using security/openssl in a port
Mathieu Arnold
mat at FreeBSD.org
Fri Jan 5 09:19:08 UTC 2018
Le 05/01/2018 à 03:11, Matthew Luckie a écrit :
> Hi,
>
> I maintain a port that has a new release which requires openssl 1.0.2 to
> build. FreeBSD 10.3 and 10.4 both have openssl 1.0.1, and 11 onwards
> have 1.0.2. Is there a magic way to have this port depend on ports
> openssl for freebsd releases without openssl 1.0.2? I ran
>
> find /usr/ports -exec grep "security/openssl" {} \; -print
>
> and didn't find anything that I could use as a recipe. USES = ssl
> doesn't seem to be it either.
You NEVER forcefully depend on security/openssl directly. You USES=ssl,
and you use whatever default is available. So, in your case, you need
something like this:
.include <bsd.port.options.mk>
.if ${OSVERSION} < 1100085
BROKEN_SSL= base
BROKEN_SSL_REASON= Needs OpenSSL 1.0.2+
.endif
--
Mathieu Arnold
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 949 bytes
Desc: OpenPGP digital signature
URL: <http://lists.freebsd.org/pipermail/freebsd-ports/attachments/20180105/0ceeb63e/attachment.sig>
More information about the freebsd-ports
mailing list