[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#691795: marked as done (unblock: libconfig-model-openssh-perl/1.225-1)



Your message dated Tue, 30 Oct 2012 21:47:53 +0000
with message-id <1351633673.16094.20.camel@jacala.jungle.funky-badger.org>
and subject line Re: Bug#691795: unblock: libconfig-model-openssh-perl/1.225-1
has caused the Debian Bug report #691795,
regarding unblock: libconfig-model-openssh-perl/1.225-1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
691795: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691795
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian.org@packages.debian.org
Usertags: unblock

Please unblock package libconfig-model-openssh-perl

This new version was released by upstream (aka me) to:
- fix obsolete document (pod doc)
- update parameter description in configuration models to remove UTF-8
  character (not needed in English text)
- fix the demos provided with the packages. 
- remove unnessary README and TODO files

Even though the diff is quite big, no functional part of the package
were changed.

I believe this package should go to wheezy as the doc and demo no
longer confuse the user by promoting an obsolete command
(config-edit).

All the best

unblock libconfig-model-openssh-perl/1.225-1

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (990, 'unstable'), (500, 'testing'), (500, 'stable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.2.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
diff -Nru libconfig-model-openssh-perl-1.224/ChangeLog libconfig-model-openssh-perl-1.225/ChangeLog
--- libconfig-model-openssh-perl-1.224/ChangeLog	2012-05-22 13:25:29.000000000 +0200
+++ libconfig-model-openssh-perl-1.225/ChangeLog	2012-10-28 11:03:40.000000000 +0100
@@ -1,3 +1,10 @@
+2012-10-28  Dominique Dumont <domi.dumont@free.fr> v 1.225
+
+    Doc and demo fix release
+    * updated demos to use cme instead of deprecated config-edit
+    * likewise, clean up pod doc to use cme command
+    * removed non utf-8 char from ssh doc (Fix RT 79077)
+
 2012-05-22  Dominique Dumont <domi.dumont@free.fr> v 1.224
 
     * Backend: make sure that AuthorizedKeysFile items are
diff -Nru libconfig-model-openssh-perl-1.224/debian/changelog libconfig-model-openssh-perl-1.225/debian/changelog
--- libconfig-model-openssh-perl-1.224/debian/changelog	2012-10-29 19:57:04.000000000 +0100
+++ libconfig-model-openssh-perl-1.225/debian/changelog	2012-10-29 19:58:08.000000000 +0100
@@ -1,3 +1,13 @@
+libconfig-model-openssh-perl (1.225-1) unstable; urgency=low
+
+  * New upstream version (Doc and demo fix release)
+    * updated demos to use cme instead of deprecated config-edit
+    * likewise, clean up pod doc to use cme command
+    * removed non utf-8 char from ssh doc (Fix RT 79077)
+  * removed README and TODO: no new information compared to man pages
+
+ -- Dominique Dumont <dod@debian.org>  Mon, 29 Oct 2012 13:47:07 +0100
+
 libconfig-model-openssh-perl (1.224-1) unstable; urgency=low
 
   * new upstream release
diff -Nru libconfig-model-openssh-perl-1.224/debian/libconfig-model-openssh-perl.docs libconfig-model-openssh-perl-1.225/debian/libconfig-model-openssh-perl.docs
--- libconfig-model-openssh-perl-1.224/debian/libconfig-model-openssh-perl.docs	2012-10-29 19:57:04.000000000 +0100
+++ libconfig-model-openssh-perl-1.225/debian/libconfig-model-openssh-perl.docs	1970-01-01 01:00:00.000000000 +0100
@@ -1,2 +0,0 @@
-TODO
-README
diff -Nru libconfig-model-openssh-perl-1.224/demo/maintainer-demo.pl libconfig-model-openssh-perl-1.225/demo/maintainer-demo.pl
--- libconfig-model-openssh-perl-1.224/demo/maintainer-demo.pl	2012-05-22 13:25:29.000000000 +0200
+++ libconfig-model-openssh-perl-1.225/demo/maintainer-demo.pl	2012-10-28 11:03:40.000000000 +0100
@@ -86,7 +86,7 @@
     }
 }
 
-my $showpostinst = "perl -I../lib -S config-edit -model Sshd -ui none -save" ;
+my $showpostinst = "perl -I../lib -S cme migrate sshd" ;
 my $postinst = $showpostinst . " -model_dir lib/Config/Model/models "
 	 . "-root_dir .  ";
 
diff -Nru libconfig-model-openssh-perl-1.224/demo/user-demo.pl libconfig-model-openssh-perl-1.225/demo/user-demo.pl
--- libconfig-model-openssh-perl-1.224/demo/user-demo.pl	2012-05-22 13:25:29.000000000 +0200
+++ libconfig-model-openssh-perl-1.225/demo/user-demo.pl	2012-10-28 11:03:40.000000000 +0100
@@ -88,11 +88,11 @@
     }
 }
 
-my $postinst = "perl -I../lib -S config-edit -model Sshd -model_dir lib/Config/Model/models "
-	 . "-root_dir . -ui none  -save";
+my $postinst = "perl -I../lib -S cme migrate sshd -model-dir lib/Config/Model/models "
+	 . "-root-dir . ";
 
 print "Upstream changelog: KeepAlive is changed to TCPKeepAlive\n";
-print "User file is updated by package posinst...\n";
+print "User file is updated by package postinst...\n";
 my_system($postinst) ;
 
 print "Changing model to reflect maintainer's work. Please wait ..." ;
@@ -116,25 +116,22 @@
 my_system($postinst) ;
 
 print "Even command line is safe for users: try to modify IgnoreRhosts with bad value\n";
-print "Run: 'config-edit-sshd -ui none IgnoreRhosts=oui'\n";
-my_system("perl -I../lib -S config-edit -model Sshd -model_dir lib/Config/Model/models ".
- 	 "-root_dir . -ui none  IgnoreRhosts=oui") ;
+my_system("perl -I../lib -S cme modify sshd -model_dir lib/Config/Model/models ".
+ 	 "-root_dir . IgnoreRhosts=oui", 'cme modify sshd IgnoreRhosts=oui') ;
 
 my $fuse_dir = 'my_fuse' ;
 say "If you prefer to use a virtual file system (script ?)" ;
-say "Run: 'config-edit-sshd -ui fuse -fuse_dir $fuse_dir'";
 mkdir ($fuse_dir,0755) unless -d $fuse_dir ;
-my_system("perl -I../lib -S config-edit -model Sshd -model_dir lib/Config/Model/models ".
-    "-root_dir .  -ui fuse -fuse_dir $fuse_dir"
+my_system("perl -I../lib -S cme fusefs sshd -model_dir lib/Config/Model/models ".
+    "-root_dir .  -fuse_dir $fuse_dir", "cme fusefs sshd -fuse_dir $fuse_dir"
 ) ;
 my_system("ls --classify $fuse_dir",1);
 my_system(qq!echo "/etc/my_banner.txt" > $fuse_dir/Banner!,1) ; 
 my_system("fusermount -u $fuse_dir",1);	 
 	 
 print "Beginners will probably prefer a GUI\n";
-print "Run: config-edit-sshd\n";
-my_system("perl -I../lib -S config-edit -model Sshd -model_dir lib/Config/Model/models ".
-	 "-root_dir .  ") ;
+my_system("perl -I../lib -S cme edit sshd -model_dir lib/Config/Model/models ".
+	 "-root_dir .  ", 'cme edit sshd') ;
 
 END {
     system("fusermount -u $fuse_dir");
diff -Nru libconfig-model-openssh-perl-1.224/lib/Config/Model/Backend/OpenSsh/Sshd.pm libconfig-model-openssh-perl-1.225/lib/Config/Model/Backend/OpenSsh/Sshd.pm
--- libconfig-model-openssh-perl-1.224/lib/Config/Model/Backend/OpenSsh/Sshd.pm	2012-05-22 13:25:29.000000000 +0200
+++ libconfig-model-openssh-perl-1.225/lib/Config/Model/Backend/OpenSsh/Sshd.pm	2012-10-28 11:03:40.000000000 +0100
@@ -9,7 +9,7 @@
 #
 package Config::Model::Backend::OpenSsh::Sshd ;
 {
-  $Config::Model::Backend::OpenSsh::Sshd::VERSION = '1.224';
+  $Config::Model::Backend::OpenSsh::Sshd::VERSION = '1.225';
 }
 
 use Any::Moose ;
@@ -249,69 +249,16 @@
 
 =head1 SYNOPSIS
 
-=head2 invoke editor
-
-The following will launch a graphical editor (if L<Config::Model::TkUI>
-is installed):
-
- config-edit -application sshd
-
-=head2 command line
-
-This command will add a C<Match> section in C<~/.ssh/config>: 
-
- config-edit -application sshd -ui none \
- "Match:0 Condition User=foo - Settings ForwardX11=yes"
- 
-=head2 programmatic
-
-This code snippet will remove the C<Host Foo> section added above:
-
- use Config::Model ;
- use Log::Log4perl qw(:easy) ;
- my $model = Config::Model -> new ( ) ;
- my $inst = $model->instance (root_class_name => 'sshd');
- $inst -> config_root ->load("Match:0 Condition User=foo - Settings ForwardX11=yes") ;
- $inst->write_back() ;
+None
 
 =head1 DESCRIPTION
 
 This calls provides a backend to read and write sshd client configuration files.
 
-Once this module is installed, user root can edit C</etc/ssh/sshd_config> 
-with :
-
- # config-edit -application sshd 
-
-=head1 user interfaces
-
-As mentioned in L<config-edit>, several user interfaces are available:
-
-=over
-
-=item *
-
-A graphical interface is proposed by default if L<Config::Model::TkUI> is installed.
-
-=item *
-
-A Curses interface with option C<-ui curses> if L<Config::Model::CursesUI> is installed.
-
-=item *
-
-A Shell like interface with option C<-ui term>.
-
-=item *
-
-A L<Fuse> virtual file system with option C<< -ui fuse -fuse_dir <mountpoint> >> 
-if L<Fuse> is installed (Linux only)
-
-=back
-
 =head1 STOP
 
 The documentation provides on the reader and writer of OpenSsh configuration files.
-These details are not needed for the basic usages explained above.
+These details are not needed for the basic usages explained in L<Config::Model::OpenSsh>.
 
 =head1 Methods
 
@@ -336,4 +283,4 @@
 
 =head1 SEE ALSO
 
-L<config-edit>, L<Config::Model>,
+L<cme>, L<Config::Model>,
diff -Nru libconfig-model-openssh-perl-1.224/lib/Config/Model/Backend/OpenSsh/Ssh.pm libconfig-model-openssh-perl-1.225/lib/Config/Model/Backend/OpenSsh/Ssh.pm
--- libconfig-model-openssh-perl-1.224/lib/Config/Model/Backend/OpenSsh/Ssh.pm	2012-05-22 13:25:29.000000000 +0200
+++ libconfig-model-openssh-perl-1.225/lib/Config/Model/Backend/OpenSsh/Ssh.pm	2012-10-28 11:03:40.000000000 +0100
@@ -9,7 +9,7 @@
 #
 package Config::Model::Backend::OpenSsh::Ssh ;
 {
-  $Config::Model::Backend::OpenSsh::Ssh::VERSION = '1.224';
+  $Config::Model::Backend::OpenSsh::Ssh::VERSION = '1.225';
 }
 
 use Any::Moose ;
@@ -215,72 +215,16 @@
 
 =head1 SYNOPSIS
 
-=head2 invoke editor
-
-The following will launch a graphical editor (if L<Config::Model::TkUI>
-is installed):
-
- config-edit -application ssh
-
-=head2 command line
-
-This command will add a C<Host Foo> section in C<~/.ssh/config>: 
-
- config-edit -application ssh -ui none Host:Foo ForwardX11=yes
- 
-=head2 programmatic
-
-This code snippet will remove the C<Host Foo> section added above:
-
- use Config::Model ;
- use Log::Log4perl qw(:easy) ;
- my $model = Config::Model -> new ( ) ;
- my $inst = $model->instance (root_class_name => 'Ssh');
- $inst -> config_root ->load("Host~Foo") ;
- $inst->write_back() ;
+None
 
 =head1 DESCRIPTION
 
 This calls provides a backend to read and write ssh client configuration files.
 
-Once this module is installed, user root can edit C</etc/ssh/ssh_config> 
-with :
-
- # config-edit -application ssh 
-
-To edit F<~/.ssh/config>, run as a normal user:
-
- # config-edit -application ssh
-
-=head1 user interfaces
-
-As mentioned in L<config-edit>, several user interfaces are available:
-
-=over
-
-=item *
-
-A graphical interface is proposed by default if L<Config::Model::TkUI> is installed.
-
-=item *
-
-A Curses interface with option C<-ui curses> if L<Config::Model::CursesUI> is installed.
-
-=item *
-
-A Shell like interface with option C<-ui term>.
-
-=item *
-
-A L<Fuse> virtual file system with option C<< -ui fuse -fuse_dir <mountpoint> >> 
-if L<Fuse> is installed (Linux only)
-
-=back
-
 =head1 STOP
 
 The documentation provides on the reader and writer of OpenSsh configuration files.
-These details are not needed for the basic usages explained above.
+These details are not needed for the basic usages explained in L<Config::Model::OpenSsh>.
 
 =head1 Methods
 
@@ -305,4 +249,4 @@
 
 =head1 SEE ALSO
 
-L<config-edit>, L<Config::Model>,
+L<cme>, L<Config::Model>, L<Config::Model::OpenSsh>
diff -Nru libconfig-model-openssh-perl-1.224/lib/Config/Model/Backend/OpenSsh.pm libconfig-model-openssh-perl-1.225/lib/Config/Model/Backend/OpenSsh.pm
--- libconfig-model-openssh-perl-1.224/lib/Config/Model/Backend/OpenSsh.pm	2012-05-22 13:25:29.000000000 +0200
+++ libconfig-model-openssh-perl-1.225/lib/Config/Model/Backend/OpenSsh.pm	2012-10-28 11:03:40.000000000 +0100
@@ -9,7 +9,7 @@
 #
 package Config::Model::Backend::OpenSsh ;
 {
-  $Config::Model::Backend::OpenSsh::VERSION = '1.224';
+  $Config::Model::Backend::OpenSsh::VERSION = '1.225';
 }
 
 use Any::Moose ;
@@ -229,4 +229,4 @@
 
 =head1 SEE ALSO
 
-L<config-edit>, L<Config::Model>,
+L<cme>, L<Config::Model>, L<Config::Model::OpenSsh>
diff -Nru libconfig-model-openssh-perl-1.224/lib/Config/Model/models/Ssh/HostElement.pl libconfig-model-openssh-perl-1.225/lib/Config/Model/models/Ssh/HostElement.pl
--- libconfig-model-openssh-perl-1.224/lib/Config/Model/models/Ssh/HostElement.pl	2012-05-22 13:25:29.000000000 +0200
+++ libconfig-model-openssh-perl-1.225/lib/Config/Model/models/Ssh/HostElement.pl	2012-10-28 11:03:40.000000000 +0100
@@ -38,14 +38,14 @@
         'value_type' => 'boolean',
         'upstream_default' => '0',
         'type' => 'leaf',
-        'description' => "If set to \x{201c}yes\x{201d}, passphrase/password querying will be disabled. In addition, the ServerAliveInterval option will be set to 300 seconds by default. This option is useful in scripts and other batch jobs where no user is present to supply the password, and where it is desirable to detect a broken network swiftly. "
+        'description' => "If set to 'yes', passphrase/password querying will be disabled. In addition, the ServerAliveInterval option will be set to 300 seconds by default. This option is useful in scripts and other batch jobs where no user is present to supply the password, and where it is desirable to detect a broken network swiftly. "
       },
       'BindAddress',
       {
         'value_type' => 'uniline',
         'experience' => 'advanced',
         'type' => 'leaf',
-        'description' => "Use the specified address on the local machine as the source address of the connection. Only useful on systems with more than one address. Note that this option does not work if UsePrivilegedPort is set to \x{201c}yes\x{201d}."
+        'description' => "Use the specified address on the local machine as the source address of the connection. Only useful on systems with more than one address. Note that this option does not work if UsePrivilegedPort is set to 'yes'."
       },
       'ChallengeResponseAuthentication',
       {
@@ -168,14 +168,14 @@
         'upstream_default' => 'no',
         'experience' => 'master',
         'type' => 'leaf',
-        'description' => 'Enables the sharing of multiple sessions over a single network connection. When set to ``yes\'\', ssh(1) will listen for connections on a control socket specified using the ControlPath argument. Additional sessions can connect to this socket using the same ControlPath with ControlMaster set to ``no\'\' (the default). These sessions will try to reuse the master instance\'s network connection rather than initiating new ones, but will fall back to connecting normally if the control socket does not exist, or is not listening.
+        'description' => 'Enables the sharing of multiple sessions over a single network connection. When set to \'yes\', ssh(1) will listen for connections on a control socket specified using the ControlPath argument. Additional sessions can connect to this socket using the same ControlPath with ControlMaster set to \'no\' (the default). These sessions will try to reuse the master instance\'s network connection rather than initiating new ones, but will fall back to connecting normally if the control socket does not exist, or is not listening.
 
-Setting this to ``ask\'\' will cause ssh to listen for control connections, but require confirmation using the SSH_ASKPASS program before they are accepted (see ssh-add(1) for details). If the ControlPath cannot be opened, ssh will continue without connecting to a master instance.
+Setting this to \'ask\' will cause ssh to listen for control connections, but require confirmation using the SSH_ASKPASS program before they are accepted (see ssh-add(1) for details). If the ControlPath cannot be opened, ssh will continue without connecting to a master instance.
 
 X11 and ssh-agent(1) forwarding is supported over these multiplexed connections, however the display and agent forwarded will be the one belonging to the master connection i.e. it is not pos sible to forward multiple displays or agents.
 
 Two additional options allow for opportunistic multiplexing: try to use a master connection but fall back to creating a new one if
- one does not already exist. These options are: ``auto\'\' and ``autoask\'\'. The latter requires confirmation like the ``ask\'\' option.
+ one does not already exist. These options are: \'auto\' and \'autoask\'. The latter requires confirmation like the \'ask\' option.
 ',
         'choice' => [
           'no',
@@ -190,7 +190,7 @@
         'value_type' => 'uniline',
         'experience' => 'master',
         'type' => 'leaf',
-        'description' => 'Specify the path to the control socket used for connection sharing as described in the ControlMaster section above or the string ``none\'\' to disable connection sharing.  In the path, `%l\' will be substituted by the local host name, `%h\' will be substituted by the target host name, `%p\' the port, and `%r\' by the remotelogin username. It is recommended that any ControlPath used for opportunistic connection sharing include at least %h, %p, and %r. This ensures that shared connections are uniquely identified.
+        'description' => 'Specify the path to the control socket used for connection sharing as described in the ControlMaster section above or the string \'none\' to disable connection sharing.  In the path, \'%l\' will be substituted by the local host name, \'%h\' will be substituted by the target host name, \'%p\' the port, and \'%r\' by the remotelogin username. It is recommended that any ControlPath used for opportunistic connection sharing include at least %h, %p, and %r. This ensures that shared connections are uniquely identified.
 '
       },
       'DynamicForward',
@@ -203,7 +203,7 @@
         'type' => 'list',
         'description' => 'Specifies that a TCP port on the local machine be forwarded over the secure channel, and the application protocol is then used to determine where to connect to from the remote machine.
 
-The argument must be [bind_address:]port. IPv6 addresses can be specified by enclosing addresses in square brackets or by using an alternative syntax: [bind_address/]port. By default, the local port is bound in accordance with the GatewayPorts setting. However, an explicit bind_address may be used to bind the connection to a specific address. The bind_address of ``localhost\'\' indicates that the listening port be bound for local use only, while an empty address or `*\' indicates that the port should be available from all interfaces.
+The argument must be [bind_address:]port. IPv6 addresses can be specified by enclosing addresses in square brackets or by using an alternative syntax: [bind_address/]port. By default, the local port is bound in accordance with the GatewayPorts setting. However, an explicit bind_address may be used to bind the connection to a specific address. The bind_address of \'localhost\' indicates that the listening port be bound for local use only, while an empty address or \'*\' indicates that the port should be available from all interfaces.
 
 Currently the SOCKS4 and SOCKS5 protocols are supported, and ssh(1) will act as a SOCKS server. Multiple forwardings may be specified, and additional forwardings can be given on the command line. Only the superuser can forward privileged ports.
 '
@@ -213,7 +213,7 @@
         'value_type' => 'uniline',
         'upstream_default' => '~',
         'type' => 'leaf',
-        'description' => 'Sets the escape character (default: `~\'). The escape character can also be set on the command line.  The argument should be a single character, `^\' followed by a letter, or ``none\'\' to disable the escape character entirely (making the connection transparent for binary data).
+        'description' => 'Sets the escape character (default: \'~\'). The escape character can also be set on the command line.  The argument should be a single character, \'^\' followed by a letter, or \'none\' to disable the escape character entirely (making the connection transparent for binary data).
 '
       },
       'ExitOnForwardFailure',
@@ -346,7 +346,7 @@
         'type' => 'list',
         'description' => 'Specifies a file from which the user\'s RSA or DSA authentication identity is read. The default is ~/.ssh/identity for protocol version 1, and ~/.ssh/id_rsa and ~/.ssh/id_dsa for protocol version 2. Additionally, any identities represented by the authentication agent will be used for authentication.
 
-The file name may use the tilde syntax to refer to a user\'s home directory or one of the following escape characters: `%d\' (local user\'s home directory), `%u\' (local user name), `%l\' (local host  name), `%h\' (remote host name) or `%r\' (remote user name).
+The file name may use the tilde syntax to refer to a user\'s home directory or one of the following escape characters: \'%d\' (local user\'s home directory), \'%u\' (local user name), \'%l\' (local host  name), \'%h\' (remote host name) or \'%r\' (remote user name).
 
 It is possible to have multiple identity files specified in con figuration files; all these identities will be tried in sequence.
 '
@@ -367,7 +367,7 @@
         },
         'experience' => 'master',
         'type' => 'list',
-        'description' => 'Specifies the list of methods to use in keyboard-interactive authentication.  Multiple method names must be comma-separated. The default is to use the server specified list. The methods available vary depending on what the server supports. For an OpenSSH server, it may be zero or more of: ``bsdauth\'\', ``pam\'\', and ``skey\'\'.'
+        'description' => 'Specifies the list of methods to use in keyboard-interactive authentication.  Multiple method names must be comma-separated. The default is to use the server specified list. The methods available vary depending on what the server supports. For an OpenSSH server, it may be zero or more of: \'bsdauth\', \'pam\', and \'skey\'.'
       },
       'GatewayPorts',
       {
diff -Nru libconfig-model-openssh-perl-1.224/lib/Config/Model/models/Ssh/HostElement.pod libconfig-model-openssh-perl-1.225/lib/Config/Model/models/Ssh/HostElement.pod
--- libconfig-model-openssh-perl-1.224/lib/Config/Model/models/Ssh/HostElement.pod	2012-05-22 13:25:29.000000000 +0200
+++ libconfig-model-openssh-perl-1.225/lib/Config/Model/models/Ssh/HostElement.pod	2012-10-28 11:03:40.000000000 +0100
@@ -17,11 +17,11 @@
 
 =head2 BatchMode
 
-If set to “yes”, passphrase/password querying will be disabled. In addition, the ServerAliveInterval option will be set to 300 seconds by default. This option is useful in scripts and other batch jobs where no user is present to supply the password, and where it is desirable to detect a broken network swiftly. I<< Optional. Type boolean. upstream_default: '0'.  >>
+If set to 'yes', passphrase/password querying will be disabled. In addition, the ServerAliveInterval option will be set to 300 seconds by default. This option is useful in scripts and other batch jobs where no user is present to supply the password, and where it is desirable to detect a broken network swiftly. I<< Optional. Type boolean. upstream_default: '0'.  >>
 
 =head2 BindAddress
 
-Use the specified address on the local machine as the source address of the connection. Only useful on systems with more than one address. Note that this option does not work if UsePrivilegedPort is set to “yes”.I<< Optional. Type uniline.  >>
+Use the specified address on the local machine as the source address of the connection. Only useful on systems with more than one address. Note that this option does not work if UsePrivilegedPort is set to 'yes'.I<< Optional. Type uniline.  >>
 
 =head2 ChallengeResponseAuthentication
 
@@ -62,33 +62,33 @@
 
 =head2 ControlMaster
 
-Enables the sharing of multiple sessions over a single network connection. When set to ``yes'', ssh(1) will listen for connections on a control socket specified using the ControlPath argument. Additional sessions can connect to this socket using the same ControlPath with ControlMaster set to ``no'' (the default). These sessions will try to reuse the master instance's network connection rather than initiating new ones, but will fall back to connecting normally if the control socket does not exist, or is not listening.
+Enables the sharing of multiple sessions over a single network connection. When set to 'yes', ssh(1) will listen for connections on a control socket specified using the ControlPath argument. Additional sessions can connect to this socket using the same ControlPath with ControlMaster set to 'no' (the default). These sessions will try to reuse the master instance's network connection rather than initiating new ones, but will fall back to connecting normally if the control socket does not exist, or is not listening.
 
-Setting this to ``ask'' will cause ssh to listen for control connections, but require confirmation using the SSH_ASKPASS program before they are accepted (see ssh-add(1) for details). If the ControlPath cannot be opened, ssh will continue without connecting to a master instance.
+Setting this to 'ask' will cause ssh to listen for control connections, but require confirmation using the SSH_ASKPASS program before they are accepted (see ssh-add(1) for details). If the ControlPath cannot be opened, ssh will continue without connecting to a master instance.
 
 X11 and ssh-agent(1) forwarding is supported over these multiplexed connections, however the display and agent forwarded will be the one belonging to the master connection i.e. it is not pos sible to forward multiple displays or agents.
 
 Two additional options allow for opportunistic multiplexing: try to use a master connection but fall back to creating a new one if
- one does not already exist. These options are: ``auto'' and ``autoask''. The latter requires confirmation like the ``ask'' option.
+ one does not already exist. These options are: 'auto' and 'autoask'. The latter requires confirmation like the 'ask' option.
 I<< Optional. Type enum. choice: 'no', 'yes', 'ask', 'auto', 'autoask'. upstream_default: 'no'.  >>
 
 =head2 ControlPath
 
-Specify the path to the control socket used for connection sharing as described in the ControlMaster section above or the string ``none'' to disable connection sharing.  In the path, `%l' will be substituted by the local host name, `%h' will be substituted by the target host name, `%p' the port, and `%r' by the remotelogin username. It is recommended that any ControlPath used for opportunistic connection sharing include at least %h, %p, and %r. This ensures that shared connections are uniquely identified.
+Specify the path to the control socket used for connection sharing as described in the ControlMaster section above or the string 'none' to disable connection sharing.  In the path, '%l' will be substituted by the local host name, '%h' will be substituted by the target host name, '%p' the port, and '%r' by the remotelogin username. It is recommended that any ControlPath used for opportunistic connection sharing include at least %h, %p, and %r. This ensures that shared connections are uniquely identified.
 I<< Optional. Type uniline.  >>
 
 =head2 DynamicForward
 
 Specifies that a TCP port on the local machine be forwarded over the secure channel, and the application protocol is then used to determine where to connect to from the remote machine.
 
-The argument must be [bind_address:]port. IPv6 addresses can be specified by enclosing addresses in square brackets or by using an alternative syntax: [bind_address/]port. By default, the local port is bound in accordance with the GatewayPorts setting. However, an explicit bind_address may be used to bind the connection to a specific address. The bind_address of ``localhost'' indicates that the listening port be bound for local use only, while an empty address or `*' indicates that the port should be available from all interfaces.
+The argument must be [bind_address:]port. IPv6 addresses can be specified by enclosing addresses in square brackets or by using an alternative syntax: [bind_address/]port. By default, the local port is bound in accordance with the GatewayPorts setting. However, an explicit bind_address may be used to bind the connection to a specific address. The bind_address of 'localhost' indicates that the listening port be bound for local use only, while an empty address or '*' indicates that the port should be available from all interfaces.
 
 Currently the SOCKS4 and SOCKS5 protocols are supported, and ssh(1) will act as a SOCKS server. Multiple forwardings may be specified, and additional forwardings can be given on the command line. Only the superuser can forward privileged ports.
 I<< Optional. Type list of uniline.  >>
 
 =head2 EscapeChar
 
-Sets the escape character (default: `~'). The escape character can also be set on the command line.  The argument should be a single character, `^' followed by a letter, or ``none'' to disable the escape character entirely (making the connection transparent for binary data).
+Sets the escape character (default: '~'). The escape character can also be set on the command line.  The argument should be a single character, '^' followed by a letter, or 'none' to disable the escape character entirely (making the connection transparent for binary data).
 I<< Optional. Type uniline. upstream_default: '~'.  >>
 
 =head2 ExitOnForwardFailure
@@ -161,7 +161,7 @@
 
 Specifies a file from which the user's RSA or DSA authentication identity is read. The default is ~/.ssh/identity for protocol version 1, and ~/.ssh/id_rsa and ~/.ssh/id_dsa for protocol version 2. Additionally, any identities represented by the authentication agent will be used for authentication.
 
-The file name may use the tilde syntax to refer to a user's home directory or one of the following escape characters: `%d' (local user's home directory), `%u' (local user name), `%l' (local host  name), `%h' (remote host name) or `%r' (remote user name).
+The file name may use the tilde syntax to refer to a user's home directory or one of the following escape characters: '%d' (local user's home directory), '%u' (local user name), '%l' (local host  name), '%h' (remote host name) or '%r' (remote user name).
 
 It is possible to have multiple identity files specified in con figuration files; all these identities will be tried in sequence.
 I<< Optional. Type list of uniline.  >>
@@ -173,7 +173,7 @@
 
 =head2 KbdInteractiveDevices
 
-Specifies the list of methods to use in keyboard-interactive authentication.  Multiple method names must be comma-separated. The default is to use the server specified list. The methods available vary depending on what the server supports. For an OpenSSH server, it may be zero or more of: ``bsdauth'', ``pam'', and ``skey''.I<< Optional. Type list of uniline.  >>
+Specifies the list of methods to use in keyboard-interactive authentication.  Multiple method names must be comma-separated. The default is to use the server specified list. The methods available vary depending on what the server supports. For an OpenSSH server, it may be zero or more of: 'bsdauth', 'pam', and 'skey'.I<< Optional. Type list of uniline.  >>
 
 =head2 GatewayPorts
 
diff -Nru libconfig-model-openssh-perl-1.224/lib/Config/Model/models/Ssh/PortForward.pl libconfig-model-openssh-perl-1.225/lib/Config/Model/models/Ssh/PortForward.pl
--- libconfig-model-openssh-perl-1.224/lib/Config/Model/models/Ssh/PortForward.pl	2012-05-22 13:25:29.000000000 +0200
+++ libconfig-model-openssh-perl-1.225/lib/Config/Model/models/Ssh/PortForward.pl	2012-10-28 11:03:40.000000000 +0100
@@ -35,7 +35,7 @@
 
 By default, the local port is bound in accordance with the GatewayPorts setting. However, an explicit bind_address may be used to bind the connection to a specific address.
 
-The bind_address of \x{201c}localhost\x{201d} indicates that the listening port be bound for local use only, while an empty address or \x{2018}*\x{2019} indicates that the port should be available from all interfaces."
+The bind_address of 'localhost' indicates that the listening port be bound for local use only, while an empty address or '*' indicates that the port should be available from all interfaces."
       },
       'port',
       {
diff -Nru libconfig-model-openssh-perl-1.224/lib/Config/Model/models/Ssh/PortForward.pod libconfig-model-openssh-perl-1.225/lib/Config/Model/models/Ssh/PortForward.pod
--- libconfig-model-openssh-perl-1.224/lib/Config/Model/models/Ssh/PortForward.pod	2012-05-22 13:25:29.000000000 +0200
+++ libconfig-model-openssh-perl-1.225/lib/Config/Model/models/Ssh/PortForward.pod	2012-10-28 11:03:40.000000000 +0100
@@ -21,7 +21,7 @@
 
 By default, the local port is bound in accordance with the GatewayPorts setting. However, an explicit bind_address may be used to bind the connection to a specific address.
 
-The bind_address of “localhost” indicates that the listening port be bound for local use only, while an empty address or ‘*’ indicates that the port should be available from all interfaces.I<< Optional. Type uniline.  >>
+The bind_address of 'localhost' indicates that the listening port be bound for local use only, while an empty address or '*' indicates that the port should be available from all interfaces.I<< Optional. Type uniline.  >>
 
 =head2 port
 
diff -Nru libconfig-model-openssh-perl-1.224/lib/Config/Model/models/Sshd.pod libconfig-model-openssh-perl-1.225/lib/Config/Model/models/Sshd.pod
--- libconfig-model-openssh-perl-1.224/lib/Config/Model/models/Sshd.pod	2012-05-22 13:25:29.000000000 +0200
+++ libconfig-model-openssh-perl-1.225/lib/Config/Model/models/Sshd.pod	2012-10-28 11:03:40.000000000 +0100
@@ -34,12 +34,14 @@
 
 =head2 AuthorizedKeysFile2
 
-Specifies the file that contains the public keys that can be used for user authentication. AuthorizedKeysFile may contain tokens of the form %T which are substituted during connection setup.I<< Optional. Type list of uniline.  >>
+Specifies the file that contains the public keys that can be used for user authentication. AuthorizedKeysFile may contain tokens of the form %T which are substituted during connection setup.B<Deprecated> I<< Optional. Type list of uniline.  >>
 
 =head2 AuthorizedKeysFile
 
 Specifies the file that contains the public keys that can be used for user authentication. AuthorizedKeysFile may contain tokens of the form %T which are substituted during connection setup.I<< Optional. Type list of uniline.  >>
 
+Note: AuthorizedKeysFile values are migrated from '- AuthorizedKeysFile2'
+
 =head2 Banner
 
 In some jurisdictions, sending a warning message before authentication may be relevant for getting legal protection. The contents of the specified file are sent to the remote user before authentication is allowed. This option is only available for protocol version 2. By default, no banner is displayed.I<< Optional. Type uniline.  >>
@@ -371,7 +373,7 @@
 
 =head2 KeepAlive
 
-I<< Optional. Type enum. choice: 'no', 'yes'.  >>
+B<Deprecated> I<< Optional. Type enum. choice: 'no', 'yes'.  >>
 
 =head2 TCPKeepAlive
 
@@ -393,6 +395,8 @@
 
 
 
+Note: TCPKeepAlive is migrated with 'C<$keep_alive>' and with $keep_alive => "C<- KeepAlive>"
+
 =head2 UseDNS
 
 Specifies whether sshd(8) should look up the remote host name and check that the resolved host name for the remote IP address maps back to the very same IP address. The default is "yes"I<< Optional. Type enum. choice: 'no', 'yes'. upstream_default: 'yes'.  >>
diff -Nru libconfig-model-openssh-perl-1.224/lib/Config/Model/models/Ssh.pl libconfig-model-openssh-perl-1.225/lib/Config/Model/models/Ssh.pl
--- libconfig-model-openssh-perl-1.224/lib/Config/Model/models/Ssh.pl	2012-05-22 13:25:29.000000000 +0200
+++ libconfig-model-openssh-perl-1.225/lib/Config/Model/models/Ssh.pl	2012-10-28 11:03:40.000000000 +0100
@@ -31,7 +31,7 @@
         'value_type' => 'boolean',
         'upstream_default' => '0',
         'type' => 'leaf',
-        'description' => 'Setting this option to ``yes\'\' in the global client configuration file /etc/ssh/ssh_config enables the use of the helper program ssh-keysign(8) during HostbasedAuthentication.  See ssh-keysign(8)for more information.
+        'description' => 'Setting this option to \'yes\' in the global client configuration file /etc/ssh/ssh_config enables the use of the helper program ssh-keysign(8) during HostbasedAuthentication.  See ssh-keysign(8)for more information.
 '
       },
       'Host',
@@ -43,7 +43,7 @@
         },
         'ordered' => '1',
         'type' => 'hash',
-        'description' => "The declarations make in 'parameters' are applied only to the hosts that match one of the patterns given in pattern elements. A single \x{2018}*\x{2019} as a pattern can be used to provide global defaults for all hosts. The host is the hostname argument given on the command line (i.e. the name is not converted to a canonicalized host name before matching). Since the first obtained value for each parameter is used, more host-specific declarations should be given near the beginning of the hash (which takes order into account), and general defaults at the end.",
+        'description' => "The declarations make in 'parameters' are applied only to the hosts that match one of the patterns given in pattern elements. A single '*' as a pattern can be used to provide global defaults for all hosts. The host is the hostname argument given on the command line (i.e. the name is not converted to a canonicalized host name before matching). Since the first obtained value for each parameter is used, more host-specific declarations should be given near the beginning of the hash (which takes order into account), and general defaults at the end.",
         'index_type' => 'string'
       }
     ],
diff -Nru libconfig-model-openssh-perl-1.224/lib/Config/Model/models/Ssh.pod libconfig-model-openssh-perl-1.225/lib/Config/Model/models/Ssh.pod
--- libconfig-model-openssh-perl-1.224/lib/Config/Model/models/Ssh.pod	2012-05-22 13:25:29.000000000 +0200
+++ libconfig-model-openssh-perl-1.225/lib/Config/Model/models/Ssh.pod	2012-10-28 11:03:40.000000000 +0100
@@ -15,12 +15,12 @@
 
 =head2 EnableSSHKeysign
 
-Setting this option to ``yes'' in the global client configuration file /etc/ssh/ssh_config enables the use of the helper program ssh-keysign(8) during HostbasedAuthentication.  See ssh-keysign(8)for more information.
+Setting this option to 'yes' in the global client configuration file /etc/ssh/ssh_config enables the use of the helper program ssh-keysign(8) during HostbasedAuthentication.  See ssh-keysign(8)for more information.
 I<< Optional. Type boolean. upstream_default: '0'.  >>
 
 =head2 Host
 
-The declarations make in 'parameters' are applied only to the hosts that match one of the patterns given in pattern elements. A single ‘*’ as a pattern can be used to provide global defaults for all hosts. The host is the hostname argument given on the command line (i.e. the name is not converted to a canonicalized host name before matching). Since the first obtained value for each parameter is used, more host-specific declarations should be given near the beginning of the hash (which takes order into account), and general defaults at the end.I<< Optional. Type hash of node.  >>
+The declarations make in 'parameters' are applied only to the hosts that match one of the patterns given in pattern elements. A single '*' as a pattern can be used to provide global defaults for all hosts. The host is the hostname argument given on the command line (i.e. the name is not converted to a canonicalized host name before matching). Since the first obtained value for each parameter is used, more host-specific declarations should be given near the beginning of the hash (which takes order into account), and general defaults at the end.I<< Optional. Type hash of node.  >>
 
 =head2 AddressFamily
 
@@ -28,11 +28,11 @@
 
 =head2 BatchMode
 
-If set to “yes”, passphrase/password querying will be disabled. In addition, the ServerAliveInterval option will be set to 300 seconds by default. This option is useful in scripts and other batch jobs where no user is present to supply the password, and where it is desirable to detect a broken network swiftly. I<< Optional. Type boolean. upstream_default: '0'.  >>
+If set to 'yes', passphrase/password querying will be disabled. In addition, the ServerAliveInterval option will be set to 300 seconds by default. This option is useful in scripts and other batch jobs where no user is present to supply the password, and where it is desirable to detect a broken network swiftly. I<< Optional. Type boolean. upstream_default: '0'.  >>
 
 =head2 BindAddress
 
-Use the specified address on the local machine as the source address of the connection. Only useful on systems with more than one address. Note that this option does not work if UsePrivilegedPort is set to “yes”.I<< Optional. Type uniline.  >>
+Use the specified address on the local machine as the source address of the connection. Only useful on systems with more than one address. Note that this option does not work if UsePrivilegedPort is set to 'yes'.I<< Optional. Type uniline.  >>
 
 =head2 ChallengeResponseAuthentication
 
@@ -73,33 +73,33 @@
 
 =head2 ControlMaster
 
-Enables the sharing of multiple sessions over a single network connection. When set to ``yes'', ssh(1) will listen for connections on a control socket specified using the ControlPath argument. Additional sessions can connect to this socket using the same ControlPath with ControlMaster set to ``no'' (the default). These sessions will try to reuse the master instance's network connection rather than initiating new ones, but will fall back to connecting normally if the control socket does not exist, or is not listening.
+Enables the sharing of multiple sessions over a single network connection. When set to 'yes', ssh(1) will listen for connections on a control socket specified using the ControlPath argument. Additional sessions can connect to this socket using the same ControlPath with ControlMaster set to 'no' (the default). These sessions will try to reuse the master instance's network connection rather than initiating new ones, but will fall back to connecting normally if the control socket does not exist, or is not listening.
 
-Setting this to ``ask'' will cause ssh to listen for control connections, but require confirmation using the SSH_ASKPASS program before they are accepted (see ssh-add(1) for details). If the ControlPath cannot be opened, ssh will continue without connecting to a master instance.
+Setting this to 'ask' will cause ssh to listen for control connections, but require confirmation using the SSH_ASKPASS program before they are accepted (see ssh-add(1) for details). If the ControlPath cannot be opened, ssh will continue without connecting to a master instance.
 
 X11 and ssh-agent(1) forwarding is supported over these multiplexed connections, however the display and agent forwarded will be the one belonging to the master connection i.e. it is not pos sible to forward multiple displays or agents.
 
 Two additional options allow for opportunistic multiplexing: try to use a master connection but fall back to creating a new one if
- one does not already exist. These options are: ``auto'' and ``autoask''. The latter requires confirmation like the ``ask'' option.
+ one does not already exist. These options are: 'auto' and 'autoask'. The latter requires confirmation like the 'ask' option.
 I<< Optional. Type enum. choice: 'no', 'yes', 'ask', 'auto', 'autoask'. upstream_default: 'no'.  >>
 
 =head2 ControlPath
 
-Specify the path to the control socket used for connection sharing as described in the ControlMaster section above or the string ``none'' to disable connection sharing.  In the path, `%l' will be substituted by the local host name, `%h' will be substituted by the target host name, `%p' the port, and `%r' by the remotelogin username. It is recommended that any ControlPath used for opportunistic connection sharing include at least %h, %p, and %r. This ensures that shared connections are uniquely identified.
+Specify the path to the control socket used for connection sharing as described in the ControlMaster section above or the string 'none' to disable connection sharing.  In the path, '%l' will be substituted by the local host name, '%h' will be substituted by the target host name, '%p' the port, and '%r' by the remotelogin username. It is recommended that any ControlPath used for opportunistic connection sharing include at least %h, %p, and %r. This ensures that shared connections are uniquely identified.
 I<< Optional. Type uniline.  >>
 
 =head2 DynamicForward
 
 Specifies that a TCP port on the local machine be forwarded over the secure channel, and the application protocol is then used to determine where to connect to from the remote machine.
 
-The argument must be [bind_address:]port. IPv6 addresses can be specified by enclosing addresses in square brackets or by using an alternative syntax: [bind_address/]port. By default, the local port is bound in accordance with the GatewayPorts setting. However, an explicit bind_address may be used to bind the connection to a specific address. The bind_address of ``localhost'' indicates that the listening port be bound for local use only, while an empty address or `*' indicates that the port should be available from all interfaces.
+The argument must be [bind_address:]port. IPv6 addresses can be specified by enclosing addresses in square brackets or by using an alternative syntax: [bind_address/]port. By default, the local port is bound in accordance with the GatewayPorts setting. However, an explicit bind_address may be used to bind the connection to a specific address. The bind_address of 'localhost' indicates that the listening port be bound for local use only, while an empty address or '*' indicates that the port should be available from all interfaces.
 
 Currently the SOCKS4 and SOCKS5 protocols are supported, and ssh(1) will act as a SOCKS server. Multiple forwardings may be specified, and additional forwardings can be given on the command line. Only the superuser can forward privileged ports.
 I<< Optional. Type list of uniline.  >>
 
 =head2 EscapeChar
 
-Sets the escape character (default: `~'). The escape character can also be set on the command line.  The argument should be a single character, `^' followed by a letter, or ``none'' to disable the escape character entirely (making the connection transparent for binary data).
+Sets the escape character (default: '~'). The escape character can also be set on the command line.  The argument should be a single character, '^' followed by a letter, or 'none' to disable the escape character entirely (making the connection transparent for binary data).
 I<< Optional. Type uniline. upstream_default: '~'.  >>
 
 =head2 ExitOnForwardFailure
@@ -172,7 +172,7 @@
 
 Specifies a file from which the user's RSA or DSA authentication identity is read. The default is ~/.ssh/identity for protocol version 1, and ~/.ssh/id_rsa and ~/.ssh/id_dsa for protocol version 2. Additionally, any identities represented by the authentication agent will be used for authentication.
 
-The file name may use the tilde syntax to refer to a user's home directory or one of the following escape characters: `%d' (local user's home directory), `%u' (local user name), `%l' (local host  name), `%h' (remote host name) or `%r' (remote user name).
+The file name may use the tilde syntax to refer to a user's home directory or one of the following escape characters: '%d' (local user's home directory), '%u' (local user name), '%l' (local host  name), '%h' (remote host name) or '%r' (remote user name).
 
 It is possible to have multiple identity files specified in con figuration files; all these identities will be tried in sequence.
 I<< Optional. Type list of uniline.  >>
@@ -184,7 +184,7 @@
 
 =head2 KbdInteractiveDevices
 
-Specifies the list of methods to use in keyboard-interactive authentication.  Multiple method names must be comma-separated. The default is to use the server specified list. The methods available vary depending on what the server supports. For an OpenSSH server, it may be zero or more of: ``bsdauth'', ``pam'', and ``skey''.I<< Optional. Type list of uniline.  >>
+Specifies the list of methods to use in keyboard-interactive authentication.  Multiple method names must be comma-separated. The default is to use the server specified list. The methods available vary depending on what the server supports. For an OpenSSH server, it may be zero or more of: 'bsdauth', 'pam', and 'skey'.I<< Optional. Type list of uniline.  >>
 
 =head2 GatewayPorts
 
diff -Nru libconfig-model-openssh-perl-1.224/lib/Config/Model/OpenSsh.pm libconfig-model-openssh-perl-1.225/lib/Config/Model/OpenSsh.pm
--- libconfig-model-openssh-perl-1.224/lib/Config/Model/OpenSsh.pm	2012-05-22 13:25:29.000000000 +0200
+++ libconfig-model-openssh-perl-1.225/lib/Config/Model/OpenSsh.pm	2012-10-28 11:03:40.000000000 +0100
@@ -9,7 +9,7 @@
 #
 package Config::Model::OpenSsh ;
 {
-  $Config::Model::OpenSsh::VERSION = '1.224';
+  $Config::Model::OpenSsh::VERSION = '1.225';
 }
 
 1;
@@ -25,13 +25,13 @@
 The following will launch a graphical editor (if L<Config::Model::TkUI>
 is installed):
 
- config-edit -application sshd 
+ sudo cme edit sshd 
 
 =head2 command line
 
 This command will add a C<Host Foo> section in C<~/.ssh/config>: 
 
- config-edit -application ssh -ui none Host:Foo ForwardX11=yes
+ cme modify ssh Host:Foo ForwardX11=yes
  
 =head2 programmatic
 
@@ -56,19 +56,19 @@
 Once this module is installed, you can edit C</etc/ssh/sshd_config> 
 with run (as root) :
 
- # config-edit -application sshd 
+ # cme edit sshd 
 
 To edit F</etc/ssh/ssh_config>, run (as root):
 
- # config-edit -application ssh
+ # cme edit ssh
 
 To edit F<~/.ssh/config>, run as a normal user:
 
- # config-edit -application ssh
+ # cme edit ssh
 
 =head1 user interfaces
 
-As mentioned in L<config-edit>, several user interfaces are available:
+As mentioned in L<cme>, several user interfaces are available with C<edit> subcommand:
 
 =over
 
@@ -78,16 +78,11 @@
 
 =item *
 
-A Curses interface with option C<-ui curses> if L<Config::Model::CursesUI> is installed.
+A Curses interface with option C<cme edit ssh -ui curses> if L<Config::Model::CursesUI> is installed.
 
 =item *
 
-A Shell like interface with option C<-ui term>.
-
-=item *
-
-A L<Fuse> virtual file system with option C<< -ui fuse -fuse_dir <mountpoint> >> 
-if L<Fuse> is installed (Linux only)
+A Shell like interface with option C<cme edit ssh -ui shell>.
 
 =back
 
@@ -98,4 +93,4 @@
 
 =head1 SEE ALSO
 
-L<config-edit>, L<Config::Model>,
+L<cme>, L<Config::Model>,
diff -Nru libconfig-model-openssh-perl-1.224/MANIFEST libconfig-model-openssh-perl-1.225/MANIFEST
--- libconfig-model-openssh-perl-1.224/MANIFEST	2012-05-22 13:25:29.000000000 +0200
+++ libconfig-model-openssh-perl-1.225/MANIFEST	2012-10-28 11:03:40.000000000 +0100
@@ -4,7 +4,7 @@
 MANIFEST
 MANIFEST.SKIP
 META.yml
-README
+README.pod
 TODO
 demo/maintainer-demo.pl
 demo/user-demo.pl
diff -Nru libconfig-model-openssh-perl-1.224/META.yml libconfig-model-openssh-perl-1.225/META.yml
--- libconfig-model-openssh-perl-1.224/META.yml	2012-05-22 13:25:29.000000000 +0200
+++ libconfig-model-openssh-perl-1.225/META.yml	2012-10-28 11:03:40.000000000 +0100
@@ -14,7 +14,7 @@
 configure_requires:
   Module::Build: 0.3601
 dynamic_config: 0
-generated_by: 'Dist::Zilla version 4.300016, CPAN::Meta::Converter version 2.120921'
+generated_by: 'Dist::Zilla version 4.300025, CPAN::Meta::Converter version 2.120921'
 license: lgpl
 meta-spec:
   url: http://module-build.sourceforge.net/META-spec-v1.4.html
@@ -29,4 +29,4 @@
   Config::Model: 2.017
   File::Slurp: 0
   Log::Log4perl: 1.11
-version: 1.224
+version: 1.225
diff -Nru libconfig-model-openssh-perl-1.224/README libconfig-model-openssh-perl-1.225/README
--- libconfig-model-openssh-perl-1.224/README	2012-05-22 13:25:29.000000000 +0200
+++ libconfig-model-openssh-perl-1.225/README	1970-01-01 01:00:00.000000000 +0100
@@ -1,67 +0,0 @@
-
-Config::Model::OpenSsh - OpenSsh graphical configuration editor
-
-This module provides a graphical configuration editor for
-/etc/ssh/sshd_config and /etc/ssh/ssh_config (for root) and
-~/.ssh/config for non-root users.
-
-Main dependencies:
-- Config::Model::TkUI
-- Config::Model
-
-Suggested dependencies:
-- Config::Model::CursesUI to get a curses interface for the editor
-- Config::Model::Backend::Augeas to keep comment and structure of
-  /etc/ssh/sshd_config (not available for ssh config data)
-
-Once this module is installed, you can run:
-
-  # config-edit-sshd
-
-If config-edit fails to load your sshd.conf, you can try config-edit
-with -force option.
-
-Likewise, you can edit your ~/.ssh/config file with:
-
-  $ config-edit-ssh
-
-Or to edit /etc/ssh/ssh_config, run as root:
-
-  # config-edit-ssh
-
---------------------------------------------------------------------
-MODULE CONTENT
-
-This Perl modules contains several files (listed in MANIFEST). Here
-are the purpose of the main files:
-- Build.PL : script to build the Perl module. See Module::Build(3pm)
-- lib/Config/Model/models : directory containing Ssh and Sshd model
-  files. The main model are Sshd.pl and Ssh.pl. The complete ssh and
-  sshd models are made from all files contained in this directory.
-- lib/Config/Model/OpenSsh.pm: Read and write ssh or sshd
-  configuration files
-- t/ : non-regression tests
-
---------------------------------------------------------------------
-
-AUTHOR
-    Copyright (c) 2008-2009 Dominique Dumont.
-
-    This file is part of Config-Model-OpenSsh. License is LGPL v2.
-
-
-    All help text provided in OpenSsh models were extracted from
-    sshd_config(8) and ssh_config(8) man pages. I've slightly modified
-    the text to better suit an interactive editor.
-
----------------------------------------------------------------------
-INSTALLATION
-
-   	tar zxvf <dist_file>.tar.gz 
-   	cd <dist_directory>
-   	perl Build.PL
-	./Build test
-
-If you want to install this software without packaging, type also:
-
-        ./Build install
diff -Nru libconfig-model-openssh-perl-1.224/README.pod libconfig-model-openssh-perl-1.225/README.pod
--- libconfig-model-openssh-perl-1.224/README.pod	1970-01-01 01:00:00.000000000 +0100
+++ libconfig-model-openssh-perl-1.225/README.pod	2012-10-28 11:03:40.000000000 +0100
@@ -0,0 +1,45 @@
+
+=head2 Config::Model::OpenSsh - OpenSsh graphical configuration editor
+
+This module provides a graphical configuration editor for
+C</etc/ssh/sshd_config> and C</etc/ssh/ssh_config> (for root) and
+C<~/.ssh/config> for non-root users.
+
+=head2 Main dependencies
+
+=over
+
+=item *
+
+L<Config::Model::TkUI>
+
+=item *
+
+L<Config::Model>
+
+=back
+
+Once this module is installed, you can run:
+
+ # cme edit sshd
+
+If L<cme> fails to load your C<sshd_config>, you can try L<cme> with
+C<-force> option.
+
+Likewise, you can edit your C<~/.ssh/config> file with:
+
+ $ cme edit ssh
+
+Or to edit C</etc/ssh/ssh_config>, run as root:
+
+ # cme edit ssh
+
+=head2 Installation from git
+
+Make sure that L<Config::Model> and C<Dist::Zilla> are installed.
+
+ dzil build
+
+If you want to install this software without packaging, you can also run:
+
+ dzil install

--- End Message ---
--- Begin Message ---
On Mon, 2012-10-29 at 20:13 +0100, Dominique Dumont wrote:
> Please unblock package libconfig-model-openssh-perl
> 
> This new version was released by upstream (aka me) to:
> - fix obsolete document (pod doc)
> - update parameter description in configuration models to remove UTF-8
>   character (not needed in English text)
> - fix the demos provided with the packages. 
> - remove unnessary README and TODO files

Unblocked.

Regards,

Adam

--- End Message ---

Reply to: