X-Original-To: alpine-aports@mail.alpinelinux.org Delivered-To: alpine-aports@mail.alpinelinux.org Received: from mail.alpinelinux.org (dallas-a1.alpinelinux.org [127.0.0.1]) by mail.alpinelinux.org (Postfix) with ESMTP id 1849FDC1558 for ; Mon, 14 Sep 2015 11:36:04 +0000 (UTC) Received: from mail-oi0-f48.google.com (mail-oi0-f48.google.com [209.85.218.48]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by mail.alpinelinux.org (Postfix) with ESMTPS id D9821DC0F5C for ; Mon, 14 Sep 2015 11:36:02 +0000 (UTC) Received: by oixx17 with SMTP id x17so74764265oix.0 for ; Mon, 14 Sep 2015 04:36:02 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type; bh=7KiOgzGxAnvgYmygFPb9ZdG6ZaRMYuhFZ8EUyByOTOA=; b=OWzC0B+Biubq4RzlSiVzGvTc0OFebrymvXGgkcLJMbvm4B7q8h22MWXnLXYeWC9FvU G+0zhLteYH1BYyQ3MeYYPPbjeMErrVkrpGjstrM/EL7XV8hkIF+tEGRR3E0bCm6I37KY l5Rv1C16Q5+t31AoI8Z5rjszUcRj8H2IKSgIddtsSH2sylPLzwPuNupo//LGl1GVXpfc DxS9/czscgW8AGBxxWuYhMtWhCvyoF+aLbQd3PxM1894y50FcF7yfg7nVXT2ZNBZfXur FugMrlVsEpSnbgKfLZrSj/vVN8LfNzOCDPBSqA3fG8g6aoKx3y/4k73ueFPFVTEHpcRu fVhA== X-Received: by 10.202.50.137 with SMTP id y131mr10205511oiy.83.1442230562130; Mon, 14 Sep 2015 04:36:02 -0700 (PDT) X-Mailinglist: alpine-aports Precedence: list List-Id: Alpine Development List-Unsubscribe: List-Post: List-Help: List-Subscribe: MIME-Version: 1.0 Received: by 10.60.40.231 with HTTP; Mon, 14 Sep 2015 04:35:42 -0700 (PDT) In-Reply-To: <20150905142439.2df7e0ee@ncopa-laptop> References: <20150905142439.2df7e0ee@ncopa-laptop> From: Sander Maijers Date: Mon, 14 Sep 2015 13:35:42 +0200 Message-ID: Subject: Re: [alpine-aports] [PATCH] testing/xmlsec: new aport To: Natanael Copa Cc: alpine-aports@lists.alpinelinux.org Content-Type: text/plain; charset=UTF-8 X-Virus-Scanned: ClamAV using ClamSMTP Hi Natanael, Thanks for accepting the new aport. On Sat, Sep 5, 2015 at 2:24 PM, Natanael Copa wrote: > > On Thu, 3 Sep 2015 16:03:44 +0200 > Sander Maijers wrote: > > > https://www.aleksey.com/xmlsec > > Provides a C based implementation for XML Signature Syntax and > > Processing and XML Encryption Syntax and Processing. > > --- > > testing/xmlsec/APKBUILD | 49 +++++++++++++++++++++++++++++++++++++++++++++++++ > > 1 file changed, 49 insertions(+) > > create mode 100644 testing/xmlsec/APKBUILD > > Thanks. > > Did you send this patch with git send-email via gmail? > > It seems that gmail reformat emails (wrapping some long lines) so the > patch does not apply. I edited manually and then cleaned up minor > things. Thanks. I will send them as attachments in the future (if that isn't rejected). Right now, I'm a bit hesitant to add plugins to git that can send e-mail (making my configuration more complex and possibly decreasing my workstation's security). > See comments below. > > -nc > > > > > diff --git a/testing/xmlsec/APKBUILD b/testing/xmlsec/APKBUILD > > new file mode 100644 > > index 0000000..adfe180 > > --- /dev/null > > +++ b/testing/xmlsec/APKBUILD > > @@ -0,0 +1,49 @@ > > +# Contributor: Sander Maijers > > +# Maintainer: Sander Maijers > > +pkgname='xmlsec' > > +pkgver='1.2.20' > > +pkgrel='0' > > +pkgdesc="Provides a C based implementation for XML Signature Syntax > > and Processing and XML Encryption Syntax and Processing." > > Something has wrapped the above line. Normally we prefer having a > description that is shorter. The description, though longish, contains valuable (even critical) information about what exactly is implemented in this software. The Arch Linux description, for example, is poor IMO: "XML Security Library is a C library based on LibXML2" > > +url="https://www.aleksey.com/${pkgname}" > > +arch="all" > > +license="MIT" > > +depends="libxml2 libxslt openssl libltdl" > > You don't need add the above depedencies (unless it > needs /usr/bin/openssl at runtime). abuild will automatically detect > the dependencies for shared libs. Okay, that's great. Is this documented? Important note: I am not sure whether a certain issue still exists that I had during testing this aport. See http://bugs.alpinelinux.org/issues/4554#note-2 There may be some interaction between that issue and the dependency specification for the aport. > > +depends_dev= > > +makedepends="${depends_dev} libxml2-dev libxslt-dev openssl-dev libltdl" > > +install= > > +subpackages="${pkgname}-dev ${pkgname}-doc" > > +source="${url}/download/${pkgname}1-${pkgver}.tar.gz" > > +_builddir="${srcdir}/${pkgname}1-${pkgver}" > > + > > +prepare() { > > + : > > +} > > + > > +build() { > > + cd "${_builddir}" && > > + './configure' \ > > + --build="$CBUILD" \ > > + --disable-static \ > > + --enable-pkgconfig \ > > + --host="$CHOST" \ > > + --prefix='/usr' \ > > + --with-default-crypto='openssl' && > > + make || return 1 > > Indent does not look good. > > > +} > > + > > +check() { > > + cd "${_builddir}" && > > + make -k check || return 1 > > +} > > We don't (yet) have any way to run check. I thought so, but at least one aport provides it as well and it seems usefull to keep this code around. > > + > > +package() { > > + cd "${_builddir}" && > > + make DESTDIR="${pkgdir}" install || return 1 > > + [ -d "${pkgdir}" ] && find "${pkgdir}"'/usr' -type 'f' -name '*.la' -delete > > + install -m755 -d "${pkgdir}/usr/share/licenses/${pkgname}" && > > + install -m644 'COPYING' > > "${pkgdir}/usr/share/licenses/${pkgname}/" || return 1 > > +} > > + > > +md5sums="ce12af00283eb90d9281956524250d6e xmlsec1-1.2.20.tar.gz" > > +sha256sums="3221593ca50f362b546a0888a1431ad24be1470f96b2469c0e0df5e1c55e7305 > > xmlsec1-1.2.20.tar.gz" > > +sha512sums="2f8d473916abf9822367edbe857fc2e12dc9858d12e790d689d787e439904bd6a452bf631043aa66e7502457ab0815a473657f58fca17a213e2490f5655e5ae5 > > xmlsec1-1.2.20.tar.gz" > > checksumlines were wrapped. > > -nc Must say that running a command that automatically adds the hash values as advised here (http://wiki.alpinelinux.org/wiki/Creating_an_Alpine_package#Build_the_package), whereas I did it by hand, kind of defeats the purpose of having them (for integrity checking against tampering, at least). Not that there is an easy solution for it... --- Unsubscribe: alpine-aports+unsubscribe@lists.alpinelinux.org Help: alpine-aports+help@lists.alpinelinux.org ---