Commit graph

9 commits

Author SHA1 Message Date
Mathieu Arnold
cb41fc6623 Fix license information for portgs that use "the same license as Perl".
Sponsored by:	Absolight
2017-09-15 08:58:46 +00:00
Jun Kuriyama
448862d6e6 - Upgrade to 0.07. 2015-06-14 04:43:31 +00:00
Mathieu Arnold
eee58d187e Change the way Perl modules are installed, update the default Perl to 5.18.
Before, we had:

  site_perl :           lib/perl5/site_perl/5.18
  site_perl/perl_arch : lib/perl5/site_perl/5.18/mach
  perl_man3 :           lib/perl5/5.18/man/man3

Now we have:

  site_perl : lib/perl5/site_perl
  site_arch : lib/perl5/site_perl/mach/5.18
  perl_man3 : lib/perl5/site_perl/man/man3

Modules without any .so will be installed at the same place regardless of the
Perl version, minimizing the upgrade when the major Perl version is changed.
It uses a version dependent directory for modules with compiled bits.

As PERL_ARCH is no longer needed in plists, it has been removed from
PLIST_SUB.

The USE_PERL5=fixpacklist keyword is removed, the .packlist file is now
always removed, as is perllocal.pod.

The old site_perl and site_perl/arch directories have been kept in the
default Perl @INC for all Perl ports, and will be phased out as these old
Perl versions expire.

PR:		194969
Differential Revision:	https://reviews.freebsd.org/D1019
Exp-run by:	antoine
Reviewed by:	perl@
Approved by:	portmgr
2014-11-26 13:08:24 +00:00
Baptiste Daroussin
77cba41a62 Cleanup plist 2014-10-27 15:23:30 +00:00
Andrej Zverev
073942c880 - add stage support
Approved by:	portmgr (blanket infrastructure)
2014-01-29 17:46:33 +00:00
Baptiste Daroussin
888ab73a81 Add NO_STAGE all over the place in preparation for the staging support (cat: lang) 2013-09-20 19:53:09 +00:00
Andrej Zverev
72185e5fb2 - convert to the new perl5 framework
- trim Makefile header

Approved by:	portmgr (bapt@, blanket)
2013-09-11 08:56:53 +00:00
Jun Kuriyama
cc340b3e9b - Upgrade to 0.06. 2011-08-06 11:42:02 +00:00
Jun Kuriyama
d14dec2ee2 There are a lot of XSS, a security hole typically found in web
applications, caused by incorrect (or lack of) JavaScript
escaping.  This module is aimed to provide a secure JavaScript
escaping to avoid XSS with JavaScript values.

The escaping routine JavaScript::Value::Escape provides escapes q!"!,
q!'!, q!&!, q!=!, q!-!, q!+!, q!;!, q!<!, q!>!, q!/!, q!\! and control
characters to JavaScript unicode entities like "\u0026".

WWW: http://search.cpan.org/dist/JavaScript-Value-Escape/
2011-05-19 13:54:39 +00:00