Пакет perl-Encode-devel-4:2.88-7.module+el8.9.0+102+55fa58bf.x86_64
Имя | perl-Encode-devel |
---|---|
Эпоха | 4 |
Версия | 2.88 |
Релиз | 7.module+el8.9.0+102+55fa58bf |
Архитектура | x86_64 |
Сайт | http://search.cpan.org/dist/Encode/ |
Лицензия | (GPL+ or Artistic) and UCD |
Время сборки | 2024-04-28 11:15:44 |
Хост сборки | builder-x86-07.inferitos.ru |
Краткое описание | Perl Encode Module Generator |
Репозитории | AppStream |
Полное описание | enc2xs builds a Perl extension for use by Encode from either Unicode Character Mapping files (.ucm) or Tcl Encoding Files (.enc). You can use enc2xs to add your own encoding to perl. No knowledge of XS is necessary. |
Эррата | — |
Размер | 38 КиБ |
Исходный проект | perl-Encode-2.88-7.module+el8.9.0+102+55fa58bf |
Контрольная сумма SHA-256 | 854c8b8b0f92d978cef0ef42c00ece2bc9e197b1f80f89c71150e41b9c18698a |
Module | perl-5.24-8090020240428061407.ee766497 |
×
* Sun Dec 10 2023 MSVSphere Packaging Team <packager@msvsphere-os.ru> - 4:2.88-7 - Rebuilt for MSVSphere 8.8 * Fri Mar 29 2019 Jitka Plesnikova <jplesnik@redhat.com> - 4:2.88-7 - Rebuild with enable hardening (bug #1636329) * Sat Feb 11 2017 Fedora Release Engineering <releng@fedoraproject.org> - 4:2.88-6 - Rebuilt for https://fedoraproject.org/wiki/Fedora_26_Mass_Rebuild * Wed Nov 30 2016 Petr Pisar <ppisar@redhat.com> - 4:2.88-5 - 2.88 bump * Mon Oct 31 2016 Petr Pisar <ppisar@redhat.com> - 4:2.87-4 - 2.87 bump * Fri Sep 30 2016 Petr Pisar <ppisar@redhat.com> - 4:2.86-3 - Fix Encode::encode_utf8(undef) to return undef (CPAN RT#116904) - Refuse non-shortests UTF-8 representations in strict mode - Fix panic when encoding undefined scalars * Fri Sep 16 2016 Petr Pisar <ppisar@redhat.com> - 4:2.86-2 - Add Artistic 2.0 into license tag because of encguess tool * Thu Aug 11 2016 Jitka Plesnikova <jplesnik@redhat.com> - 4:2.86-1 - 2.86 bump * Tue Aug 09 2016 Jitka Plesnikova <jplesnik@redhat.com> - 4:2.85-1 - 2.85 bump * Tue Aug 02 2016 Jitka Plesnikova <jplesnik@redhat.com> - 4:2.84-11 - Avoid loading optional modules from default . (CVE-2016-1238)