||= [];
- push @{$self->{values}->{$key}}, @_;
- return $self;
- };
-}
-
-foreach my $key ( @resource_keys ) {
- *$key = sub {
- my $self = shift;
- unless ( @_ ) {
- return () unless $self->{values}->{resources};
- return map { $_->[1] }
- grep { $_->[0] eq $key }
- @{ $self->{values}->{resources} };
- }
- return $self->{values}->{resources}->{$key} unless @_;
- my $uri = shift or die(
- "Did not provide a value to $key()"
- );
- $self->resources( $key => $uri );
- return 1;
- };
-}
-
-foreach my $key ( grep { $_ ne "resources" } @tuple_keys) {
- *$key = sub {
- my $self = shift;
- return $self->{values}->{$key} unless @_;
- my @added;
- while ( @_ ) {
- my $module = shift or last;
- my $version = shift || 0;
- push @added, [ $module, $version ];
- }
- push @{ $self->{values}->{$key} }, @added;
- return map {@$_} @added;
- };
-}
-
-# Resource handling
-my %lc_resource = map { $_ => 1 } qw{
- homepage
- license
- bugtracker
- repository
-};
-
-sub resources {
- my $self = shift;
- while ( @_ ) {
- my $name = shift or last;
- my $value = shift or next;
- if ( $name eq lc $name and ! $lc_resource{$name} ) {
- die("Unsupported reserved lowercase resource '$name'");
- }
- $self->{values}->{resources} ||= [];
- push @{ $self->{values}->{resources} }, [ $name, $value ];
- }
- $self->{values}->{resources};
-}
-
-# Aliases for build_requires that will have alternative
-# meanings in some future version of META.yml.
-sub test_requires { shift->build_requires(@_) }
-sub install_requires { shift->build_requires(@_) }
-
-# Aliases for installdirs options
-sub install_as_core { $_[0]->installdirs('perl') }
-sub install_as_cpan { $_[0]->installdirs('site') }
-sub install_as_site { $_[0]->installdirs('site') }
-sub install_as_vendor { $_[0]->installdirs('vendor') }
-
-sub dynamic_config {
- my $self = shift;
- unless ( @_ ) {
- warn "You MUST provide an explicit true/false value to dynamic_config\n";
- return $self;
- }
- $self->{values}->{dynamic_config} = $_[0] ? 1 : 0;
- return 1;
-}
-
-sub perl_version {
- my $self = shift;
- return $self->{values}->{perl_version} unless @_;
- my $version = shift or die(
- "Did not provide a value to perl_version()"
- );
-
- # Normalize the version
- $version = $self->_perl_version($version);
-
- # We don't support the reall old versions
- unless ( $version >= 5.005 ) {
- die "Module::Install only supports 5.005 or newer (use ExtUtils::MakeMaker)\n";
- }
-
- $self->{values}->{perl_version} = $version;
-}
-
-#Stolen from M::B
-my %license_urls = (
- perl => 'http://dev.perl.org/licenses/',
- apache => 'http://apache.org/licenses/LICENSE-2.0',
- artistic => 'http://opensource.org/licenses/artistic-license.php',
- artistic_2 => 'http://opensource.org/licenses/artistic-license-2.0.php',
- lgpl => 'http://opensource.org/licenses/lgpl-license.php',
- lgpl2 => 'http://opensource.org/licenses/lgpl-2.1.php',
- lgpl3 => 'http://opensource.org/licenses/lgpl-3.0.html',
- bsd => 'http://opensource.org/licenses/bsd-license.php',
- gpl => 'http://opensource.org/licenses/gpl-license.php',
- gpl2 => 'http://opensource.org/licenses/gpl-2.0.php',
- gpl3 => 'http://opensource.org/licenses/gpl-3.0.html',
- mit => 'http://opensource.org/licenses/mit-license.php',
- mozilla => 'http://opensource.org/licenses/mozilla1.1.php',
- open_source => undef,
- unrestricted => undef,
- restrictive => undef,
- unknown => undef,
-);
-
-sub license {
- my $self = shift;
- return $self->{values}->{license} unless @_;
- my $license = shift or die(
- 'Did not provide a value to license()'
- );
- $self->{values}->{license} = $license;
-
- # Automatically fill in license URLs
- if ( $license_urls{$license} ) {
- $self->resources( license => $license_urls{$license} );
- }
-
- return 1;
-}
-
-sub all_from {
- my ( $self, $file ) = @_;
-
- unless ( defined($file) ) {
- my $name = $self->name or die(
- "all_from called with no args without setting name() first"
- );
- $file = join('/', 'lib', split(/-/, $name)) . '.pm';
- $file =~ s{.*/}{} unless -e $file;
- unless ( -e $file ) {
- die("all_from cannot find $file from $name");
- }
- }
- unless ( -f $file ) {
- die("The path '$file' does not exist, or is not a file");
- }
-
- # Some methods pull from POD instead of code.
- # If there is a matching .pod, use that instead
- my $pod = $file;
- $pod =~ s/\.pm$/.pod/i;
- $pod = $file unless -e $pod;
-
- # Pull the different values
- $self->name_from($file) unless $self->name;
- $self->version_from($file) unless $self->version;
- $self->perl_version_from($file) unless $self->perl_version;
- $self->author_from($pod) unless $self->author;
- $self->license_from($pod) unless $self->license;
- $self->abstract_from($pod) unless $self->abstract;
-
- return 1;
-}
-
-sub provides {
- my $self = shift;
- my $provides = ( $self->{values}->{provides} ||= {} );
- %$provides = (%$provides, @_) if @_;
- return $provides;
-}
-
-sub auto_provides {
- my $self = shift;
- return $self unless $self->is_admin;
- unless (-e 'MANIFEST') {
- warn "Cannot deduce auto_provides without a MANIFEST, skipping\n";
- return $self;
- }
- # Avoid spurious warnings as we are not checking manifest here.
- local $SIG{__WARN__} = sub {1};
- require ExtUtils::Manifest;
- local *ExtUtils::Manifest::manicheck = sub { return };
-
- require Module::Build;
- my $build = Module::Build->new(
- dist_name => $self->name,
- dist_version => $self->version,
- license => $self->license,
- );
- $self->provides( %{ $build->find_dist_packages || {} } );
-}
-
-sub feature {
- my $self = shift;
- my $name = shift;
- my $features = ( $self->{values}->{features} ||= [] );
- my $mods;
-
- if ( @_ == 1 and ref( $_[0] ) ) {
- # The user used ->feature like ->features by passing in the second
- # argument as a reference. Accomodate for that.
- $mods = $_[0];
- } else {
- $mods = \@_;
- }
-
- my $count = 0;
- push @$features, (
- $name => [
- map {
- ref($_) ? ( ref($_) eq 'HASH' ) ? %$_ : @$_ : $_
- } @$mods
- ]
- );
-
- return @$features;
-}
-
-sub features {
- my $self = shift;
- while ( my ( $name, $mods ) = splice( @_, 0, 2 ) ) {
- $self->feature( $name, @$mods );
- }
- return $self->{values}->{features}
- ? @{ $self->{values}->{features} }
- : ();
-}
-
-sub no_index {
- my $self = shift;
- my $type = shift;
- push @{ $self->{values}->{no_index}->{$type} }, @_ if $type;
- return $self->{values}->{no_index};
-}
-
-sub read {
- my $self = shift;
- $self->include_deps( 'YAML::Tiny', 0 );
-
- require YAML::Tiny;
- my $data = YAML::Tiny::LoadFile('META.yml');
-
- # Call methods explicitly in case user has already set some values.
- while ( my ( $key, $value ) = each %$data ) {
- next unless $self->can($key);
- if ( ref $value eq 'HASH' ) {
- while ( my ( $module, $version ) = each %$value ) {
- $self->can($key)->($self, $module => $version );
- }
- } else {
- $self->can($key)->($self, $value);
- }
- }
- return $self;
-}
-
-sub write {
- my $self = shift;
- return $self unless $self->is_admin;
- $self->admin->write_meta;
- return $self;
-}
-
-sub version_from {
- require ExtUtils::MM_Unix;
- my ( $self, $file ) = @_;
- $self->version( ExtUtils::MM_Unix->parse_version($file) );
-}
-
-sub abstract_from {
- require ExtUtils::MM_Unix;
- my ( $self, $file ) = @_;
- $self->abstract(
- bless(
- { DISTNAME => $self->name },
- 'ExtUtils::MM_Unix'
- )->parse_abstract($file)
- );
-}
-
-# Add both distribution and module name
-sub name_from {
- my ($self, $file) = @_;
- if (
- Module::Install::_read($file) =~ m/
- ^ \s*
- package \s*
- ([\w:]+)
- \s* ;
- /ixms
- ) {
- my ($name, $module_name) = ($1, $1);
- $name =~ s{::}{-}g;
- $self->name($name);
- unless ( $self->module_name ) {
- $self->module_name($module_name);
- }
- } else {
- die("Cannot determine name from $file\n");
- }
-}
-
-sub perl_version_from {
- my $self = shift;
- if (
- Module::Install::_read($_[0]) =~ m/
- ^
- (?:use|require) \s*
- v?
- ([\d_\.]+)
- \s* ;
- /ixms
- ) {
- my $perl_version = $1;
- $perl_version =~ s{_}{}g;
- $self->perl_version($perl_version);
- } else {
- warn "Cannot determine perl version info from $_[0]\n";
- return;
- }
-}
-
-sub author_from {
- my $self = shift;
- my $content = Module::Install::_read($_[0]);
- if ($content =~ m/
- =head \d \s+ (?:authors?)\b \s*
- ([^\n]*)
- |
- =head \d \s+ (?:licen[cs]e|licensing|copyright|legal)\b \s*
- .*? copyright .*? \d\d\d[\d.]+ \s* (?:\bby\b)? \s*
- ([^\n]*)
- /ixms) {
- my $author = $1 || $2;
- $author =~ s{E<lt>}{<}g;
- $author =~ s{E<gt>}{>}g;
- $self->author($author);
- } else {
- warn "Cannot determine author info from $_[0]\n";
- }
-}
-
-sub license_from {
- my $self = shift;
- if (
- Module::Install::_read($_[0]) =~ m/
- (
- =head \d \s+
- (?:licen[cs]e|licensing|copyright|legal)\b
- .*?
- )
- (=head\\d.*|=cut.*|)
- \z
- /ixms ) {
- my $license_text = $1;
- my @phrases = (
- 'under the same (?:terms|license) as (?:perl|the perl programming language) itself' => 'perl', 1,
- 'GNU general public license' => 'gpl', 1,
- 'GNU public license' => 'gpl', 1,
- 'GNU lesser general public license' => 'lgpl', 1,
- 'GNU lesser public license' => 'lgpl', 1,
- 'GNU library general public license' => 'lgpl', 1,
- 'GNU library public license' => 'lgpl', 1,
- 'BSD license' => 'bsd', 1,
- 'Artistic license' => 'artistic', 1,
- 'GPL' => 'gpl', 1,
- 'LGPL' => 'lgpl', 1,
- 'BSD' => 'bsd', 1,
- 'Artistic' => 'artistic', 1,
- 'MIT' => 'mit', 1,
- 'proprietary' => 'proprietary', 0,
- );
- while ( my ($pattern, $license, $osi) = splice(@phrases, 0, 3) ) {
- $pattern =~ s{\s+}{\\s+}g;
- if ( $license_text =~ /\b$pattern\b/i ) {
- $self->license($license);
- return 1;
- }
- }
- }
-
- warn "Cannot determine license info from $_[0]\n";
- return 'unknown';
-}
-
-sub _extract_bugtracker {
- my @links = $_[0] =~ m#L<(\Qhttp://rt.cpan.org/\E[^>]+)>#g;
- my %links;
- @links{@links}=();
- @links=keys %links;
- return @links;
-}
-
-sub bugtracker_from {
- my $self = shift;
- my $content = Module::Install::_read($_[0]);
- my @links = _extract_bugtracker($content);
- unless ( @links ) {
- warn "Cannot determine bugtracker info from $_[0]\n";
- return 0;
- }
- if ( @links > 1 ) {
- warn "Found more than on rt.cpan.org link in $_[0]\n";
- return 0;
- }
-
- # Set the bugtracker
- bugtracker( $links[0] );
- return 1;
-}
-
-sub requires_from {
- my $self = shift;
- my $content = Module::Install::_readperl($_[0]);
- my @requires = $content =~ m/^use\s+([^\W\d]\w*(?:::\w+)*)\s+([\d\.]+)/mg;
- while ( @requires ) {
- my $module = shift @requires;
- my $version = shift @requires;
- $self->requires( $module => $version );
- }
-}
-
-sub test_requires_from {
- my $self = shift;
- my $content = Module::Install::_readperl($_[0]);
- my @requires = $content =~ m/^use\s+([^\W\d]\w*(?:::\w+)*)\s+([\d\.]+)/mg;
- while ( @requires ) {
- my $module = shift @requires;
- my $version = shift @requires;
- $self->test_requires( $module => $version );
- }
-}
-
-# Convert triple-part versions (eg, 5.6.1 or 5.8.9) to
-# numbers (eg, 5.006001 or 5.008009).
-# Also, convert double-part versions (eg, 5.8)
-sub _perl_version {
- my $v = $_[-1];
- $v =~ s/^([1-9])\.([1-9]\d?\d?)$/sprintf("%d.%03d",$1,$2)/e;
- $v =~ s/^([1-9])\.([1-9]\d?\d?)\.(0|[1-9]\d?\d?)$/sprintf("%d.%03d%03d",$1,$2,$3 || 0)/e;
- $v =~ s/(\.\d\d\d)000$/$1/;
- $v =~ s/_.+$//;
- if ( ref($v) ) {
- # Numify
- $v = $v + 0;
- }
- return $v;
-}
-
-
-
-
-
-######################################################################
-# MYMETA Support
-
-sub WriteMyMeta {
- die "WriteMyMeta has been deprecated";
-}
-
-sub write_mymeta_yaml {
- my $self = shift;
-
- # We need YAML::Tiny to write the MYMETA.yml file
- unless ( eval { require YAML::Tiny; 1; } ) {
- return 1;
- }
-
- # Generate the data
- my $meta = $self->_write_mymeta_data or return 1;
-
- # Save as the MYMETA.yml file
- print "Writing MYMETA.yml\n";
- YAML::Tiny::DumpFile('MYMETA.yml', $meta);
-}
-
-sub write_mymeta_json {
- my $self = shift;
-
- # We need JSON to write the MYMETA.json file
- unless ( eval { require JSON; 1; } ) {
- return 1;
- }
-
- # Generate the data
- my $meta = $self->_write_mymeta_data or return 1;
-
- # Save as the MYMETA.yml file
- print "Writing MYMETA.json\n";
- Module::Install::_write(
- 'MYMETA.json',
- JSON->new->pretty(1)->canonical->encode($meta),
- );
-}
-
-sub _write_mymeta_data {
- my $self = shift;
-
- # If there's no existing META.yml there is nothing we can do
- return undef unless -f 'META.yml';
-
- # We need Parse::CPAN::Meta to load the file
- unless ( eval { require Parse::CPAN::Meta; 1; } ) {
- return undef;
- }
-
- # Merge the perl version into the dependencies
- my $val = $self->Meta->{values};
- my $perl = delete $val->{perl_version};
- if ( $perl ) {
- $val->{requires} ||= [];
- my $requires = $val->{requires};
-
- # Canonize to three-dot version after Perl 5.6
- if ( $perl >= 5.006 ) {
- $perl =~ s{^(\d+)\.(\d\d\d)(\d*)}{join('.', $1, int($2||0), int($3||0))}e
- }
- unshift @$requires, [ perl => $perl ];
- }
-
- # Load the advisory META.yml file
- my @yaml = Parse::CPAN::Meta::LoadFile('META.yml');
- my $meta = $yaml[0];
-
- # Overwrite the non-configure dependency hashs
- delete $meta->{requires};
- delete $meta->{build_requires};
- delete $meta->{recommends};
- if ( exists $val->{requires} ) {
- $meta->{requires} = { map { @$_ } @{ $val->{requires} } };
- }
- if ( exists $val->{build_requires} ) {
- $meta->{build_requires} = { map { @$_ } @{ $val->{build_requires} } };
- }
-
- return $meta;
-}
-
-1;
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/Win32.pm b/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/Win32.pm
deleted file mode 100644
index f2f99df..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/Win32.pm
+++ /dev/null
@@ -1,64 +0,0 @@
-#line 1
-package Module::Install::Win32;
-
-use strict;
-use Module::Install::Base ();
-
-use vars qw{$VERSION @ISA $ISCORE};
-BEGIN {
- $VERSION = '0.91';
- @ISA = 'Module::Install::Base';
- $ISCORE = 1;
-}
-
-# determine if the user needs nmake, and download it if needed
-sub check_nmake {
- my $self = shift;
- $self->load('can_run');
- $self->load('get_file');
-
- require Config;
- return unless (
- $^O eq 'MSWin32' and
- $Config::Config{make} and
- $Config::Config{make} =~ /^nmake\b/i and
- ! $self->can_run('nmake')
- );
-
- print "The required 'nmake' executable not found, fetching it...\n";
-
- require File::Basename;
- my $rv = $self->get_file(
- url => 'http://download.microsoft.com/download/vc15/Patch/1.52/W95/EN-US/Nmake15.exe',
- ftp_url => 'ftp://ftp.microsoft.com/Softlib/MSLFILES/Nmake15.exe',
- local_dir => File::Basename::dirname($^X),
- size => 51928,
- run => 'Nmake15.exe /o > nul',
- check_for => 'Nmake.exe',
- remove => 1,
- );
-
- die <<'END_MESSAGE' unless $rv;
-
--------------------------------------------------------------------------------
-
-Since you are using Microsoft Windows, you will need the 'nmake' utility
-before installation. It's available at:
-
- http://download.microsoft.com/download/vc15/Patch/1.52/W95/EN-US/Nmake15.exe
- or
- ftp://ftp.microsoft.com/Softlib/MSLFILES/Nmake15.exe
-
-Please download the file manually, save it to a directory in %PATH% (e.g.
-C:\WINDOWS\COMMAND\), then launch the MS-DOS command line shell, "cd" to
-that directory, and run "Nmake15.exe" from there; that will create the
-'nmake.exe' file needed by this module.
-
-You may then resume the installation process described in README.
-
--------------------------------------------------------------------------------
-END_MESSAGE
-
-}
-
-1;
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/WriteAll.pm b/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/WriteAll.pm
deleted file mode 100644
index 12471e5..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/inc/Module/Install/WriteAll.pm
+++ /dev/null
@@ -1,60 +0,0 @@
-#line 1
-package Module::Install::WriteAll;
-
-use strict;
-use Module::Install::Base ();
-
-use vars qw{$VERSION @ISA $ISCORE};
-BEGIN {
- $VERSION = '0.91';;
- @ISA = qw{Module::Install::Base};
- $ISCORE = 1;
-}
-
-sub WriteAll {
- my $self = shift;
- my %args = (
- meta => 1,
- sign => 0,
- inline => 0,
- check_nmake => 1,
- @_,
- );
-
- $self->sign(1) if $args{sign};
- $self->admin->WriteAll(%args) if $self->is_admin;
-
- $self->check_nmake if $args{check_nmake};
- unless ( $self->makemaker_args->{PL_FILES} ) {
- $self->makemaker_args( PL_FILES => {} );
- }
-
- # Until ExtUtils::MakeMaker support MYMETA.yml, make sure
- # we clean it up properly ourself.
- $self->realclean_files('MYMETA.yml');
-
- if ( $args{inline} ) {
- $self->Inline->write;
- } else {
- $self->Makefile->write;
- }
-
- # The Makefile write process adds a couple of dependencies,
- # so write the META.yml files after the Makefile.
- if ( $args{meta} ) {
- $self->Meta->write;
- }
-
- # Experimental support for MYMETA
- if ( $ENV{X_MYMETA} ) {
- if ( $ENV{X_MYMETA} eq 'JSON' ) {
- $self->Meta->write_mymeta_json;
- } else {
- $self->Meta->write_mymeta_yaml;
- }
- }
-
- return 1;
-}
-
-1;
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/lib/Catalyst/Plugin/Authorization/ACL.pm b/sources/Catalyst-Plugin-Authorization-ACL/lib/Catalyst/Plugin/Authorization/ACL.pm
deleted file mode 100644
index 6c2cfd5..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/lib/Catalyst/Plugin/Authorization/ACL.pm
+++ /dev/null
@@ -1,525 +0,0 @@
-package Catalyst::Plugin::Authorization::ACL;
-
-use namespace::autoclean;
-use Moose;
-use mro 'c3';
-with 'Catalyst::ClassData';
-use Scalar::Util ();
-use Catalyst::Plugin::Authorization::ACL::Engine qw/$DENIED $ALLOWED/;
-
-# TODO
-# refactor forcibly_allow_access so that the guts are cleaner
-
-__PACKAGE__->mk_classdata("_acl_engine");
-
-our $VERSION = '0.15';
-
-my $FORCE_ALLOW = bless {}, __PACKAGE__ . "::Exception";
-
-sub execute {
- my ( $c, $class, $action ) = @_;
-
- if ( Scalar::Util::blessed($action)
- and $action->name ne "access_denied"
- and $action->name ne "ACL error rethrower" )
- {
- eval { $c->_acl_engine->check_action_rules( $c, $action ) };
-
- if ( my $err = $@ ) {
- my $force_allow = $c->acl_access_denied( $class, $action, $err );
- return unless $force_allow;
- }
- else {
- $c->acl_access_allowed( $class, $action );
- }
-
- }
-
- $c->maybe::next::method( $class, $action );
-}
-
-sub acl_allow_root_internals {
- my ( $app, $cmp ) = @_;
-
- foreach my $action ( qw/begin auto end/ ) {
- $app->allow_access("/$action") if $app->get_action($action, "/");
- }
-}
-
-sub setup_actions {
- my $app = shift;
- my $ret = $app->maybe::next::method(@_);
-
- $app->_acl_engine(
- Catalyst::Plugin::Authorization::ACL::Engine->new($app) );
-
- if ( my $config = $app->config->{acl} ) {
- foreach my $action ( qw/allow deny/ ) {
- my $method = "${action}_access";
- if ( my $paths = $config->{$action} ) {
- $app->$method( $_ ) for @$paths;
- }
-
- my $cond = ( $action eq "allow" ? "if" : "unless" );
- $method .= "_$cond";
-
- if ( my $args = $config->{"${action}_$cond"} ) {
- my ( $cond, @paths ) = @$args;
- $app->$method( $cond, $_ ) for @paths;
- }
- }
- }
-
- $ret;
-}
-
-sub deny_access_unless {
- my $c = shift;
- $c->_acl_engine->add_deny(@_);
-}
-
-sub deny_access_unless_any {
- my ($c, $path, $roles) = @_;
-
- $c->deny_access_unless($path, sub {
- my ($c, $action) = @_;
-
- return $c->check_any_user_role(@$roles);
- });
-}
-
-sub deny_access {
- my $c = shift;
- $c->deny_access_unless( @_, undef );
-}
-
-sub allow_access_if {
- my $c = shift;
- $c->_acl_engine->add_allow(@_);
-}
-
-sub allow_access_if_any {
- my ($c, $path, $roles) = @_;
-
- $c->allow_access_if($path, sub {
- my ($c, $action) = @_;
-
- return $c->check_any_user_role(@$roles);
- });
-}
-
-sub allow_access {
- my $c = shift;
- $c->allow_access_if( @_, 1 );
-}
-
-sub acl_add_rule {
- my $c = shift;
- $c->_acl_engine->add_rule(@_);
-}
-
-sub acl_access_denied {
- my ( $c, $class, $action, $err ) = @_;
-
- my $namespace = $action->namespace;
-
- if ( my $handler =
- ( $c->get_actions( "access_denied", $namespace ) )[-1] )
- {
- local $c->{_acl_forcibly_allowed} = undef;
-
- (my $path = $handler->reverse) =~ s!^/?!/!;
-
- eval { $c->detach( $path, [$action, $err] ) };
-
- return 1 if $c->{_acl_forcibly_allowed};
-
- die $@ || $Catalyst::DETACH;
- }
- else {
- $c->execute(
- $class,
- bless(
- {
- code => sub { die $err },
- name => "ACL error rethrower",
- },
- "Catalyst::Action"
- ),
- );
-
- return;
- }
-}
-
-sub forcibly_allow_access {
- my $c = shift;
- $c->{_acl_forcibly_allowed} = 1;
- die $Catalyst::DETACH;
-}
-
-sub acl_access_allowed {
-
-}
-
-__PACKAGE__->meta->make_immutable;
-__PACKAGE__;
-
-__END__
-
-=pod
-
-=head1 NAME
-
-Catalyst::Plugin::Authorization::ACL - ACL support for Catalyst applications.
-
-=head1 SYNOPSIS
-
- use Catalyst qw/
- Authentication
- Authorization::Roles
- Authorization::ACL
- /;
-
- __PACKAGE__->setup;
-
- __PACKAGE__->deny_access_unless(
- "/foo/bar",
- [qw/nice_role/],
- );
-
- __PACKAGE__->allow_access_if(
- "/foo/bar/gorch",
- sub { return $boolean },
- );
-
-=head1 DESCRIPTION
-
-This module provides Access Control List style path protection, with arbitrary
-rules for L<Catalyst> applications. It operates only on the L<Catalyst>
-private namespace, at least at the moment.
-
-The two hierarchies of actions and controllers in L<Catalyst> are:
-
-=over 4
-
-=item Private Namespace
-
-Every action has its own private path. This path reflects the Perl namespaces
-the actions were born in, and the namespaces of their controllers.
-
-=item External Namespace
-
-Some actions are also directly accessible from the outside, via a URL.
-
-The private and external paths will be the same, if you are using Local actions. Alternatively you can use C<Path>, C<Regex>, or C<Global> to specify a different external path for your action.
-
-=back
-
-The ACL module currently only knows to exploit the private namespace. In the
-future extensions may be made to support external namespaces as well.
-
-Various types of rules are supported, see the list under L</RULES>.
-
-When a path is visited, rules are tested one after the other, with the most
-exact rule fitting the path first, and continuing up the path. Testing
-continues until a rule explcitly allows or denies access.
-
-=head1 METHODS
-
-=head2 allow_access_if
-
-Arguments: $path, $rule
-
-Check the rule condition and allow access to the actions under C<$path> if
-the rule returns true.
-
-This is normally useful to allow acces only to a specific part of a tree whose
-parent has a C<deny_access_unless> clause attached to it.
-
-If the rule test returns false access is not denied or allowed. Instead
-the next rule in the chain will be checked - in this sense the combinatory
-behavior of these rules is like logical B<OR>.
-
-=head2 allow_access_if_any
-
-Arguments: $path, \@roles
-
-Same as above for any role in the list.
-
-=head2 deny_access_unless
-
-Arguments: $path, $rule
-
-Check the rule condition and disallow access if the rule returns false.
-
-This is normally useful to restrict access to any portion of the application
-unless a certain condition can be met.
-
-If the rule test returns true access is not allowed or denied. Instead the
-next rule in the chain will be checked - in this sense the combinatory
-behavior of these rules is like logical B<AND>.
-
-=head2 deny_access_unless_any
-
-Arguments: $path, \@roles
-
-Same as above for any role in the list.
-
-=head2 allow_access
-
-=head2 deny_access
-
-Arguments: $path
-
-Unconditionally allow or deny access to a path.
-
-=head2 acl_add_rule
-
-Arguments: $path, $rule, [ $filter ]
-
-Manually add a rule to all the actions under C<$path> using the more flexible
-(but more verbose) method:
-
- __PACKAGE__->acl_add_rule(
- "/foo",
- sub { ... }, # see FLEXIBLE RULES below
- sub {
- my $action = shift;
- # return a true value if you want to apply the rule to this action
- # called for all the actions under "/foo"
- }
- };
-
-In this case the rule must be a sub reference (or method name) to be invoked on
-$c.
-
-The default filter will skip all actions starting with an underscore, namely
-C<_DISPATCH>, C<_AUTO>, etc (but not C<auto>, C<begin>, et al).
-
-=head2 acl_access_denied
-
-Arguments: $c, $class, $action, $err
-
-=head2 acl_access_allowed
-
-Arguments: $c, $class, $action
-
-The default event handlers for access denied or allowed conditions. See below
-on handling access violations.
-
-=head2 acl_allow_root_internals
-
-Adds rules that permit access to the root controller (YourApp.pm) C<auto>,
-C<begin> and C<end> unconditionally.
-
-=head1 EXTENDED METHODS
-
-=head2 execute
-
-The hook for rule evaluation
-
-=head2 setup_actions
-
-=head1 RULE EVALUATION
-
-When a rule is attached to an action the "distance" from the path it was
-specified in is recorded. The closer the path is to the rule, the earlier it
-will be checked.
-
-Any rule can either explicitly deny or explicitly allow access to a particular
-action. If a rule does not explicitly allow or permit access, the next rule is
-checked, until the list of rules is finished. If no rule has determined a
-policy, access to the path will be permitted.
-
-=head1 PATHS
-
-To apply a rule to an action or group of actions you must supply a path.
-
-This path is what you should see dumped at the begining of the L<Catalyst>
-server's debug output.
-
-For example, for the C<foo> action defined at the root level of your
-application, specify C</foo>. Under the C<Moose> controller (e.g.
-C<MyApp::C::Moose>, the action C<bar> will be C</moose/bar>).
-
-The "distance" a path has from an action that is contained in it is the the
-difference in the number of slashes between the path of the action, and the
-path to which the rule was applied.
-
-=head1 RULES
-
-=head2 Easy Rules
-
-There are several kinds of rules you can create without using the complex
-interface described in L</FLEXIBLE RULES>.
-
-The easy rules are all predicate list oriented. C<allow_access_if> will
-explicitly allow access if the predicate is true, and C<deny_access_unless>
-will explicitly disallow if the predicate is false.
-
-=over 4
-
-=item Role Lists
-
- __PACAKGE__->deny_access_unless_any( "/foo/bar", [qw/admin moose_trainer/] );
-
-When the role is evaluated the L<Catalyst::Plugin::Authorization::Roles> will
-be used to check whether the currently logged in user has the specified roles.
-
-If L</allow_access_if_any> is used, the presence of B<any> of the roles in
-the list will immediately permit access, and if L</deny_access_unless_any> is
-used, the lack of B<all> of the roles will immediately deny access.
-
-Similarly, if C<allow_access_if> is used, the presence of B<all> the roles will
-immediately permit access, and if C<deny_access_unless> is used, the lack of
-B<any> of the roles will immediately deny access.
-
-When specifying a role list without the
-L<Catalyst::Plugin::Authorization::Roles> plugin loaded the ACL engine will
-throw an error.
-
-=item Predicate Code Reference / Method Name
-
-The code reference or method is invoked with the context and the action
-objects. The boolean return value will determine the behavior of the rule.
-
- __PACKAGE__->allow_access_if( "/gorch", sub { ... } );
- __PACKAGE__->deny_access_unless( "/moose", "method_name" );
-
-When specifying a method name the rule engine ensures that it can be invoked
-using L<UNIVERSAL/can>.
-
-=item Constant
-
-You can use C<undef>, C<0> and C<''> to use as a constant false predicate, or
-C<1> to use as a constant true predicate.
-
-=back
-
-=head2 Flexible Rules
-
-These rules are the most annoying to write but provide the most flexibility.
-
-All access control is performed using exceptions -
-C<$Catalyst::Plugin::Authorization::ACL::Engine::DENIED>, and
-C<$Catalyst::Plugin::Authorization::ACL::Engine::ALLOWED> (these can be
-imported from the engine module).
-
-If no rule decides to explicitly allow or deny access, access will be
-permitted.
-
-Here is a rule that will always break out of rule processing by either
-explicitly allowing or denying access based on how much mojo the current
-user has:
-
- __PACKAGE__->acl_add_rule(
- "/foo",
- sub {
- my ( $c, $action ) = @_;
-
- if ( $c->user->mojo > 50 ) {
- die $ALLOWED;
- } else {
- die $DENIED;
- }
- }
- );
-
-=head1 HANDLING DENIAL
-
-There are two plugin methods that can be called when a rule makes a decision
-about an action:
-
-=over 4
-
-=item acl_access_allowed
-
-A no-op
-
-=item acl_access_denied
-
-Looks for a private action named C<access_denied> from the denied action's
-controller and outwards (much like C<auto>), and if none is found throws an
-access denied exception.
-
-=item forcibly_allow_access
-
-Within an C<access_denied> action this will immediately cause the blocked
-action to be executed anyway.
-
-=back
-
-This means that you have several alternatives:
-
-=head2 Provide an C<access_denied> action
-
- package MyApp::Controller::Foo;
-
- sub access_denied : Private {
- my ( $self, $c, $action ) = @_;
-
- ...
- $c->forcibly_allow_access
- if $you->mean_it eq "really";
- }
-
-If you call C<forcibly_allow_access> then the blocked action will be
-immediately unblocked. Otherwise the execution of the action will cease, and
-return to it's caller or end.
-
-=head2 Cleanup in C<end>
-
- sub end : Private {
- my ( $self, $c ) = @_;
-
- if ( $c->error and $c->error->[-1] eq "access denied" ) {
- $c->error(0); # clear the error
-
- # access denied
- } else {
- # normal end
- }
- }
-
-=head2 Override the plugin event handler methods
-
- package MyApp;
-
- sub acl_access_allowed {
- my ( $c, $class, $action ) = @_;
- ...
- }
-
- sub acl_access_denied {
- my ( $c, $class, $action, $err ) = @_;
- ...
- }
-
-C<$class> is the controller class the C<$action> object was going to be
-executed in, and C<$err> is the exception cought during rule evaluation, if
-any (access is denied if a rule raises an exception).
-
-=head1 SEE ALSO
-
-L<Catalyst::Plugin::Authentication>, L<Catalyst::Plugin::Authorization::Roles>,
-L<http://catalyst.perl.org/calendar/2005/24>
-
-=head1 AUTHOR
-
-Yuval Kogman E<lt>nothingmuch at woobling.orgE<gt>
-
-=head1 CONTRIBUTORS
-
-castaway: Jess Robinson
-
-caelum: Rafael Kitover E<lt>rkitover at cpan.orgE<gt>
-
-=head1 COPYRIGHT & LICENSE
-
-Copyright (c) 2008,2009 the aforementioned authors.
-
-This library is free software; you can redistribute it and/or modify
-it under the same terms as Perl itself.
-
-=cut
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/lib/Catalyst/Plugin/Authorization/ACL/Engine.pm b/sources/Catalyst-Plugin-Authorization-ACL/lib/Catalyst/Plugin/Authorization/ACL/Engine.pm
deleted file mode 100644
index 6744161..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/lib/Catalyst/Plugin/Authorization/ACL/Engine.pm
+++ /dev/null
@@ -1,359 +0,0 @@
-package Catalyst::Plugin::Authorization::ACL::Engine;
-
-use namespace::autoclean;
-use Moose;
-extends qw/Moose::Object Exporter/;
-
-# I heart stevan
-use Class::Throwable;
-use Tree::Simple;
-use Tree::Simple::Visitor::FindByPath;
-use Tree::Simple::Visitor::GetAllDescendents;
-use Carp qw/croak/;
-use List::Util 'first';
-
-has app => (is => 'rw');
-has actions => (is => 'ro', isa => 'HashRef', default => sub { {} });
-has _app_actions_tree => (is => 'ro', isa => 'Tree::Simple', lazy_build => 1);
-
-our $DENIED = bless {}, __PACKAGE__ . "::Denied";
-our $ALLOWED = bless {}, __PACKAGE__ . "::Allowed";
-
-our @EXPORT_OK = qw/$DENIED $ALLOWED/;
-
-sub BUILDARGS {
- my ($self, $c) = @_;
- return +{ app => $c };
-}
-
-sub _build__app_actions_tree {
- my $self = shift;
- my $root = Tree::Simple->new('/', Tree::Simple->ROOT);
- my $app = $self->app;
-
- my @actions = grep defined, map {
- my $controller = $_;
- map $controller->action_for($_->name), $controller->get_action_methods
- } grep $_->isa('Catalyst::Controller'), values %{ $app->components };
-
- for my $action (@actions) {
- my @path = split '/', $action->reverse;
- my $name = pop @path;
-
- if (@path) {
- my $by_path = Tree::Simple::Visitor::FindByPath->new;
- $by_path->setSearchPath(@path);
- $root->accept($by_path);
-
- if (my $namespace_node = $by_path->getResult) {
- $namespace_node->addChild(Tree::Simple->new($action));
- next;
- }
- }
-
- my $node = $root;
- for my $el (@path) {
- if (my $found = first { $_->getNodeValue eq $el }
- @{ $node->getAllChildren }) {
- $node = $found;
- }
- else {
- $node = Tree::Simple->new($el, $node);
- }
- }
-
- $node->addChild(Tree::Simple->new($action));
- }
-
- return $root;
-}
-
-sub add_deny {
- my ( $self, $spec, $condition ) = @_;
-
- my $test = $self->fudge_condition($condition);
-
- $self->add_rule(
- $spec,
- sub {
- my $c = shift;
- die $DENIED unless $c->$test(@_);
- },
- );
-}
-
-sub add_allow {
- my ( $self, $spec, $condition ) = @_;
-
- my $test = $self->fudge_condition($condition);
-
- $self->add_rule(
- $spec,
- sub {
- my $c = shift;
- die $ALLOWED if $c->$test(@_);
- },
- );
-}
-
-sub fudge_condition {
- my ( $self, $condition ) = @_;
-
- # make almost anything into a code ref/method name
-
- if (!defined($condition)
- # no warnings
- or $condition eq '1'
- or $condition eq '0'
- or $condition eq "" )
- {
- return sub { $condition };
- }
- elsif ( my $reftype = ref $condition ) {
- $reftype eq "CODE" and return $condition;
-
- # if it's not a code ref and it's a ref, we only know
- # how to deal with it if it's an array of roles
- $reftype ne "ARRAY"
- and die "Can't interpret '$condition' as an ACL condition";
-
- # but to check roles we need the appropriate plugin
- $self->app->isa("Catalyst::Plugin::Authorization::Roles")
- or die "Can't use role list as an ACL condition unless "
- . "the Authorization::Roles plugin is also loaded.";
-
- # return a test that will check for the roles
- return sub {
- my $c = shift;
- $c->check_user_roles(@$condition);
- };
- }
- elsif ( $self->app->can($condition) ) {
- return $condition; # just a method name
- }
- else {
- croak "Can't use '$condition' as an ACL "
- . "condition unless \$c->can('$condition').";
- }
-}
-
-sub add_rule {
- my ( $self, $path, $rule, $filter ) = @_;
- $filter ||= sub { $_[0]->name !~ /^_/ }; # internal actions are not ACL'd
-
- my $d = $self->app->dispatcher;
-
- my $cxt = _pretty_caller();
-
- $self->{cxt_info}{$rule} = $cxt;
-
- my ( $ns, $name ) = $path =~ m#^/?(.*?)/?([^/]+)$#;
-
- if ( my $action = $d->get_action( $name, $ns ) ) {
- $self->app->log->debug(
- "Adding ACL rule from $cxt to the action $path with sort index 0")
- if $self->app->debug;
- $self->append_rule_to_action( $action, 0, $rule, $cxt );
- }
- else {
- my @path = grep { $_ ne "" } split( "/", $path );
- my $tree = $self->_app_actions_tree;
-
- my $subtree = @path
- ? do {
- my $by_path = Tree::Simple::Visitor::FindByPath->new;
- $by_path->setSearchPath(@path);
- $tree->accept($by_path);
-
- $by_path->getResult
- || Catalyst::Exception->throw(
- "The path '$path' does not exist (traversal hit a dead end "
- . "at: @{[ map { $_->getNodeValue } $by_path->getResults ]})"
- );
- }
- : $tree;
- my $root_depth = $subtree->getDepth;
-
- my $descendents = Tree::Simple::Visitor::GetAllDescendents->new;
- $descendents->setNodeFilter( sub { $_[0] } ); #
- $subtree->accept($descendents);
-
- $self->app->log->debug(
- "Adding ACL rule from $cxt to all the actions under $path")
- if $self->app->debug;
-
- foreach my $action_node ( $descendents->getResults ) {
- next unless $action_node->isLeaf;
-
- my ( $action, $depth ) =
- ( $action_node->getNodeValue, $action_node->getDepth );
-
- next unless $filter->($action);
-
- my $sort_index =
- ( $depth - $root_depth )
- ; # how far an action is from the origin of the ACL
- $self->app->log->debug("... $action at sort index $sort_index")
- if $self->app->debug;
- $self->append_rule_to_action( $action, $sort_index, $rule, $cxt,
- );
- }
- }
-}
-
-sub get_cxt_for_rule {
- my ( $self, $rule ) = @_;
- $self->{cxt_info}{$rule};
-}
-
-sub append_rule_to_action {
- my ( $self, $action, $sort_index, $rule, $cxt ) = @_;
- $sort_index = 0 if $sort_index < 0;
- push @{ $self->get_action_data($action)->{rules_radix}[$sort_index] ||=
- [] }, $rule;
-
-}
-
-sub get_action_data {
- my ( $self, $action ) = @_;
- $self->actions->{ $action->reverse } ||= { action => $action };
-}
-
-sub get_rules {
- my ( $self, $action ) = @_;
-
- map { $_ ? @$_ : () }
- @{ ( $self->get_action_data($action) || return () )->{rules_radix} };
-}
-
-sub check_action_rules {
- my ( $self, $c, $action ) = @_;
-
- my $last_rule;
-
- my $rule_exception;
-
- {
- local $SIG{__DIE__}; # nobody messes with us!
- local $@;
-
- eval {
- foreach my $rule ( $self->get_rules($action) )
- {
- $c->log->debug( "running ACL rule $rule defined at "
- . $self->get_cxt_for_rule($rule)
- . " on $action" )
- if $c->debug;
- $last_rule = $rule;
- $c->$rule($action);
- }
- };
-
- $rule_exception = $@;
- }
-
- if ($rule_exception) {
- if ( ref $rule_exception and $rule_exception == $DENIED ) {
- die "Access to $action denied by rule $last_rule (defined at "
- . $self->get_cxt_for_rule($last_rule) . ").\n";
- }
- elsif ( ref $rule_exception and $rule_exception == $ALLOWED ) {
- $c->log->debug(
- "Access to $action allowed by rule $last_rule (defined at "
- . $self->get_cxt_for_rule($last_rule)
- . ")" )
- if $c->debug;
- return;
- }
- else {
-
- # unknown exception
- # FIXME - add context (the user should know what rule
- # generated the exception, and where it was added)
- Class::Throwable->throw(
- "An error occurred while evaluating ACL rules.", $rule_exception );
- }
- }
-
- # no rules means allow by default
-}
-
-sub _pretty_caller {
- my ( undef, $file, $line ) = _find_caller();
- return "$file line $line";
-}
-
-sub _find_caller {
- for ( my $i = 2 ; ; $i++ ) {
- my @caller = caller($i) or die "Error determining caller";
- return @caller if $caller[0] !~ /^Catalyst::Plugin::Authorization::ACL/;
- }
-}
-
-__PACKAGE__->meta->make_immutable;
-
-__PACKAGE__;
-
-__END__
-
-=pod
-
-=head1 NAME
-
-Catalyst::Plugin::Authorization::ACL::Engine - The backend that computes ACL
-checks for L<Catalyst::Plugin::Authorization::ACL>.
-
-=head1 SYNOPSIS
-
- # internal
-
-=head1 METHODS
-
-=over 4
-
-=item new $app
-
-Create a new rule engine for $app
-
-=item add_allow $cond
-
-=item add_deny $cond
-
-fudge C<$cond>, make cond into a rule, and C<add_rule>
-
-=item add_rule $path, $rule
-
-Add rule to all actions under $path
-
-=item append_rule_to_action $action, $index, $rule, $cxt
-
-Append C<$rule> to C<$action> in slot C<$index>, and store context info C<$cxt>
-for error reporting.
-
-=item check_action_rules $action
-
-Evaluate the rules for an action
-
-=item fudge_condition $thingy
-
-Converts a C<$thingy> into a subref, for DWIM goodness. See the main ACL docs.
-
-=item get_action_data $action
-
-=item get_cxt_for_rule $rule
-
-=item get_rules
-
-=back
-
-=head1 DESCRIPTION
-
-This is the engine which executes the access control checks for
-L<Catalyst::Plugin::Authorization::ACL>. Please use that module directly.
-
-=head1 TODO
-
- * external uris -> private paths
-
-=cut
-
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/t/01use.t b/sources/Catalyst-Plugin-Authorization-ACL/t/01use.t
deleted file mode 100644
index 7737a00..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/t/01use.t
+++ /dev/null
@@ -1,3 +0,0 @@
-use Test::More tests => 1;
-
-use_ok('Catalyst::Plugin::Authorization::ACL');
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/t/02pod.t b/sources/Catalyst-Plugin-Authorization-ACL/t/02pod.t
deleted file mode 100644
index 1647794..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/t/02pod.t
+++ /dev/null
@@ -1,7 +0,0 @@
-use Test::More;
-
-eval "use Test::Pod 1.14";
-plan skip_all => 'Test::Pod 1.14 required' if $@;
-plan skip_all => 'set TEST_POD to enable this test' unless $ENV{TEST_POD};
-
-all_pod_files_ok();
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp.pm b/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp.pm
deleted file mode 100644
index c967bef..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp.pm
+++ /dev/null
@@ -1,78 +0,0 @@
-package ACLTestApp;
-
-use strict;
-use warnings;
-no warnings 'uninitialized';
-
-use Catalyst qw/
- Session
- Session::Store::Dummy
- Session::State::Cookie
-
- Authentication
- Authentication::Store::Minimal
- Authentication::Credential::Password
-
- Authorization::Roles
- Authorization::ACL
-/;
-
-use Catalyst::Plugin::Authorization::ACL::Engine qw/$DENIED $ALLOWED/;
-
-__PACKAGE__->config(
- authentication => {
- users => {
- foo => {
- password => "bar",
- os => "windows",
- },
- gorch => {
- password => "moose",
- roles => [qw/child/],
- os => "linux",
- },
- quxx => {
- password => "ding",
- roles => [qw/zoo_worker moose_trainer/],
- os => "osx",
- },
- },
- },
- acl => {
- deny => ["/restricted"],
- }
-);
-
-__PACKAGE__->setup;
-
-__PACKAGE__->allow_access_if("/", sub { 1 }); # just to test that / can be applied to
-
-__PACKAGE__->deny_access_unless_any("/lioncage", [qw/zoo_worker lion_tamer/]);
-
-# this now in config
-# __PACKAGE__->deny_access_unless("/restricted", sub { 0 }); # no one can access
-
-__PACKAGE__->deny_access_unless("/zoo", sub {
- my ( $c, $action ) = @_;
- $c->user;
-}); # only people who have bought a ticket can enter
-
-__PACKAGE__->deny_access_unless("/zoo/rabbit", ["child"]); # the petting zoo is for children
-
-__PACKAGE__->deny_access_unless("/zoo/moose", [qw/moose_trainer/]);
-
-__PACKAGE__->acl_add_rule("/zoo/penguins/tux", sub {
- my ( $c, $action ) = @_;
- my $user = $c->user;
- die ( ( $user && $user->os eq "linux" ) ?
- $Catalyst::Plugin::Authorization::ACL::Engine::ALLOWED :
- $Catalyst::Plugin::Authorization::ACL::Engine::DENIED );
-});
-
-__PACKAGE__->allow_access_if("/zoo/penguins/madagascar", sub {
- my ( $c, $action ) = @_;
- my $user = $c->user;
- $user && $user->os ne "windows";
-});
-
-__PACKAGE__
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp/Controller/Auth.pm b/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp/Controller/Auth.pm
deleted file mode 100644
index 1459556..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp/Controller/Auth.pm
+++ /dev/null
@@ -1,43 +0,0 @@
-#!/usr/bin/perl
-
-package ACLTestApp::Controller::Auth;
-use base qw/Catalyst::Controller/;
-
-use strict;
-use warnings;
-
-sub login : Local {
- my ( $self, $c ) = @_;
- $c->res->body( $c->login ? "login successful" : "login failed" );
-}
-
-sub logout : Local {
- my ( $self, $c ) = @_;
- $c->logout;
- $c->res->body( "goodbye" );
-}
-
-sub check : Local {
- my ( $self, $c ) = @_;
- $c->res->body( $c->user ? "logged in" : "guest" );
-}
-
-__PACKAGE__;
-
-__END__
-
-=pod
-
-=head1 NAME
-
-ACLTestApp::Controller::Auth -
-
-=head1 SYNOPSIS
-
- use ACLTestApp::Controller::Auth;
-
-=head1 DESCRIPTION
-
-=cut
-
-
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp/Controller/LionCage.pm b/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp/Controller/LionCage.pm
deleted file mode 100644
index 0c129b9..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp/Controller/LionCage.pm
+++ /dev/null
@@ -1,32 +0,0 @@
-#!/usr/bin/perl
-
-package ACLTestApp::Controller::LionCage;
-use base qw/Catalyst::Controller/;
-
-use strict;
-use warnings;
-
-sub default : Private {
- my ( $self, $c ) = @_;
- $c->res->body( "no-one is allowed in here" );
-}
-
-__PACKAGE__;
-
-__END__
-
-=pod
-
-=head1 NAME
-
-ACLTestApp::Controller::LionCage -
-
-=head1 SYNOPSIS
-
- use ACLTestApp::Controller::LionCage;
-
-=head1 DESCRIPTION
-
-=cut
-
-
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp/Controller/Root.pm b/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp/Controller/Root.pm
deleted file mode 100644
index f1266a1..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp/Controller/Root.pm
+++ /dev/null
@@ -1,32 +0,0 @@
-package ACLTestApp::Controller::Root;
-
-use strict;
-use warnings;
-no warnings 'uninitialized';
-use base 'Catalyst::Controller';
-__PACKAGE__->config->{namespace} = '';
-
-sub restricted : Local {
- my ( $self, $c ) = @_;
- $c->res->body( "restricted" );
-}
-
-sub default : Private {
- my ( $self, $c ) = @_;
- $c->res->body( "welcome to the zoo!" );
-
-}
-
-sub access_denied : Private {
- my ( $self, $c ) = @_;
- $c->res->body($c->res->body . 'denied');
-}
-
-sub end : Private {
- my ( $self, $c ) = @_;
- if ($c->res->body !~ /denied/) {
- $c->res->body($c->res->body . 'allowed');
- }
-}
-
-__PACKAGE__;
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp/Controller/Zoo.pm b/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp/Controller/Zoo.pm
deleted file mode 100644
index 839fb68..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp/Controller/Zoo.pm
+++ /dev/null
@@ -1,42 +0,0 @@
-#!/usr/bin/perl
-
-package ACLTestApp::Controller::Zoo;
-use base qw/Catalyst::Controller/;
-
-use strict;
-use warnings;
-
-sub moose : Local {
- my ( $self, $c ) = @_;
- $c->res->body("moose");
-}
-
-sub elk : Local {
- my ( $self, $c ) = @_;
- $c->res->body("elk ");
-}
-
-sub rabbit : Local {
- my ( $self, $c ) = @_;
- $c->res->body("rabbit ");
-}
-
-__PACKAGE__;
-
-__END__
-
-=pod
-
-=head1 NAME
-
-ACLTestApp::Controller::Zoo -
-
-=head1 SYNOPSIS
-
- use ACLTestApp::Controller::Zoo;
-
-=head1 DESCRIPTION
-
-=cut
-
-
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp/Controller/Zoo/Penguins.pm b/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp/Controller/Zoo/Penguins.pm
deleted file mode 100644
index 776522f..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp/Controller/Zoo/Penguins.pm
+++ /dev/null
@@ -1,41 +0,0 @@
-#!/usr/bin/perl
-
-package ACLTestApp::Controller::Zoo::Penguins;
-use base qw/Catalyst::Controller/;
-
-use strict;
-use warnings;
-
-sub emperor : Local {
- my ( $self, $c ) = @_;
- $c->res->body("emperor penguin");
-}
-
-sub tux : Local {
- my ( $self, $c ) = @_;
- $c->res->body("tux");
-}
-
-sub madagascar : Local {
- my ( $self, $c ) = @_;
- $c->res->body("madagascar");
-}
-
-__PACKAGE__;
-
-__END__
-
-=pod
-
-=head1 NAME
-
-ACLTestApp::Controller::Zoo -
-
-=head1 SYNOPSIS
-
- use ACLTestApp::Controller::Zoo;
-
-=head1 DESCRIPTION
-
-=cut
-
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp2.pm b/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp2.pm
deleted file mode 100644
index 43407d8..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp2.pm
+++ /dev/null
@@ -1,17 +0,0 @@
-package ACLTestApp2;
-
-use strict;
-use warnings;
-no warnings 'uninitialized';
-
-use Catalyst qw/
- Authorization::ACL
-/;
-
-__PACKAGE__->setup;
-
-__PACKAGE__->deny_access("/");
-
-__PACKAGE__->allow_access("/bar");
-
-__PACKAGE__;
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp2/Controller/Root.pm b/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp2/Controller/Root.pm
deleted file mode 100644
index e903cc5..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/t/lib/ACLTestApp2/Controller/Root.pm
+++ /dev/null
@@ -1,44 +0,0 @@
-package ACLTestApp2::Controller::Root;
-
-use strict;
-use warnings;
-no warnings 'uninitialized';
-use base 'Catalyst::Controller';
-__PACKAGE__->config->{namespace} = '';
-
-sub foo : Local {
- my ( $self, $c ) = @_;
- $c->res->body( $c->res->body . "foo");
-}
-
-sub bar : Local {
- my ( $self, $c ) = @_;
- $c->res->body( $c->res->body . "bar");
-}
-
-sub gorch : Local {
- my ( $self, $c, $frozjob ) = @_;
- $c->res->body( $c->res->body . "gorch");
- $c->res->body( $c->res->body . "&frozjob=$frozjob");
-}
-
-sub end : Private {
- my ( $self, $c ) = @_;
-
- $c->res->body( join " ",
- ( $c->stash->{denied} || @{ $c->error } ? "denied" : "allowed" ),
- $c->res->body );
-}
-
-sub access_denied : Private {
- my ( $self, $c, $action, $error ) = @_;
-
- $c->res->header( 'X-Catalyst-ACL-Param-Action' => $action->reverse, 'X-Catalyst-ACL-Param-Error' => $error );
- $c->res->body( join " ", "handled", $c->res->body );
-
- $c->stash->{denied} = 1;
-
- $c->forcibly_allow_access if $c->action->name eq "gorch";
-}
-
-__PACKAGE__;
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/t/live_app.t b/sources/Catalyst-Plugin-Authorization-ACL/t/live_app.t
deleted file mode 100644
index bd5e68e..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/t/live_app.t
+++ /dev/null
@@ -1,103 +0,0 @@
-#!/usr/bin/perl
-
-use strict;
-use warnings;
-
-use lib "t/lib";
-
-use Test::More;
-
-BEGIN {
- eval {
- require Test::WWW::Mechanize::Catalyst;
- require Catalyst::Plugin::Authorization::Roles;
- require Catalyst::Plugin::Authentication;
- require Catalyst::Plugin::Session;
- require Catalyst::Plugin::Session::State::Cookie;
- } or plan 'skip_all' => "A bunch of plugins are required for this test... Look in the source if you really care... $@";
- plan tests => 97;
-}
-
-use Test::WWW::Mechanize::Catalyst 'ACLTestApp';
-
-my $m = Test::WWW::Mechanize::Catalyst->new;
-
-my $u = "http://localhost";
-
-is_allowed("", "welcome");
-
-is_denied("restricted");
-is_denied("lioncage");
-is_denied("zoo/elk");
-is_denied("zoo/moose");
-is_denied("zoo/rabbit");
-is_denied("zoo/penguins/emperor");
-is_denied("zoo/penguins/tux");
-is_denied("zoo/penguins/madagascar");
-
-login(qw/foo bar/);
-
-is_allowed("auth/check", "logged in");
-
-is_denied("restricted");
-is_denied("lioncage");
-is_allowed("zoo/elk");
-is_denied("zoo/moose");
-is_denied("zoo/rabbit");
-is_allowed("zoo/penguins/emperor");
-is_denied("zoo/penguins/tux");
-is_allowed("zoo/penguins/madagascar");
-
-is_allowed("auth/logout");
-
-is_denied("restricted");
-is_denied("lioncage");
-is_denied("zoo/elk");
-is_denied("zoo/moose");
-is_denied("zoo/rabbit");
-is_denied("zoo/penguins/emperor");
-is_denied("zoo/penguins/tux");
-is_denied("zoo/penguins/madagascar");
-
-login(qw/gorch moose/);
-
-is_allowed("zoo/elk");
-is_denied("zoo/moose");
-is_allowed("zoo/rabbit");
-is_denied("lioncage");
-is_denied("restricted");
-is_allowed("zoo/penguins/emperor");
-is_allowed("zoo/penguins/tux");
-is_allowed("zoo/penguins/madagascar");
-
-login(qw/quxx ding/);
-
-is_allowed("zoo/elk");
-is_allowed("zoo/moose");
-is_denied("zoo/rabbit");
-is_allowed("lioncage");
-is_denied("restricted");
-is_allowed("zoo/penguins/emperor");
-is_denied("zoo/penguins/tux");
-is_allowed("zoo/penguins/madagascar");
-
-sub login {
- my ( $l, $p ) = @_;
- is_allowed("auth/login?login=$l&password=$p", "login successful");
-}
-
-sub is_denied {
- my $path = shift;
- local $Test::Builder::Level = 2;
- $m->get_ok("$u/$path", "get '$path'");
- $m->content_is("denied", "access to '$path' is denied");
-}
-
-sub is_allowed {
- my ( $path, $contains ) = @_;
- $path ||= "";
- $m->get_ok("$u/$path", "get '$path'");
- $m->content_contains( $contains, "'$path' contains '$contains'") if $contains;
- $m->content_like(qr/allowed$/, "access to '$path' is allowed");
-}
-
diff --git a/sources/Catalyst-Plugin-Authorization-ACL/t/more_live_app.t b/sources/Catalyst-Plugin-Authorization-ACL/t/more_live_app.t
deleted file mode 100644
index 6187079..0000000
--- a/sources/Catalyst-Plugin-Authorization-ACL/t/more_live_app.t
+++ /dev/null
@@ -1,43 +0,0 @@
-#!/usr/bin/perl
-
-use strict;
-use warnings;
-
-use lib "t/lib";
-
-use Test::More;
-
-BEGIN {
- eval {
- require Test::WWW::Mechanize::Catalyst;
- } or plan 'skip_all' => "Test::WWW::Mechanize::Catalyst required";
- plan tests => 14;
-}
-
-use Test::WWW::Mechanize::Catalyst 'ACLTestApp2';
-
-my $m = Test::WWW::Mechanize::Catalyst->new;
-
-my $u = "http://localhost";
-
-$m->get_ok( "$u/foo", "get foo" );
-$m->content_contains( "", "access to end forbidden" );
-
-$m->get_ok( "$u/bar", "get bar" );
-$m->content_contains( "bar", "access to end forbidden" );
-
-ACLTestApp2->acl_allow_root_internals;
-
-$m->get_ok( "$u/foo", "get foo" );
-$m->content_contains( "denied handled", "denied, handled" );
-
-$m->get_ok( "$u/bar", "get bar" );
-$m->content_contains( "allowed bar", "allowed" );
-
-$m->get_ok( "$u/gorch", "get gorch" );
-$m->content_contains( "denied handled gorch", "denied but overridden by handler" );
-
-$m->get_ok( "$u/gorch/wozzle", "get gorch" );
-$m->content_contains( "frozjob=wozzle", "overriden acces has params intact" );
-is( $m->res->header( 'X-Catalyst-ACL-Param-Action' ), 'gorch', '$action param to access_denied' );
-like( $m->res->header( 'X-Catalyst-ACL-Param-Error' ), qr{Access to gorch denied by rule}, '$error param to access_denied' );
--
Alioth's /usr/local/bin/git-commit-notice on /srv/git.debian.org/git/pkg-perl/packages/libcatalyst-modules-perl.git
More information about the Pkg-perl-cvs-commits
mailing list