Date: Sat, 11 Apr 2015 17:45:20 +0000 From: bugzilla-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 199298] [MAINTAINER] dns/knot: Update to 1.6.3 Message-ID: <bug-199298-13-WoNcFpLH57@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-199298-13@https.bugs.freebsd.org/bugzilla/> References: <bug-199298-13@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=199298 --- Comment #10 from freebsd@dns-lab.com --- I'm currently suffering vision trouble; and apparently at the finish of installing LibreSSL I had a dyslectic confusion. Then I was testing it the traditional way, and combined with a forgotten `setenv FORCE_PKG_REGISTER` I wasn't getting any of the errors that you got. But (elsewhere) neither poudriere reported it. Anyway, testing your last revision results in: make: "/usr/ports/dns/knot/Makefile" line 56: Malformed conditional (${OPENSSL_PORT} == security/libressl) What would be a better way of detecting LibreSSL here? Without that check, and having LibreSSL in make.conf, it all installs, but ends up with fatal errors when starting Knot i.c.w. doing DNSSEC auto-signing of zones using GOST keys. As upstream is trying to solve this in the next release, what would you recommend? Should we maybe have a little patience, and for now remove the patch? Although GOST in DNSSEC isn't very widely practiced, I think a DNS operator rather has an error on install, than a silent message in a log. Also; Knot's roadmap is to use GnuTLS per 2.0, because of hardware support and smartcards. Actually this is already the case per 1.99.1 (a devel release). -- You are receiving this mail because: You are the assignee for the bug.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-199298-13-WoNcFpLH57>