From owner-freebsd-ports@freebsd.org Fri Jan 5 09:19:08 2018 Return-Path: Delivered-To: freebsd-ports@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 828A7EBF474 for ; Fri, 5 Jan 2018 09:19:08 +0000 (UTC) (envelope-from mat@FreeBSD.org) Received: from prod2.absolight.net (prod2.absolight.net [79.143.243.136]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "plouf.absolight.net", Issuer "CAcert Class 3 Root" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 461727F2AD for ; Fri, 5 Jan 2018 09:19:07 +0000 (UTC) (envelope-from mat@FreeBSD.org) Received: from prod2.absolight.net (localhost [127.0.0.1]) by prod2.absolight.net (Postfix) with ESMTP id 46A28BDD25; Fri, 5 Jan 2018 10:19:05 +0100 (CET) Received: from atuin.in.mat.cc (atuin.in.mat.cc [79.143.241.205]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) by prod2.absolight.net (Postfix) with ESMTPSA id 1AE2CBDD1E; Fri, 5 Jan 2018 10:19:05 +0100 (CET) Subject: Re: using security/openssl in a port To: Matthew Luckie , freebsd-ports@freebsd.org References: From: Mathieu Arnold Organization: Absolight / The FreeBSD Foundation Message-ID: <1ce369b3-570f-6ac3-e821-3a4c535c5689@FreeBSD.org> Date: Fri, 5 Jan 2018 10:19:02 +0100 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:52.0) Gecko/20100101 Thunderbird/52.5.2 MIME-Version: 1.0 In-Reply-To: Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="YJbx6nPHlXVSiqTrYBV3XodWuQdJmx9qK" X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 05 Jan 2018 09:19:08 -0000 This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --YJbx6nPHlXVSiqTrYBV3XodWuQdJmx9qK Content-Type: multipart/mixed; boundary="ogFR72Hn51F8Ldw3sxWxR3iCg1O1zy34B"; protected-headers="v1" From: Mathieu Arnold To: Matthew Luckie , freebsd-ports@freebsd.org Message-ID: <1ce369b3-570f-6ac3-e821-3a4c535c5689@FreeBSD.org> Subject: Re: using security/openssl in a port References: In-Reply-To: --ogFR72Hn51F8Ldw3sxWxR3iCg1O1zy34B Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Content-Language: fr Le 05/01/2018 =C3=A0 03:11, Matthew Luckie a =C3=A9crit=C2=A0: > Hi, > > I maintain a port that has a new release which requires openssl 1.0.2 t= o > build. FreeBSD 10.3 and 10.4 both have openssl 1.0.1, and 11 onwards > have 1.0.2. Is there a magic way to have this port depend on ports > openssl for freebsd releases without openssl 1.0.2? I ran > > find /usr/ports -exec grep "security/openssl" {} \; -print > > and didn't find anything that I could use as a recipe. USES =3D ssl > doesn't seem to be it either. You NEVER forcefully depend on security/openssl directly. You USES=3Dssl,= and you use whatever default is available.=C2=A0 So, in your case, you ne= ed something like this: =2Einclude =2Eif ${OSVERSION} < 1100085 BROKEN_SSL=3D=C2=A0=C2=A0 base BROKEN_SSL_REASON=3D Needs OpenSSL 1.0.2+ =2Eendif --=20 Mathieu Arnold --ogFR72Hn51F8Ldw3sxWxR3iCg1O1zy34B-- --YJbx6nPHlXVSiqTrYBV3XodWuQdJmx9qK Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQJ8BAEBCgBmBQJaT0MIXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQzQUI2OTc4OUQyRUQxMjEwNjQ0MEJBNUIz QTQ1MTZGMzUxODNDRTQ4AAoJEDpFFvNRg85IkmMP+gOraHoZCfXJ6VOiAa5Nk60/ f7sexi4yMpBEsxACjmlOLZogLiqalRSMKCYXB10AZWI7afCBnPsDj76Igy9AvPbQ ZZCRcNdxvYWyx9SPS8QpMDmRRcvxoMFX0Pn/4csUzPTvJYMahcJtBIQyJqaTCy2i eU2pt3HSX84J2pEp53voSTIOK8Jc91iMnvUh0F4Pv0WCYRxMc/UrJRzG+9W9RNea TjRO58hpe9tDNA1VVApvOd4GL5X8Gdb4wIeHnfRhhP3ppmtd1n/yq1z7ai1JeN6Y 79aaP6op9Rpd8kD8RDeoBbIxRXE+saGO/hSgZn8Kp+AjIu5qqZ1VukRTIIZUEE7m hdqhxU4ShGcKCJMQT5E9LrEoodM9scb8/0tD69kurZd8HN4aC4205szQZPk3zgaP kHo8TLePurr8l5Mycd8/1U2Qx/ls/FX6Qfvzuas12k+5xQ+FjwxWpjuBzbQ4NDES t5TULNAnuxnEkTj+wxUxD4DyKgs4opU+JUpauHnbRQJ7BnJGMfphfjPSBYTSRKXs SCmjKLw3TacgsK2tSAkC4T25f6JVbcvtpY92KkMaiLWGxFCAsw731CfylJd/hM0s zDMo1niljy8OF4bvINWBpmYttjKWkPlw+s8agBVvsTCV8sXX1vyKb5ZTmvzwdlVx DApQOoaw2NiYG79+X7Uv =lcOM -----END PGP SIGNATURE----- --YJbx6nPHlXVSiqTrYBV3XodWuQdJmx9qK--