debian/0000755000000000000000000000000012167167520007175 5ustar debian/rules0000755000000000000000000000050612167146745010264 0ustar #!/usr/bin/make -f # -*- makefile-gmake -*- # Uncomment this to turn on verbose mode. #export DH_VERBOSE=1 %: dh $@ --with quilt override_dh_auto_clean: dh_auto_clean rm -f config.sub config.guess override_dh_auto_configure: ln -sf /usr/share/misc/config.sub . ln -sf /usr/share/misc/config.guess . dh_auto_configure debian/compat0000644000000000000000000000000212166740415010372 0ustar 9 debian/auth_openid.load0000644000000000000000000000011212167164724012332 0ustar LoadModule auth_openid_module /usr/lib/apache2/modules/mod_auth_openid.so debian/copyright0000644000000000000000000000263011034303716011120 0ustar This package was debianized by NIIBE Yutaka on Wed, 7 Feb 2007 20:19:36 +0900. It was downloaded from http://butterfat.net/releases/mod_auth_openid/ Upstream Author: bmuller Copyright: Copyright (C) 2007 Butterfat, LLC (http://butterfat.net) License: Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. The Debian packaging was done by NIIBE Yutaka and the code is released under public domain. debian/README.source0000644000000000000000000000103711341372556011355 0ustar libapache2-mod-auth-openid for Debian ------------------------------------- This package uses quilt to manage all modifications to the upstream source. Changes are stored in the source package as diffs in debian/patches and applied during the build. Please see: /usr/share/doc/quilt/README.source for more information on how to apply the patches, modify patches, or remove a patch. debian/README.Debian0000644000000000000000000000732012167154457011245 0ustar libapache2-mod-auth-openid for Debian ------------------------------------- You can enable this module using a2enmod: # a2enmod auth_openid Following is excerpt from Webpage: -------------------- Depending on where you specify your AuthOpenIDDBLocation (see below), you may need to touch the db file as the user that's running Apache (or chown the directory it's being stored in). For instance: # /tmp/mod_auth_openid.db is the default location for the DB su root touch /tmp/mod_auth_openid.db chown www-data /tmp/mod_auth_openid.db Usage Place the following directive in either a Directory, Location, or File directive in your httpd.conf: AuthOpenIDEnabled On ・ AuthOpenIDEnabled: The directory/location/file should be secured by mod_auth_openid. This is the only required directive. The following are optional: AuthOpenIDDBLocation /some/location/my_file.db AuthOpenIDTrusted ^http://myopenid.com/server$ ^http://someprovider.com/idp$ AuthOpenIDDistrusted ^http://hackerdomain ^http://openid.microsoft.com$ AuthOpenIDUseCookie Off AuthOpenIDTrustRoot http://example.com AuthOpenIDCookieName example_cookie_name AuthOpenIDLoginPage /login.html ・ AuthOpenIDDBLocation: Specifies the place the BDB file should be stored. Default: /tmp/mod_auth_openid.db. ・ AuthOpenIDTrusted: If specified, only users using providers that match one of the (Perl compatible) regular expressions listed will be allowed to authenticate. Default: Trust all providers. ・ AuthOpenIDDistrusted: If specified, only users using providers that do not match one of the (Perl compatible) regular expressions listed will be allowed to authenticate. You can use this in combination with AuthOpenIDTrusted; in that case, only a domain that is listed as trusted and not listed as distrusted can be used. Default: No providers are distrusted. ・ AuthOpenIDUseCookie: If "Off", then a session cookie will not be set on the client upon successful authentication. The page will load once; if reloaded or if the user visits it again it will ask the user to reauthenticate. Default: On ・ AuthOpenIDTrustRoot: User's are asked to approve this value by their identity provider after redirection. Most providers will error out unless this value matches the URL they are being redirected from, or some subset of that URL. For instance, if a user is trying to access http://example.com/protected/ index.html then either http://example.com or http://example.com/protected/ would work but http://example.com/protected/area/ would not. Default: The URL the user is trying to access (without filenames / query parameters at the end). ・ AuthOpenIDCookieName: The name of the session cookie set by mod_auth_openid. Default: open_id_session_id ・ AuthOpenIDLoginPage: The URL location of a customized login page. This could be a location on a different server or domain. Default: use the mod_auth_openid login page that exists in the module. See the custom login page howto for more information. Next, restart apache: /path/to/apache2/bin/apachectl stop /path/to/apache2/bin/apachectl start After a user authenticates themselves, the user's identity will be available in the REMOTE_USER cgi environment variable. A cookie named open_id_session_id is saved to maintain each user's session. Questions/Problems/Complaints First, read the FAQ. If it's a bug, report it at https://www.butterfat.net/tracker/butterfat. If it's a complaint, email . -------------------- -- NIIBE Yutaka , Wed, 10 Jul 2013 03:46:55 +0000 debian/docs0000644000000000000000000000001411341372556010043 0ustar NEWS README debian/source/0000755000000000000000000000000011341372615010471 5ustar debian/source/format0000644000000000000000000000001411341372610011672 0ustar 3.0 (quilt) debian/install0000644000000000000000000000006312167161647010571 0ustar debian/auth_openid.load etc/apache2/mods-available debian/control0000644000000000000000000000123212167153134010572 0ustar Source: libapache2-mod-auth-openid Section: httpd Priority: extra Maintainer: NIIBE Yutaka Build-Depends: quilt (>= 0.46-7~), debhelper (>= 9), autotools-dev, apache2-dev , libopkele-dev (>= 2.0.4), pkg-config, automake, libtool, apache2-bin Standards-Version: 3.9.4 Homepage: http://findingscience.com/mod_auth_openid/ Package: libapache2-mod-auth-openid Architecture: any Depends: apache2-api-20120211, ${shlibs:Depends}, ${misc:Depends} Description: OpenID authentication module for Apache2 mod_auth_openid is an authentication module for Apache2. It handles the functions of an OpenID consumer as specified in the OpenID 2.0 specification. debian/patches/0000755000000000000000000000000012167167105010623 5ustar debian/patches/04-module_name-0.7.diff0000644000000000000000000000443112167161320014460 0ustar Description: Module name change to match path name of .so Author: NIIBE Yutaka Last-Update: 2013-07-10 Index: libapache2-mod-auth-openid-0.7/src/mod_auth_openid.cpp =================================================================== --- libapache2-mod-auth-openid-0.7.orig/src/mod_auth_openid.cpp 2013-07-10 04:14:59.379797198 +0000 +++ libapache2-mod-auth-openid-0.7/src/mod_auth_openid.cpp 2013-07-10 04:24:14.084197661 +0000 @@ -26,12 +26,13 @@ */ #include "mod_auth_openid.h" +static int * const aplog_module_index = &(auth_openid_module.module_index); #define APDEBUG(r, msg, ...) ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, msg, __VA_ARGS__); #define APWARN(r, msg, ...) ap_log_rerror(APLOG_MARK, APLOG_WARNING, 0, r, msg, __VA_ARGS__); #define APERR(r, msg, ...) ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, msg, __VA_ARGS__); -extern "C" module AP_MODULE_DECLARE_DATA authopenid_module; +extern "C" module AP_MODULE_DECLARE_DATA auth_openid_module; typedef struct { const char *db_location; @@ -567,7 +568,7 @@ static int mod_authopenid_method_handler(request_rec *r) { modauthopenid_config *s_cfg; - s_cfg = (modauthopenid_config *) ap_get_module_config(r->per_dir_config, &authopenid_module); + s_cfg = (modauthopenid_config *) ap_get_module_config(r->per_dir_config, &auth_openid_module); // if we're not enabled for this location/dir, decline doing anything const char *current_auth = ap_auth_type(r); @@ -664,7 +665,7 @@ } //module AP_MODULE_DECLARE_DATA -module AP_MODULE_DECLARE_DATA authopenid_module = { +module AP_MODULE_DECLARE_DATA auth_openid_module = { STANDARD20_MODULE_STUFF, create_modauthopenid_config, NULL, // config merge function - default is to override Index: libapache2-mod-auth-openid-0.7/src/mod_auth_openid.h =================================================================== --- libapache2-mod-auth-openid-0.7.orig/src/mod_auth_openid.h 2013-07-10 04:14:59.379797198 +0000 +++ libapache2-mod-auth-openid-0.7/src/mod_auth_openid.h 2013-07-10 04:22:50.336141216 +0000 @@ -43,9 +43,7 @@ #include "apr_general.h" #include "apr_time.h" -#ifdef APLOG_USE_MODULE -APLOG_USE_MODULE(authopenid_module); -#endif +extern "C" module AP_MODULE_DECLARE_DATA auth_openid_module; /* other general lib includes */ #include debian/patches/06-permit_cookieless-0.7.diff0000644000000000000000000000243012167167074015726 0ustar Description: Permit cookieless authentication. Author: upstream Forwarded: https://lists.butterfat.net/pipermail/mod-auth-openid/2012-October/000122.html Bug-Debian: http://bugs.debian.org/693923 Reviewed-By: NIIBE Yutaka Last-Update: 2013-07-10 Index: libapache2-mod-auth-openid-0.7/src/mod_auth_openid.cpp =================================================================== --- libapache2-mod-auth-openid-0.7.orig/src/mod_auth_openid.cpp 2013-07-10 05:16:41.700605967 +0000 +++ libapache2-mod-auth-openid-0.7/src/mod_auth_openid.cpp 2013-07-10 05:16:41.644605963 +0000 @@ -320,7 +320,7 @@ }; static bool has_valid_session(request_rec *r, modauthopenid_config *s_cfg) { - // test for valid session - if so, return DECLINED + // test for valid session std::string session_id = ""; modauthopenid::get_session_id(r, std::string(s_cfg->cookie_name), session_id); if(session_id != "" && s_cfg->use_cookie) { @@ -558,7 +558,7 @@ // if we're not setting cookie - don't redirect, just show page APDEBUG(r, "Setting REMOTE_USER to %s", remote_user.c_str()); r->user = apr_pstrdup(r->pool, remote_user.c_str()); - return DECLINED; + return OK; } catch(opkele::exception &e) { APERR(r, "Error in authentication: %s", e.what()); consumer.close(); debian/patches/01-destdir-0.5.diff0000644000000000000000000000353512167133002013624 0ustar Description: Add DESTDIR support Author: NIIBE Yutaka Last-Update: 2013-07-10 Index: libapache2-mod-auth-openid-0.7/src/Makefile.am =================================================================== --- libapache2-mod-auth-openid-0.7.orig/src/Makefile.am 2013-07-10 01:16:00.737026201 +0000 +++ libapache2-mod-auth-openid-0.7/src/Makefile.am 2013-07-10 01:16:00.681026226 +0000 @@ -25,8 +25,9 @@ endif install-exec-local: - ${APXS} -i -a -n 'authopenid' mod_auth_openid.la + ${APXS} -i -S LIBEXECDIR=${DESTDIR}/usr/lib/apache2/modules -n 'authopenid' mod_auth_openid.la mod_auth_openid.la: libmodauthopenid.la - ${APXS} -c -o $@ $< ${APACHE_CFLAGS} ${OPKELE_CFLAGS} ${OPKELE_LIBS} \ - ${SQLITE3_CFLAGS} ${PCRE_LIBS} ${CURL_LIBS} + ${APXS} -c -o $@ $< -lstdc++ \ + ${APACHE_CFLAGS} ${OPKELE_CFLAGS} ${OPKELE_LIBS} \ + ${SQLITE3_CFLAGS} ${PCRE_LIBS} ${CURL_LIBS} -lapr-1 -laprutil-1 Index: libapache2-mod-auth-openid-0.7/src/Makefile.in =================================================================== --- libapache2-mod-auth-openid-0.7.orig/src/Makefile.in 2013-07-10 01:16:00.737026201 +0000 +++ libapache2-mod-auth-openid-0.7/src/Makefile.in 2013-07-10 01:16:00.685026223 +0000 @@ -565,11 +565,11 @@ install-exec-local: - ${APXS} -i -a -n 'authopenid' mod_auth_openid.la + ${APXS} -i -S LIBEXECDIR=${DESTDIR}/usr/lib/apache2/modules -n 'authopenid' mod_auth_openid.la mod_auth_openid.la: libmodauthopenid.la - ${APXS} -c -o $@ $< ${APACHE_CFLAGS} ${OPKELE_CFLAGS} ${OPKELE_LIBS} \ - ${SQLITE3_CFLAGS} ${PCRE_LIBS} ${CURL_LIBS} + ${APXS} -c -o $@ $< -lstdc++ ${APACHE_CFLAGS} ${OPKELE_CFLAGS} ${OPKELE_LIBS} \ + ${SQLITE3_CFLAGS} ${PCRE_LIBS} ${CURL_LIBS} -lapr-1 -laprutil-1 # Tell versions [3.59,3.63) of GNU make to not export all variables. # Otherwise a system limit (for SysV at least) may be exceeded. debian/patches/series0000644000000000000000000000023012167167067012042 0ustar 01-destdir-0.5.diff 02-apache2.4_log-0.7.diff 03-apache2.4_auth-0.7.diff 04-module_name-0.7.diff 05-empty_string-0.7.diff 06-permit_cookieless-0.7.diff debian/patches/02-apache2.4_log-0.7.diff0000644000000000000000000000127112167161433014503 0ustar Description: Add APLOG_USE_MODULE for Apache 2.4 This fix is wrong and being overriden by 04-module_name-0.7.diff. Author: upstream Last-Update: 2013-07-10 Index: libapache2-mod-auth-openid-0.7/src/mod_auth_openid.h =================================================================== --- libapache2-mod-auth-openid-0.7.orig/src/mod_auth_openid.h 2013-07-10 02:55:59.787667569 +0000 +++ libapache2-mod-auth-openid-0.7/src/mod_auth_openid.h 2013-07-10 02:55:59.731667574 +0000 @@ -42,6 +42,10 @@ #include "apr_general.h" #include "apr_time.h" +#ifdef APLOG_USE_MODULE +APLOG_USE_MODULE(authopenid_module); +#endif + /* other general lib includes */ #include #include debian/patches/03-apache2.4_auth-0.7.diff0000644000000000000000000001004212167151020014647 0ustar Description: Follow Apache 2.4 API for authentication and authorization Author: NIIBE Yutaka Last-Update: 2013-07-10 Index: libapache2-mod-auth-openid-0.7/src/mod_auth_openid.cpp =================================================================== --- libapache2-mod-auth-openid-0.7.orig/src/mod_auth_openid.cpp 2013-07-10 03:09:44.000000000 +0000 +++ libapache2-mod-auth-openid-0.7/src/mod_auth_openid.cpp 2013-07-10 03:16:25.891664117 +0000 @@ -571,7 +571,7 @@ // if we're not enabled for this location/dir, decline doing anything const char *current_auth = ap_auth_type(r); - if (!current_auth || strcasecmp(current_auth, "openid")) + if (!current_auth || strcasecmp(current_auth, "OpenID")) return DECLINED; // make a record of our being called @@ -608,51 +608,59 @@ } } -static int mod_authopenid_check_user_access(request_rec *r) { - modauthopenid_config *s_cfg; - s_cfg = (modauthopenid_config *) ap_get_module_config(r->per_dir_config, &authopenid_module); - char *user = r->user; - int m = r->method_number; - int required_user = 0; - register int x; +static authz_status +mod_authopenid_validuser_check_authorization(request_rec *r, + const char *require_args, + const void *parsed_require_line) +{ + if (!r->user) + return AUTHZ_DENIED_NO_USER; + + return AUTHZ_GRANTED; +} + +static authz_status +mod_authopenid_user_check_authorization(request_rec *r, + const char *require_args, + const void *parsed_require_line) +{ const char *t, *w; - const apr_array_header_t *reqs_arr = ap_requires(r); - require_line *reqs; - if (!reqs_arr) - return DECLINED; - - reqs = (require_line *)reqs_arr->elts; - for (x = 0; x < reqs_arr->nelts; x++) { - if (!(reqs[x].method_mask & (AP_METHOD_BIT << m))) - continue; - - t = reqs[x].requirement; - w = ap_getword_white(r->pool, &t); - if (!strcasecmp(w, "valid-user")) - return OK; - - if (!strcasecmp(w, "user")) { - required_user = 1; - while (t[0]) { - w = ap_getword_conf(r->pool, &t); - if (!strcmp(user, w)) - return OK; - } - } - } + if (!r->user) + return AUTHZ_DENIED_NO_USER; - if (!required_user) - return DECLINED; + t = require_args; + while ((w = ap_getword_conf(r->pool, &t)) && w[0]) + if (!strcmp(r->user, w)) + return AUTHZ_GRANTED; - APERR(r, "Access to %s failed: user '%s' invalid", r->uri, user); - ap_note_auth_failure(r); - return HTTP_UNAUTHORIZED; + APERR(r, "Access to %s failed: user '%s' invalid", r->uri, r->user); + return AUTHZ_DENIED; } +static const authz_provider mod_authopenid_authz_user_provider = +{ + &mod_authopenid_user_check_authorization, + NULL, +}; + +static const authz_provider mod_authopenid_authz_validuser_provider = +{ + &mod_authopenid_validuser_check_authorization, + NULL, +}; + static void mod_authopenid_register_hooks (apr_pool_t *p) { - ap_hook_check_user_id(mod_authopenid_method_handler, NULL, NULL, APR_HOOK_MIDDLE); - ap_hook_auth_checker(mod_authopenid_check_user_access, NULL, NULL, APR_HOOK_MIDDLE); + ap_hook_check_authn(mod_authopenid_method_handler, NULL, NULL, + APR_HOOK_MIDDLE, AP_AUTH_INTERNAL_PER_CONF); + ap_register_auth_provider(p, AUTHZ_PROVIDER_GROUP, "user", + AUTHN_PROVIDER_VERSION, + &mod_authopenid_authz_user_provider, + AP_AUTH_INTERNAL_PER_CONF); + ap_register_auth_provider(p, AUTHZ_PROVIDER_GROUP, "valid-user", + AUTHN_PROVIDER_VERSION, + &mod_authopenid_authz_validuser_provider, + AP_AUTH_INTERNAL_PER_CONF); } //module AP_MODULE_DECLARE_DATA Index: libapache2-mod-auth-openid-0.7/src/mod_auth_openid.h =================================================================== --- libapache2-mod-auth-openid-0.7.orig/src/mod_auth_openid.h 2013-07-10 03:09:48.000000000 +0000 +++ libapache2-mod-auth-openid-0.7/src/mod_auth_openid.h 2013-07-10 03:09:48.000000000 +0000 @@ -38,6 +38,7 @@ #include "ap_config.h" #include "http_log.h" #include "mod_ssl.h" +#include "mod_auth.h" #include "apr.h" #include "apr_general.h" #include "apr_time.h" debian/patches/05-empty_string-0.7.diff0000644000000000000000000000200512167167055014726 0ustar Description: Fix empty string bug of str_replace. Author: upstream Forwarded: https://lists.butterfat.net/pipermail/mod-auth-openid/2012-October/000121.html Bug-Debian: http://bugs.debian.org/690113 Reviewed-By: NIIBE Yutaka Last-Update: 2013-07-10 Index: libapache2-mod-auth-openid-0.7/src/moid_utils.cpp =================================================================== --- libapache2-mod-auth-openid-0.7.orig/src/moid_utils.cpp 2013-07-10 05:09:17.908566043 +0000 +++ libapache2-mod-auth-openid-0.7/src/moid_utils.cpp 2013-07-10 05:09:17.856566040 +0000 @@ -96,9 +96,11 @@ string str_replace(string needle, string replacement, string haystack) { vector v = explode(haystack, needle); string r = ""; - for(vector::size_type i=0; i < v.size()-1; i++) - r += v[i] + replacement; - r += v[v.size()-1]; + if(v.size()) { + for(vector::size_type i=0; i < v.size()-1; i++) + r += v[i] + replacement; + r += v[v.size()-1]; + } return r; }; debian/dirs0000644000000000000000000000006311034303716010047 0ustar etc/apache2/mods-available usr/lib/apache2/modules debian/watch0000644000000000000000000000022511761743164010230 0ustar version=3 http://findingscience.com/mod_auth_openid/releases.html https://github.com/downloads/bmuller/mod_auth_openid/mod_auth_openid-(.*)\.tar\.gz debian/clean0000644000000000000000000000002712167155301010173 0ustar src/mod_auth_openid.la debian/changelog0000644000000000000000000001255212167167210011050 0ustar libapache2-mod-auth-openid (0.7-1) unstable; urgency=low * debian/rules (override_dh_auto_clean, override_dh_auto_configure): New for config.{sub,guess}. * debian/compat: Require 9. * debian/control (Build-Depends): Require debhelper >=9, apache2-dev, and apache2-bin. (Standards-Version): Confirms to 3.9.4. * debian/patches/01-destdir-0.5.diff: Rename * debian/patches/02-apache2.4_log-0.7.diff: New (Closes: #666860). * debian/patches/03-apache2.4_auth-0.7.diff: New. * debian/patches/04-module_name-0.7.diff: New. * debian/patches/{05-empty_string-0.7.diff, 06-permit_cookieless-0.7.diff}: New. Thanks to Daniel Kahn Gillmor. * debian/auth_openid.load: Fix module name. * debian/README.Debian: Follow the fix of module name (Closes: #697858). * Incorporate NMUs. -- NIIBE Yutaka Tue, 09 Jul 2013 07:51:14 +0000 libapache2-mod-auth-openid (0.7-0.1) unstable; urgency=low * NMU * New upstream version. closes: #644527. - Fixes CVE-2012-2760: Information disclosure; closes: #674165. - Fixes breakage on https; closes: #634801. - Update DESTDIR patch. * Bump to Standards-Version 3.9.3. * Fix watch file. * Update Homepage. closes: #603916. * Convert README.Debian from EUC-JP to UTF-8. closes: #619768. -- Clint Adams Thu, 31 May 2012 15:27:10 -0400 libapache2-mod-auth-openid (0.5-1.1) unstable; urgency=low * Non-maintainer upload. * Fix "FTBFS: dpkg-buildpackage: error: dpkg-source -b libapache2-mod- auth-openid-0.5 gave error exit status 2": drop autogenerated patch debian-changes-0.5-1, and add the created file to debian/clean. (Closes: #643180) * Fix "The file authopenid.load missing": install via debian/install instead of the wrong construct in debian/rules. (Closes: #614416) -- gregor herrmann Fri, 02 Mar 2012 17:07:58 +0100 libapache2-mod-auth-openid (0.5-1) unstable; urgency=low * New upstream release (Closes: #556907). * debian/{rules,source,patches,README.source}: Use 3.0 (quilt) format. * debian/control (Section): Now, it's httpd (was: web). (Build-Depends): Remove libstdc++6-4.3-dev, adding quilt and autotools-dev. Change to automake (was: automake1.10). -- NIIBE Yutaka Thu, 25 Feb 2010 13:05:23 +0900 libapache2-mod-auth-openid (0.3-2) unstable; urgency=low * debian/control (Build-Depends): Require libstdc++6-4.3-dev and newer version of libopkele-dev. Added pkg-config. (Description): It supports OpenID 2.0 specification, now. Thanks to Brian Muller for notification. -- NIIBE Yutaka Tue, 08 Jul 2008 08:42:38 +0900 libapache2-mod-auth-openid (0.3-1) unstable; urgency=low * New upstream release. * Rebuild with newer libcurl fix -Wl,-z,defs problem of #488701 (Closes: #489082). * debian/control (Standards-Version): Conform to 3.8.0 (was: 3.7.3). (Homepage): Update URL (was: http://www.butterfat.net/wiki/Projects/ModAuthOpenID). (Build-Depends): Remove libdb4.6++-dev and libpcre++-dev. Specify libopkele-dev version. * debian/docs: Updated. -- NIIBE Yutaka Mon, 07 Jul 2008 12:04:47 +0900 libapache2-mod-auth-openid (0.2-2) unstable; urgency=low * Regenerate configure which was wrongly generated without APXS. (I had forgotten '-I acinclude.d' arguments when I invoked aclocal.) Thanks to Niko Tyni (Closes: #475566). -- NIIBE Yutaka Sat, 12 Apr 2008 09:34:37 +0900 libapache2-mod-auth-openid (0.2-1) unstable; urgency=low * New upstream release. -- NIIBE Yutaka Sun, 06 Apr 2008 17:09:34 +0900 libapache2-mod-auth-openid (0.1-5) unstable; urgency=low * debian/authopenid.load: Fix load script. Thanks to Loic Dachary, Alex Kuklin, and Kai Hendry (Closes: #456899, #449459, #450819). * debian/README.Debian: Correction. Thanks to Kai Hendry (Closes: #450818). * debian/control (Homepage): Added. (Build-Depends): Depends on libdb4.6++-dev (was: libdb4.4++-dev). (Standards-Version): It now conforms to 3.7.3. * Makefile.am (db_info_LDADD): New automake variable. * debian/rules: Fix distclean error handling. -- NIIBE Yutaka Wed, 16 Jan 2008 13:30:35 +0900 libapache2-mod-auth-openid (0.1-4) unstable; urgency=low * debian/control (Priority): Change to extra (from optional), because dependent package, libopkele, is in extra. -- NIIBE Yutaka Mon, 15 Oct 2007 09:04:21 +0900 libapache2-mod-auth-openid (0.1-3) unstable; urgency=low * Rebuild including source. * Makefile.in, aclocal.m4, missing, depcomp, install-sh: Regenerated. * debian/control (Build-Depends): Added automake-1.9 and libtool. -- NIIBE Yutaka Wed, 19 Sep 2007 13:56:51 +0900 libapache2-mod-auth-openid (0.1-2) unstable; urgency=low * mod-auth-openid.cpp (mod_authopenid_method_handler): Call normalize instead of canonicalize which is now virtual function for newer opkele. -- NIIBE Yutaka Wed, 19 Sep 2007 13:49:06 +0900 libapache2-mod-auth-openid (0.1-1) unstable; urgency=low * New upstream release (Closes: #409154). License has been changed from GPL to permissive BSD/MIT like. -- NIIBE Yutaka Sat, 25 Aug 2007 10:29:22 +0900 libapache2-mod-auth-openid (0.0-1) unstable; urgency=low * Initial packaging. -- NIIBE Yutaka Wed, 7 Feb 2007 20:19:36 +0900