libapp-control-perl 1.02-4 source package in Ubuntu

Changelog

libapp-control-perl (1.02-4) unstable; urgency=medium

  [ Salvatore Bonaccorso ]
  * debian/control: Use HTTPS transport protocol for Vcs-Git URI
  * Update Vcs-* headers for switch to salsa.debian.org

  [ gregor herrmann ]
  * debian/*: update URLs from {search,www}.cpan.org to MetaCPAN.

  [ Laurent Baillet ]
  * fix lintian file-contains-trailing-whitespace warning

  [ Debian Janitor ]
  * Bump debhelper from old 9 to 12.
  * Set debhelper-compat version in Build-Depends.

  [ gregor herrmann ]
  * debian/copyright: replace tabs with spaces / remove trailing
    whitespace.
  * debian/watch: use uscan version 4.

 -- Jelmer Vernooij <email address hidden>  Wed, 08 Jun 2022 17:10:18 +0100

Upload details

Uploaded by:
Debian Perl Group
Uploaded to:
Sid
Original maintainer:
Debian Perl Group
Architectures:
all
Section:
perl
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Builds

Kinetic: [FULLYBUILT] amd64

Downloads

File Size SHA-256 Checksum
libapp-control-perl_1.02-4.dsc 2.1 KiB ce73238be2476c2bd3eccd85d398d564c26dd331012a4a712ef058517520ba18
libapp-control-perl_1.02.orig.tar.gz 4.6 KiB db75ab08de37c5a44150195ff97683a66de447918ec10a891f2f4a129fa9fa3d
libapp-control-perl_1.02-4.debian.tar.xz 2.2 KiB 136e3217d7dea2a01145c1be2e34fe5c4fab6e2ebe0d68b703b217ea6bddfb5a

Available diffs

No changes file available.

Binary packages built by this source

libapp-control-perl: Perl module for apachectl style control of another executable

 App::Control is a simple module to replicate the kind of functionality you get
 with apachectl to control Apache, but for any script or executable. There is a
 very simple OO interface, where the constructor is used to specify the
 executable, command line arguments, and pidfile, and various methods (start,
 stop, etc.) are used to control the executable in the obvious way. The module
 is intended to be used in a simple wrapper control script. Currently the
 module does a fork and exec to start the executable, and sets the signal
 handler for SIGCHLD to 'IGNORE' to avoid zombie processes.