ruby-whitewash 2.1-2 source package in Ubuntu
Changelog
ruby-whitewash (2.1-2) unstable; urgency=medium * Team upload. [ Utkarsh Gupta ] * Add salsa-ci.yml [ Debian Janitor ] * Use secure copyright file specification URI. * Use secure URI in debian/watch. * Bump debhelper from old 9 to 12. * Update watch file format version to 4. * Bump debhelper from old 12 to 13. * Update Vcs-* headers from URL redirect. * Use canonical URL in Vcs-Git. * Use secure URI in Homepage field. [ Daniel Leidert ] * d/patches/0002-fix-usage-with-Psych-4.patch: Add patch. - Use YAML.unsafe_load() because YAML.load() changed to YAML.safe_load() in Psych 4, making unrelated programs FTBFS now with errors like Psych::DisallowedClass: Tried to load unspecified class XXX. * d/patches/series: Add new patch. -- Daniel Leidert <email address hidden> Sat, 28 Jan 2023 17:13:21 +0100
Upload details
- Uploaded by:
- Debian Ruby Extras Maintainers
- Uploaded to:
- Sid
- Original maintainer:
- Debian Ruby Extras Maintainers
- Architectures:
- all
- Section:
- ruby
- Urgency:
- Medium Urgency
See full publishing history Publishing
Series | Published | Component | Section | |
---|---|---|---|---|
Oracular | release | universe | ruby | |
Noble | release | universe | ruby | |
Mantic | release | universe | ruby | |
Lunar | release | universe | ruby |
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
ruby-whitewash_2.1-2.dsc | 2.0 KiB | ff1e9b244258645ad8dbcc66bb09411c0cfd16a02ed6a85519a0e6b7411b2185 |
ruby-whitewash_2.1.orig.tar.gz | 27.7 KiB | 577a10126b7dd2f96e9026ac5a51b1c305327e44ad3214b68dd57b75b7d54fc3 |
ruby-whitewash_2.1-2.debian.tar.xz | 3.2 KiB | 0fa4b266f54731393ec1c3be8ab94ec51a05c318255ceb235dbebb4bc07077a5 |
Available diffs
- diff from 2.1-1.1 to 2.1-2 (1.7 KiB)
No changes file available.
Binary packages built by this source
- ruby-whitewash: Whitelist-based HTML filter for Ruby
This module allows Ruby programs to clean up any HTML document or fragment
coming from an untrusted source and to remove all dangerous constructs that
could be used for cross-site scripting or request forgery.