[pve-devel] [PATCH access-control] don't import 'RFC' from MIME::Base32
Wolfgang Bumiller
w.bumiller at proxmox.com
Mon Jul 25 08:33:29 CEST 2016
call encode_rfc3548 explicitly instead as newer versions of
the base32 package will drop this import scheme (stretch)
---
One less breakage to worry about when we move to newer debian
releases in the future.
Note that in the code in PVE/AccessControl.pm I had already used the
explicit call, so only the import line was updated in that file.
Tested successfully with both jessie's libmime-base32-perl=1.02a-1
as well as stretch's version 1.301-1.
PVE/AccessControl.pm | 2 +-
oathkeygen | 4 ++--
2 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/PVE/AccessControl.pm b/PVE/AccessControl.pm
index 0b64374..ea4245c 100644
--- a/PVE/AccessControl.pm
+++ b/PVE/AccessControl.pm
@@ -8,7 +8,7 @@ use Crypt::OpenSSL::RSA;
use Net::SSLeay;
use Net::IP;
use MIME::Base64;
-use MIME::Base32 qw(RFC); #libmime-base32-perl
+use MIME::Base32; #libmime-base32-perl
use Digest::SHA;
use URI::Escape;
use LWP::UserAgent;
diff --git a/oathkeygen b/oathkeygen
index 84b6441..89e385a 100755
--- a/oathkeygen
+++ b/oathkeygen
@@ -2,10 +2,10 @@
use strict;
use warnings;
-use MIME::Base32 qw(RFC); #libmime-base32-perl
+use MIME::Base32; #libmime-base32-perl
my $test;
open(RND, "/dev/urandom");
sysread(RND, $test, 10) == 10 || die "read randon data failed\n";
-print MIME::Base32::encode($test) . "\n";
+print MIME::Base32::encode_rfc3548($test) . "\n";
--
2.1.4
More information about the pve-devel
mailing list