How to Install and Uninstall perl-Catalyst-Plugin-Authentication.noarch Package on Fedora 38
Last updated: November 17,2024
1. Install "perl-Catalyst-Plugin-Authentication.noarch" package
In this section, we are going to explain the necessary steps to install perl-Catalyst-Plugin-Authentication.noarch on Fedora 38
$
sudo dnf update
Copied
$
sudo dnf install
perl-Catalyst-Plugin-Authentication.noarch
Copied
2. Uninstall "perl-Catalyst-Plugin-Authentication.noarch" package
Here is a brief guide to show you how to uninstall perl-Catalyst-Plugin-Authentication.noarch on Fedora 38:
$
sudo dnf remove
perl-Catalyst-Plugin-Authentication.noarch
Copied
$
sudo dnf autoremove
Copied
3. Information about the perl-Catalyst-Plugin-Authentication.noarch package on Fedora 38
Last metadata expiration check: 3:33:18 ago on Sat Mar 16 22:59:57 2024.
Available Packages
Name : perl-Catalyst-Plugin-Authentication
Version : 0.10023
Release : 25.fc38
Architecture : noarch
Size : 121 k
Source : perl-Catalyst-Plugin-Authentication-0.10023-25.fc38.src.rpm
Repository : fedora
Summary : Infrastructure plugin for the Catalyst authentication framework
URL : https://metacpan.org/release/Catalyst-Plugin-Authentication
License : GPL+ or Artistic
Description : The authentication plugin provides generic user support for Catalyst apps.
: It is the basis for both authentication (checking the user is who they
: claim to be), and authorization (allowing the user to do what the system
: authorizes them to do).
Available Packages
Name : perl-Catalyst-Plugin-Authentication
Version : 0.10023
Release : 25.fc38
Architecture : noarch
Size : 121 k
Source : perl-Catalyst-Plugin-Authentication-0.10023-25.fc38.src.rpm
Repository : fedora
Summary : Infrastructure plugin for the Catalyst authentication framework
URL : https://metacpan.org/release/Catalyst-Plugin-Authentication
License : GPL+ or Artistic
Description : The authentication plugin provides generic user support for Catalyst apps.
: It is the basis for both authentication (checking the user is who they
: claim to be), and authorization (allowing the user to do what the system
: authorizes them to do).