Page MenuHomeFreeBSD

michaelo (Michael Osipov)
User

Projects

User Details

User Since
Jul 19 2018, 5:53 PM (354 w, 13 h)

Recent Activity

Today

michaelo committed R11:4082e6ec0dc5: print/ghostscript10: Update port to 10.05.1 (authored by michaelo).
print/ghostscript10: Update port to 10.05.1
Fri, May 2, 6:48 AM
michaelo closed D50097: print/ghostscript10: Update port to 10.05.1.
Fri, May 2, 6:44 AM
michaelo committed R11:b24061b5440e: print/ghostscript10: Update port to 10.05.1 (authored by michaelo).
print/ghostscript10: Update port to 10.05.1
Fri, May 2, 6:44 AM

Yesterday

michaelo requested review of D50097: print/ghostscript10: Update port to 10.05.1.
Thu, May 1, 7:06 AM

Tue, Apr 29

michaelo added a comment to D50052: ftp/curl: Fix build with --with-gssapi and --disable-ftp.
In D50052#1141942, @jrm wrote:
In D50052#1141939, @jrm wrote:

This fixes a build problem, so you can commit with implicit maintainer approval.

I see some people use implicit portgmr approval when fixing builds. For example, 7d61294c3546ec94549b2f75e14c2e3c2ca09791. I'm not sure whether this is documented anywhere.

Tue, Apr 29, 1:25 PM
michaelo closed D50052: ftp/curl: Fix build with --with-gssapi and --disable-ftp.
Tue, Apr 29, 1:17 PM
michaelo committed R11:b55113e4038c: ftp/curl: Fix build with --with-gssapi and --disable-ftp (authored by michaelo).
ftp/curl: Fix build with --with-gssapi and --disable-ftp
Tue, Apr 29, 1:17 PM
michaelo added a comment to D50052: ftp/curl: Fix build with --with-gssapi and --disable-ftp.

Waiting for port maintainer's consent.

Tue, Apr 29, 8:44 AM

Mon, Apr 28

michaelo added a comment to D50052: ftp/curl: Fix build with --with-gssapi and --disable-ftp.

Build error in poudriere:

Mon, Apr 28, 1:51 PM
michaelo requested review of D50052: ftp/curl: Fix build with --with-gssapi and --disable-ftp.
Mon, Apr 28, 1:50 PM

Fri, Apr 25

michaelo updated subscribers of D49130: certctl: Add support for generating a certificate bundle (CAfile).

Maybe this should be split into two reviews: (1) Basic funtionality for the base system, (2) adding links in LOCALBASE?

ok.

14.3-RELEASE is approach. Can you please split up? I want to have this at least for base in the next release.

If the change doesn't provide full replacement functionality for ca_root_nss, it defeats the purpose. If someone else wants to butcher this they can do so. But this process has been utterly disheartening and has made me doubt the value of contributing at all. I'd rather keep my local changes local from now on if this is what sharing gets me.

I'd also like to personally thank Franco for their efforts as they've led to me finding a replacement for OPNsense.

Please don't resubscribe me to this diff.

Fri, Apr 25, 1:35 PM
michaelo updated subscribers of D49130: certctl: Add support for generating a certificate bundle (CAfile).

Maybe this should be split into two reviews: (1) Basic funtionality for the base system, (2) adding links in LOCALBASE?

ok.

Fri, Apr 25, 6:32 AM

Sun, Apr 13

michaelo updated subscribers of D49489: dhclient.conf.5: Correct crossreference.

@michaelo, src/tools/tools/git/git-arc.sh will do this for you. Use git arc patch -c D49489. But first, Jim is a recurring contributor, let me work with him on commit messages.

Sun, Apr 13, 7:39 PM
michaelo added a comment to D49489: dhclient.conf.5: Correct crossreference.

Following our discussion today about patch movement, @michaelo could commit this or I'd need @carlavilla or @mhorne to approve it. For me to do it, I need a better commit message. Unfortunately afaik you need to use the webapp to do this.

Sun, Apr 13, 4:59 PM

Mon, Apr 7

michaelo added a comment to D49130: certctl: Add support for generating a certificate bundle (CAfile).

Maybe this should be split into two reviews: (1) Basic funtionality for the base system, (2) adding links in LOCALBASE?

Mon, Apr 7, 6:49 AM

Sat, Apr 5

michaelo added inline comments to D49130: certctl: Add support for generating a certificate bundle (CAfile).
Sat, Apr 5, 5:40 PM
michaelo added a reviewer for D49130: certctl: Add support for generating a certificate bundle (CAfile): kevans.
Sat, Apr 5, 9:31 AM

Fri, Apr 4

michaelo added a comment to D49130: certctl: Add support for generating a certificate bundle (CAfile).
In D49130#1132354, @jrm wrote:

It's indeed running in a chroot.

% sudo procstat -f $(pgrep local-unbound)
  PID COMM                FD T V FLAGS    REF  OFFSET PRO NAME
 3763 local-unbound     text v r r-------   -       - -   /usr/sbin/local-unbound
 3763 local-unbound      cwd v d r-------   -       - -   /var/unbound
 3763 local-unbound     root v d r-------   -       - -   /var/unbound
 3763 local-unbound     jail v d r-------   -       - -   /var/unbound
 3763 local-unbound        0 v c rw------   3       0 -   /dev/null
 3763 local-unbound        1 v c rw------   3       0 -   /dev/null
 3763 local-unbound        2 v c rw------   3       0 -   /dev/null
 3763 local-unbound        3 s - rw---n--   1       0 UDP ::1.53 ::.0
 3763 local-unbound        4 s - rw---n--   1       0 TCP 0 0 ::1.53 ::.0
 3763 local-unbound        5 s - rw---n--   1       0 UDP 127.0.0.1:53 *:0
 3763 local-unbound        6 s - rw---n--   1       0 TCP 0 0 127.0.0.1:53 *:0
 3763 local-unbound        7 s - rw---n--   1       0 UDS 0 0 /var/run/local_unbound.ctl
 3763 local-unbound        8 s - rw------   1       0 UDD /var/run/log
 3763 local-unbound        9 s - rw---n--   1       0 UDS 0 0 -
 3763 local-unbound       10 s - rw---n--   1       0 UDS 0 0 -
Fri, Apr 4, 7:32 PM
michaelo added a comment to D49130: certctl: Add support for generating a certificate bundle (CAfile).
In D49130#1132352, @jrm wrote:

Sorry. I'm struggling to keep up with a lot of requests these days.

% rg tls /var/unbound/unbound.conf
9:      tls-system-cert: yes

I can confirm that without the ca_root_nss package installed, local_unbound will not resolve unless the certificate bundle is installed as /etc/ssl/cert.pem. With the certificate bundle present, it will resolve and truss output shows:

88570: open("/etc/ssl/cert.pem",O_RDONLY,0666)   = 8 (0x8)

Does that answer your questions?

Fri, Apr 4, 7:06 PM
michaelo added a comment to D49130: certctl: Add support for generating a certificate bundle (CAfile).

@jrm , yet another ping: Where you able to test this with local_unbound?

Fri, Apr 4, 6:29 PM

Apr 1 2025

michaelo added a comment to D49294: caroot: update the root bundle.

No reaction from secteam...

Apr 1 2025, 9:10 AM

Mar 26 2025

michaelo accepted D49489: dhclient.conf.5: Correct crossreference.

I am fine with that.

Mar 26 2025, 7:16 PM

Mar 25 2025

michaelo requested changes to D49489: dhclient.conf.5: Correct crossreference.
Mar 25 2025, 2:44 PM

Mar 24 2025

michaelo added inline comments to D49489: dhclient.conf.5: Correct crossreference.
Mar 24 2025, 7:59 PM

Mar 20 2025

michaelo added a comment to D49294: caroot: update the root bundle.

MFC'ed and issue created: https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=285546

Mar 20 2025, 12:09 PM
michaelo committed rGf89c056e1184: caroot: update the root bundle (authored by michaelo).
caroot: update the root bundle
Mar 20 2025, 11:40 AM
michaelo committed rG7577dae4d672: caroot: update the root bundle (authored by michaelo).
caroot: update the root bundle
Mar 20 2025, 10:19 AM
michaelo closed D49406: devel/subversion{,-lts}: Band-aid port option BDB and deprecate for removal.
Mar 20 2025, 10:11 AM
michaelo committed R11:055a1041eda4: devel/subversion{,-lts}: Band-aid port option BDB and deprecate for removal (authored by michaelo).
devel/subversion{,-lts}: Band-aid port option BDB and deprecate for removal
Mar 20 2025, 10:11 AM

Mar 19 2025

michaelo added a comment to D49130: certctl: Add support for generating a certificate bundle (CAfile).

@jrm, did you get a chance to test that with local unbound?

Mar 19 2025, 7:57 AM
michaelo updated the diff for D49406: devel/subversion{,-lts}: Band-aid port option BDB and deprecate for removal.

Add improvements from @jrm.

Mar 19 2025, 7:56 AM
michaelo added inline comments to D49406: devel/subversion{,-lts}: Band-aid port option BDB and deprecate for removal.
Mar 19 2025, 6:14 AM
michaelo updated the diff for D49406: devel/subversion{,-lts}: Band-aid port option BDB and deprecate for removal.

Fix invalid test condition

Mar 19 2025, 6:13 AM

Mar 18 2025

michaelo requested review of D49406: devel/subversion{,-lts}: Band-aid port option BDB and deprecate for removal.
Mar 18 2025, 8:40 PM
michaelo closed D49402: devel/apr1: Pass correct configuration if BDB5 is selected.
In D49402#1126581, @jrm wrote:

@jrm, yes of course, it simply worked in poudriere. Did forget to bump the revision.

I don't know who represents maintainer apache@FreeBSD.org, but I guess I have to give the potential maintainers two weeks of time for this.

It's a mailing list [0] so proceed as you see fit.

[0] https://lists.freebsd.org/subscription/freebsd-apache

Mar 18 2025, 8:25 PM
michaelo committed R11:f5d84834f492: devel/apr1: Pass correct configuration if BDB5 is selected (authored by michaelo).
devel/apr1: Pass correct configuration if BDB5 is selected
Mar 18 2025, 8:03 PM
michaelo closed D49397: sysutils/javaservicewrapper: Update port to 3.5.60.
Mar 18 2025, 2:25 PM
michaelo added a comment to D49397: sysutils/javaservicewrapper: Update port to 3.5.60.

Merged.

Mar 18 2025, 2:25 PM
michaelo committed R11:3e62a7ef7345: sysutils/javaservicewrapper: Update port to 3.5.60 (authored by michaelo).
sysutils/javaservicewrapper: Update port to 3.5.60
Mar 18 2025, 2:14 PM
michaelo added a comment to D49402: devel/apr1: Pass correct configuration if BDB5 is selected.

I don't know who represents maintainer apache@FreeBSD.org, but I guess I have to give the potential maintainers two weeks of time for this.

Mar 18 2025, 1:07 PM
michaelo updated the diff for D49402: devel/apr1: Pass correct configuration if BDB5 is selected.

@jrm, yes of course, it simply worked in poudriere. Did forget to bump the revision.

Mar 18 2025, 1:00 PM
michaelo requested review of D49402: devel/apr1: Pass correct configuration if BDB5 is selected.
Mar 18 2025, 12:24 PM

Mar 17 2025

michaelo requested review of D49397: sysutils/javaservicewrapper: Update port to 3.5.60.
Mar 17 2025, 8:13 PM

Mar 15 2025

michaelo added a reverting change for rGb14cfdf665bb: sh(1): Discourage use of -e.: rG61df1b78f906: sh(1): Replace recommendation of use of -e with a note.
Mar 15 2025, 2:02 PM
michaelo committed rG61df1b78f906: sh(1): Replace recommendation of use of -e with a note (authored by michaelo).
sh(1): Replace recommendation of use of -e with a note
Mar 15 2025, 2:02 PM
michaelo added a reverting change for rGb14cfdf665bb: sh(1): Discourage use of -e.: rG1245f6e34884: sh(1): Replace recommendation of use of -e with a note.
Mar 15 2025, 2:01 PM
michaelo committed rG1245f6e34884: sh(1): Replace recommendation of use of -e with a note (authored by michaelo).
sh(1): Replace recommendation of use of -e with a note
Mar 15 2025, 2:01 PM
michaelo committed rGd3e5558d3168: caroot: Ignore soft distrust of server CA certificates after 398 days (authored by michaelo).
caroot: Ignore soft distrust of server CA certificates after 398 days
Mar 15 2025, 1:57 PM
michaelo committed rG4fd560bc94f0: caroot: Ignore soft distrust of server CA certificates after 398 days (authored by michaelo).
caroot: Ignore soft distrust of server CA certificates after 398 days
Mar 15 2025, 1:52 PM

Mar 14 2025

michaelo added a comment to D49294: caroot: update the root bundle.

Who is supported to cherry-pick to releng?

Secteam will do that. You can just fill out the erratum template and mail it to secteam.

Mar 14 2025, 1:34 PM
michaelo added a comment to D49294: caroot: update the root bundle.

Awesome, thanks! Let me know if you need help with the process- I'd like others to be comfortable with updating the caroot bundle as I'd never intended to be the long-term maintainer of it, but I've failed repeatedly to entice anyone else into dealing with it.

Mar 14 2025, 9:41 AM

Mar 13 2025

michaelo added a comment to D49130: certctl: Add support for generating a certificate bundle (CAfile).
In D49130#1124975, @jrm wrote:
In D49130#1124932, @jrm wrote:

Thanks for this. I still had ca_root_nss installed because local_unbound configured with TLS required a certificate bundle. Unbound with TLS is now working without ca_root_nss.

Regarding unbound, if you set tls-system-cert to true you will have the default truststore enabled: https://github.com/NLnetLabs/unbound/blob/5c84bb573f9728c10bcb3592dbd12be403d362de/util/net_help.c#L1593-L1601

Only chroot requires a bundle which sitll can use tls-system-cert.

In my opinion the unbound in base should have this option set to true by default to reduce the user headache.

In D49130#1124932, @jrm wrote:

Thanks for this. I still had ca_root_nss installed because local_unbound configured with TLS required a certificate bundle. Unbound with TLS is now working without ca_root_nss.

Regarding unbound, if you set tls-system-cert to true you will have the default truststore enabled: https://github.com/NLnetLabs/unbound/blob/5c84bb573f9728c10bcb3592dbd12be403d362de/util/net_help.c#L1593-L1601

Only chroot requires a bundle which sitll can use tls-system-cert.

In my opinion the unbound in base should have this option set to true by default to reduce the user headache.

Please confirm, but I believe if you put something like this in /etc/rc.conf:

local_unbound_enable="YES"
local_unbound_forwarders="x.x.x.x@853#xxx"
local_unbound_tls="YES"

Then run # service local_unbound setup, you will get that option in /var/unbound/unbound.conf and it will use a chroot, so you do need the bundle.

Mar 13 2025, 8:33 AM
michaelo closed D49294: caroot: update the root bundle.

Will work on EN after MFC.

Mar 13 2025, 7:49 AM
michaelo committed rG0100da4deb96: caroot: update the root bundle (authored by michaelo).
caroot: update the root bundle
Mar 13 2025, 7:46 AM
michaelo closed D49327: */*: Rework manpages handling in Samba-related ports.
Mar 13 2025, 7:40 AM
michaelo committed R11:47b3df759415: */*: Rework manpages handling in Samba-related ports (authored by michaelo).
*/*: Rework manpages handling in Samba-related ports
Mar 13 2025, 7:40 AM
michaelo committed R11:9e3b3289bf14: print/ghostscript10: Update port to 10.05.0 (authored by michaelo).
print/ghostscript10: Update port to 10.05.0
Mar 13 2025, 7:37 AM
michaelo closed D49338: print/ghostscript10: Update port to 10.05.0.
Mar 13 2025, 7:37 AM

Mar 12 2025

michaelo requested review of D49338: print/ghostscript10: Update port to 10.05.0.
Mar 12 2025, 10:10 PM
michaelo updated the diff for D49327: */*: Rework manpages handling in Samba-related ports.

Address @jrm's comments

Mar 12 2025, 9:45 PM
michaelo added a comment to D49130: certctl: Add support for generating a certificate bundle (CAfile).
In D49130#1124932, @jrm wrote:

Thanks for this. I still had ca_root_nss installed because local_unbound configured with TLS required a certificate bundle. Unbound with TLS is now working without ca_root_nss.

Mar 12 2025, 4:34 PM
michaelo added a comment to D49130: certctl: Add support for generating a certificate bundle (CAfile).
In D49130#1124932, @jrm wrote:

Thanks for this. I still had ca_root_nss installed because local_unbound configured with TLS required a certificate bundle. Unbound with TLS is now working without ca_root_nss.

Mar 12 2025, 4:14 PM
michaelo added inline comments to D49327: */*: Rework manpages handling in Samba-related ports.
Mar 12 2025, 4:13 PM
michaelo added a comment to D49294: caroot: update the root bundle.

This looks reasonable to me, thanks! We'll want an associated EN, as well- are you OK with preparing for that?

I must admit that I have no idea how to create an EN. Whould that apply only to stable branches?

So we can MFC these kinds of changes to stable/ branches without overhead, but we then submit EN to get secteam@ to roll them into patch releases following MFC. You can use the pre-existing caroot EN you pointed at for most of the fields, but you'd want to grab a fresh copy of the EN template in case there's some verbiage updates int he parts that we don't fill out: https://www.freebsd.org/security/errata-template.txt -- the completed template then gets attached to a new bugzilla PR for secteam to track (I think we can just file a new "Base System" > misc PR for "Bundled caroot in existing releases is out of date", attach the template then assign it to secteam@ with the "needs_errata" flag set).

Mar 12 2025, 1:22 PM
michaelo added a comment to D49294: caroot: update the root bundle.

Are you talking about https://www.freebsd.org/security/advisories/FreeBSD-EN-23:11.caroot.asc?

Mar 12 2025, 1:07 PM
michaelo added a comment to D49294: caroot: update the root bundle.

This looks reasonable to me, thanks! We'll want an associated EN, as well- are you OK with preparing for that?

Mar 12 2025, 1:04 PM
michaelo added a comment to D49294: caroot: update the root bundle.

Guys, can you have a look?

Mar 12 2025, 10:49 AM
michaelo closed D49299: net/samba4{19,20}: Rework manpages handling.

Followup review: https://reviews.freebsd.org/D49327

Mar 12 2025, 9:17 AM
michaelo requested review of D49327: */*: Rework manpages handling in Samba-related ports.
Mar 12 2025, 9:16 AM
michaelo committed R11:6cbfa0518c35: net/samba4{19,20}: Rework manpages handling (authored by michaelo).
net/samba4{19,20}: Rework manpages handling
Mar 12 2025, 9:03 AM

Mar 11 2025

michaelo added a comment to D49299: net/samba4{19,20}: Rework manpages handling.

Is there any action required by the administrator from this change? E.g., they'll just seamlessly have updated manpages?

Mar 11 2025, 6:33 AM

Mar 10 2025

michaelo added a comment to D49299: net/samba4{19,20}: Rework manpages handling.

Just tested devel/talloc, suffers from the same problem as net/samba4*, another manpage is installed. When XSLTPROC is properly disabled, the build fails. So, I guess, several, at least, other Samba-related ports require fixing.

Mar 10 2025, 8:38 PM
michaelo updated the diff for D49299: net/samba4{19,20}: Rework manpages handling.

Enable MANPAGES by default

Mar 10 2025, 8:13 PM
michaelo added a comment to D49299: net/samba4{19,20}: Rework manpages handling.

These seem MANPAGES not to have on by default:

./audio/libsndfile/Makefile
./databases/ldb25/Makefile
./databases/ldb28/Makefile
./databases/ldb29/Makefile
./databases/libmemcached/Makefile
./databases/pxlib/Makefile
./databases/tdb/Makefile
./databases/tdb1410/Makefile
./deskutils/xdg-desktop-portal/Makefile
./deskutils/xdg-terminal-exec/Makefile
./devel/json-glib/Makefile
./devel/ocaml-dolmen/Makefile
./devel/schilybase/Makefile
./devel/talloc/Makefile
./devel/talloc242/Makefile
./devel/tcllib/Makefile
./devel/tevent/Makefile
./devel/tevent016/Makefile
./devel/universal-ctags/Makefile
./graphics/libavif/Makefile
./math/alt-ergo/Makefile
./multimedia/dvdauthor/Makefile
./ports-mgmt/appstream-generator/Makefile
./security/git-crypt/Makefile
./sysutils/conky/Makefile
./sysutils/gnome-power-manager/Makefile
./sysutils/polkit/Makefile
Mar 10 2025, 7:06 PM
michaelo added a comment to D49299: net/samba4{19,20}: Rework manpages handling.
In D49299#1124382, @jrm wrote:

Do we want to go from installing man pages by default to not installing them by default?

There used to be a section in the Porter's Handbook that said something along the lines of man pages should be unconditionally installed. (If it's still there, I can't find it.) I think options like MANPAGES were added as an exception for when generating the man pages requires some bloated dependency. I recall @mat has strong opinions about this, so I'll add him here.

Mar 10 2025, 6:53 PM
michaelo updated subscribers of D46716: periodic 100.chksetuid: supress output if diff is purely whitespace.

@phk This is what I was writing you privately...

Mar 10 2025, 12:40 PM
michaelo closed D49117: www/wget2: Rename HTTP2 option.
Mar 10 2025, 12:10 PM
michaelo committed R11:9537b429308c: www/wget2: Rename HTTP2 option (authored by michaelo).
www/wget2: Rename HTTP2 option
Mar 10 2025, 12:10 PM
michaelo closed D49118: www/{lib,}nghttp2: Improve descriptions.
Mar 10 2025, 12:07 PM
michaelo committed R11:4fc8ab499f44: www/{lib,}nghttp2: Improve descriptions (authored by michaelo).
www/{lib,}nghttp2: Improve descriptions
Mar 10 2025, 12:07 PM

Mar 8 2025

michaelo requested review of D49299: net/samba4{19,20}: Rework manpages handling.
Mar 8 2025, 11:02 PM
michaelo added a reverting change for rGb14cfdf665bb: sh(1): Discourage use of -e.: rG7bd8da72c581: sh(1): Replace recommendation of use of -e with a note.
Mar 8 2025, 4:14 PM
michaelo closed D45073: sh(1): Replace recommendation of use of -e with a note.
Mar 8 2025, 4:14 PM
michaelo committed rG7bd8da72c581: sh(1): Replace recommendation of use of -e with a note (authored by michaelo).
sh(1): Replace recommendation of use of -e with a note
Mar 8 2025, 4:14 PM
michaelo updated the summary of D49294: caroot: update the root bundle.
Mar 8 2025, 4:02 PM
michaelo updated the diff for D49294: caroot: update the root bundle.

Remove also expired untrusted roots

Mar 8 2025, 4:01 PM
michaelo requested review of D49294: caroot: update the root bundle.
Mar 8 2025, 3:42 PM
michaelo closed D49075: caroot: Ignore soft distrust of server CA certificates after 398 days.
Mar 8 2025, 3:35 PM
michaelo committed rG457c03b397c8: caroot: Ignore soft distrust of server CA certificates after 398 days (authored by michaelo).
caroot: Ignore soft distrust of server CA certificates after 398 days
Mar 8 2025, 3:35 PM
michaelo added a comment to D45073: sh(1): Replace recommendation of use of -e with a note.

@jrm , do you accept your own proposal formally?

Mar 8 2025, 3:30 PM

Mar 7 2025

michaelo committed R11:093b0eb52a7e: lang/rust: Make OpenSSL use the system default truststore in Cargo (authored by michaelo).
lang/rust: Make OpenSSL use the system default truststore in Cargo
Mar 7 2025, 6:02 PM
michaelo closed D49120: lang/rust: Make OpenSSL use the system default truststore in Cargo.
Mar 7 2025, 5:45 PM
michaelo committed R11:078082660317: lang/rust: Make OpenSSL use the system default truststore in Cargo (authored by michaelo).
lang/rust: Make OpenSSL use the system default truststore in Cargo
Mar 7 2025, 5:45 PM
michaelo added a comment to D49120: lang/rust: Make OpenSSL use the system default truststore in Cargo.

Mentors, any opinion?

Mar 7 2025, 5:14 PM
michaelo added a comment to D49120: lang/rust: Make OpenSSL use the system default truststore in Cargo.

Hope to remove patch when upstream accepts it.

Mar 7 2025, 5:12 PM

Mar 6 2025

michaelo added a comment to D45073: sh(1): Replace recommendation of use of -e with a note.

I think this communicates an important caveat in a terse, informative, and specific way.

Mar 6 2025, 6:34 PM
michaelo added a comment to D49191: shells/bash-static: Exclude PORTS_READLINE and NLS options with STATIC.

@ehaupt, do you want to close this out as a user problem and not a port problem?

Yes. I'd like to do that. If the user wants to have a static version without any port readline or gettext he can simply rebuild shells/bash-static without those options. Sure, no pre-built pkgs but that's just the way it is.

Mar 6 2025, 11:07 AM
michaelo added a comment to D49191: shells/bash-static: Exclude PORTS_READLINE and NLS options with STATIC.

@ehaupt, do you want to close this out as a user problem and not a port problem?

Mar 6 2025, 10:02 AM
michaelo added a comment to D49120: lang/rust: Make OpenSSL use the system default truststore in Cargo.

Rust maintainers, please have a look. This is quite annoying issue especially because it is hard to diagnose from a high level perspective.

Mar 6 2025, 9:59 AM
michaelo added a comment to D45073: sh(1): Replace recommendation of use of -e with a note.

Recommendation is out, have another look.

Mar 6 2025, 9:56 AM