head 1.2; access; symbols pkgsrc-2013Q2:1.2.0.24 pkgsrc-2013Q2-base:1.2 pkgsrc-2012Q4:1.2.0.22 pkgsrc-2012Q4-base:1.2 pkgsrc-2011Q4:1.2.0.20 pkgsrc-2011Q4-base:1.2 pkgsrc-2011Q2:1.2.0.18 pkgsrc-2011Q2-base:1.2 pkgsrc-2009Q4:1.2.0.16 pkgsrc-2009Q4-base:1.2 pkgsrc-2008Q4:1.2.0.14 pkgsrc-2008Q4-base:1.2 pkgsrc-2008Q3:1.2.0.12 pkgsrc-2008Q3-base:1.2 cube-native-xorg:1.2.0.10 cube-native-xorg-base:1.2 pkgsrc-2008Q2:1.2.0.8 pkgsrc-2008Q2-base:1.2 pkgsrc-2008Q1:1.2.0.6 pkgsrc-2008Q1-base:1.2 pkgsrc-2007Q4:1.2.0.4 pkgsrc-2007Q4-base:1.2 pkgsrc-2007Q3:1.2.0.2 pkgsrc-2007Q3-base:1.2; locks; strict; comment @# @; 1.2 date 2007.10.06.06.12.36; author taca; state dead; branches; next 1.1; 1.1 date 2007.09.30.04.08.17; author taca; state Exp; branches; next ; desc @@ 1.2 log @Update Ruby packages to 1.8.6-p111. Basically, no change since previous update except Net::HTTP default @@enable_post_connection_check was wrongly set to true. (It might cause compatibility problem.) @ text @$NetBSD: patch-di,v 1.1 2007/09/30 04:08:17 taca Exp $ --- lib/open-uri.rb.orig 2007-02-13 08:01:19.000000000 +0900 +++ lib/open-uri.rb @@@@ -229,6 +229,7 @@@@ module OpenURI if target.class == URI::HTTPS require 'net/https' http.use_ssl = true + http.enable_post_connection_check = true http.verify_mode = OpenSSL::SSL::VERIFY_PEER store = OpenSSL::X509::Store.new store.set_default_paths @@@@ -240,16 +241,6 @@@@ module OpenURI resp = nil http.start { - if target.class == URI::HTTPS - # xxx: information hiding violation - sock = http.instance_variable_get(:@@socket) - if sock.respond_to?(:io) - sock = sock.io # 1.9 - else - sock = sock.instance_variable_get(:@@socket) # 1.8 - end - sock.post_connection_check(target_host) - end req = Net::HTTP::Get.new(request_uri, header) if options.include? :http_basic_authentication user, pass = options[:http_basic_authentication] @ 1.1 log @Add patches against Ruby 1.8.6-p111. Since 1.8.6-p111 dosen't officially released (SVN's tag only), I decide to keep pkgsrc's Ruby's version. This isn't leaf package but fixes security problem reported by http://www.isecpartners.com/advisories/2007-006-rubyssl.txt. Bump PKGREVISION. @ text @d1 1 a1 1 $NetBSD$ @