certs.patch 1.3 KB

12345678910111213141516171819202122232425262728293031323334353637383940
  1. --- Makefile.PL.old 2016-01-04 11:31:52.349484123 +0800
  2. +++ Makefile.PL 2016-01-04 11:32:07.432992090 +0800
  3. @@ -15,7 +15,6 @@
  4. 'LWP::UserAgent' => '6.06',
  5. 'Net::HTTPS' => 6,
  6. 'IO::Socket::SSL' => "1.54",
  7. - 'Mozilla::CA' => "20110101",
  8. },
  9. META_MERGE => {
  10. resources => {
  11. --- lib/LWP/Protocol/https.pm.old 2016-01-04 11:33:19.003810886 +0800
  12. +++ lib/LWP/Protocol/https.pm 2016-01-04 11:34:42.358079461 +0800
  13. @@ -25,25 +25,7 @@
  14. }
  15. if ($ssl_opts{SSL_verify_mode}) {
  16. unless (exists $ssl_opts{SSL_ca_file} || exists $ssl_opts{SSL_ca_path}) {
  17. - eval {
  18. - require Mozilla::CA;
  19. - };
  20. - if ($@) {
  21. - if ($@ =! /^Can't locate Mozilla\/CA\.pm/) {
  22. - $@ = <<'EOT';
  23. -Can't verify SSL peers without knowing which Certificate Authorities to trust
  24. -
  25. -This problem can be fixed by either setting the PERL_LWP_SSL_CA_FILE
  26. -environment variable or by installing the Mozilla::CA module.
  27. -
  28. -To disable verification of SSL peers set the PERL_LWP_SSL_VERIFY_HOSTNAME
  29. -environment variable to 0. If you do this you can't be sure that you
  30. -communicate with the expected peer.
  31. -EOT
  32. - }
  33. - die $@;
  34. - }
  35. - $ssl_opts{SSL_ca_file} = Mozilla::CA::SSL_ca_file();
  36. + $ssl_opts{SSL_ca_file} = '/etc/ssl/certs/ca-certificates.crt';
  37. }
  38. }
  39. $self->{ssl_opts} = \%ssl_opts;