<pre style='margin:0'>
Kurt Hindenburg (kurthindenburg) pushed a commit to branch master
in repository macports-ports.
</pre>
<p><a href="https://github.com/macports/macports-ports/commit/b24a508c196e6ed3f84af0e3a1d1759d51e3c9ad">https://github.com/macports/macports-ports/commit/b24a508c196e6ed3f84af0e3a1d1759d51e3c9ad</a></p>
<pre style="white-space: pre; background: #F8F8F8">The following commit(s) were added to refs/heads/master by this push:
<span style='display:block; white-space:pre;color:#404040;'> new b24a508c196 util-linux: Fix fetch failures on <10.12.
</span>b24a508c196 is described below
<span style='display:block; white-space:pre;color:#808000;'>commit b24a508c196e6ed3f84af0e3a1d1759d51e3c9ad
</span>Author: Fred Wright <fw@fwright.net>
AuthorDate: Mon Aug 10 15:32:22 2020 -0700
<span style='display:block; white-space:pre;color:#404040;'> util-linux: Fix fetch failures on <10.12.
</span><span style='display:block; white-space:pre;color:#404040;'>
</span><span style='display:block; white-space:pre;color:#404040;'> The redirection addressed by 974bc5f6bc0 was actually a red herring.
</span><span style='display:block; white-space:pre;color:#404040;'> The real problem wasn't the redirection per se, but the SSL cert
</span><span style='display:block; white-space:pre;color:#404040;'> pickiness of the final server (post-redirect), which doesn't work with
</span><span style='display:block; white-space:pre;color:#404040;'> Apple's curl prior to 10.12. The only straightforward fix for this is
</span><span style='display:block; white-space:pre;color:#404040;'> to disable the SSL certificate check, which there's precedent for in
</span><span style='display:block; white-space:pre;color:#404040;'> other Portfiles. In theory, this is only necessary for older OS
</span><span style='display:block; white-space:pre;color:#404040;'> versions, but the definition of "older" changes with time, and the
</span><span style='display:block; white-space:pre;color:#404040;'> certificate check isn't terribly important, given that the distfile
</span><span style='display:block; white-space:pre;color:#404040;'> needs to pass checksum and size checks, anyway. It does suggest more
</span><span style='display:block; white-space:pre;color:#404040;'> careful checking of the distfile when updating the port, as now
</span><span style='display:block; white-space:pre;color:#404040;'> indicated in the Portfile comments.
</span><span style='display:block; white-space:pre;color:#404040;'>
</span><span style='display:block; white-space:pre;color:#404040;'> The master_sites update in 974bc5f6bc0 is still appropriate, given
</span><span style='display:block; white-space:pre;color:#404040;'> that it honors the intent of "301 Moved Permanently". But the
</span><span style='display:block; white-space:pre;color:#404040;'> upstream doc is still referencing the pre-redirect site, so this
</span><span style='display:block; white-space:pre;color:#404040;'> change adds back the old upstream-consistent master_sites as a
</span><span style='display:block; white-space:pre;color:#404040;'> comment, along with a comment explaining why the real master_sites
</span><span style='display:block; white-space:pre;color:#404040;'> differs from upstream. This can be removed when the upstream doc is
</span><span style='display:block; white-space:pre;color:#404040;'> appropriately updated, but given that the upstream files have almost
</span><span style='display:block; white-space:pre;color:#404040;'> 300 references to "www.kernel.org", that isn't likely to happen soon.
</span><span style='display:block; white-space:pre;color:#404040;'>
</span><span style='display:block; white-space:pre;color:#404040;'> Since the MacPorts distfile mirror servers run 10.11, this issue explains
</span><span style='display:block; white-space:pre;color:#404040;'> why they haven't mirrored the two latest versions, and that should be
</span><span style='display:block; white-space:pre;color:#404040;'> fixed by this change.
</span><span style='display:block; white-space:pre;color:#404040;'>
</span><span style='display:block; white-space:pre;color:#404040;'> TESTED:
</span><span style='display:block; white-space:pre;color:#404040;'> Verified PGP signature on current distfile.
</span><span style='display:block; white-space:pre;color:#404040;'> Ran "port checksum" successfully on 10.5-10.13 (after "port clean
</span><span style='display:block; white-space:pre;color:#404040;'> --all").
</span>---
devel/util-linux/Portfile | 13 +++++++++++++
1 file changed, 13 insertions(+)
<span style='display:block; white-space:pre;color:#808080;'>diff --git a/devel/util-linux/Portfile b/devel/util-linux/Portfile
</span><span style='display:block; white-space:pre;color:#808080;'>index 88340f56f3c..113316e004a 100644
</span><span style='display:block; white-space:pre;background:#e0e0ff;'>--- a/devel/util-linux/Portfile
</span><span style='display:block; white-space:pre;background:#e0e0ff;'>+++ b/devel/util-linux/Portfile
</span><span style='display:block; white-space:pre;background:#e0e0e0;'>@@ -19,7 +19,20 @@ long_description ${name} contains miscellaneous utility programs \
</span> and messages. This port contains ONLY those parts \
of ${name} that run on Darwin.
<span style='display:block; white-space:pre;background:#e0ffe0;'>+# master_sites https://www.kernel.org/pub/linux/utils/util-linux/v${branch}/
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+# The above site redirects permanently (301) to mirrors.edge.kernel.org
</span> master_sites https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v${branch}/
<span style='display:block; white-space:pre;background:#e0ffe0;'>+
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+# mirrors.edge.kernel.org doesn't work with some earlier Apple root CAs,
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+# so we need to disable the certificate check. This isn't much of a risk,
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+# since the distfile has to pass the checksum/size checks, anyway.
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+#
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+# When updating the port to a new version, some extra manual checking
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+# of the distfile would be desirable, by performing a certificate-validated
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+# check and/or checking the PGP signature. Note that the .sign file
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+# applies to the uncompressed tarball in this case.
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+fetch.ignore_sslcert yes
</span><span style='display:block; white-space:pre;background:#e0ffe0;'>+
</span> use_xz yes
checksums rmd160 81c26b1da8e7e4ce065ed93639bcc2d5aba3baa8 \
</pre><pre style='margin:0'>
</pre>