Hello Tim,

On Tue, Jan 28, 2020 at 5:37 AM Tim Orling <ticot...@gmail.com> wrote:
>
>
>
> On Mon, Jan 27, 2020 at 6:47 PM Tim Orling <ticot...@gmail.com> wrote:
>>
>> It's moving from meta-networking, not oe-core. I'll simply change the commit 
>> log locally before merging.
>>
>> On Mon, Jan 27, 2020 at 3:12 PM Andrey Zhizhikin <andre...@gmail.com> wrote:
>>>
>>> dnssec-conf did not receive any updates since 2010 and relies heavily on
>>> python2 code base.
>>>
>>> Move recipe to this layer, since python2 support has been dropped in
>>> oe-core.
>>>
>
> There were missing RDEPENDS which I have fixed and sent to ML (already 
> merged). While I was at it I sent the version of this patch that was actually 
> merged. Obviously nobody has been using this since it could not have worked 
> without the RDEPENDS.

Thanks for taking care of this! Sorry I've missed those RDEPENDS, I
had no possibility to test runtime of this package. But it looks like
it would not have worked even in the the [meta-networking] layer
before (other than people using it would have those packages pulled by
IMAGE_INSTALL).

>
>
>>> Signed-off-by: Andrey Zhizhikin <andre...@gmail.com>
>>> ---
>>>  .../dnssec-conf/dnssec-conf_2.02.bb           | 35 +++++++++++++++++++
>>>  1 file changed, 35 insertions(+)
>>>  create mode 100644 recipes-support/dnssec-conf/dnssec-conf_2.02.bb
>>>
>>> diff --git a/recipes-support/dnssec-conf/dnssec-conf_2.02.bb 
>>> b/recipes-support/dnssec-conf/dnssec-conf_2.02.bb
>>> new file mode 100644
>>> index 0000000..ca59bd2
>>> --- /dev/null
>>> +++ b/recipes-support/dnssec-conf/dnssec-conf_2.02.bb
>>> @@ -0,0 +1,35 @@
>>> +SUMMARY = "DNSSEC and DLV configuration and priming tool"
>>> +DESCRIPTION = "\
>>> +DNSSEC configuration and priming tool. Keys are required until the root \
>>> +is signed, as well as for local unpublished DNSSEC keys to be preloaded \
>>> +into the recursive nameserver. These DNSSEC configuration files can be \
>>> +directly included in the bind or unbound nameserver configuration files. \
>>> +dnssec-conf includes a commandline configuration client for Bind and \
>>> +Unbound, known DNSSEC keys, URL's to official publication pages of keys, \
>>> +and harvested keys, as well a script to harvest DNSKEY's from DNS. \
>>> +See also: system-config-dnssec"
>>> +HOMEPAGE = "https://github.com/xelerance/dnssec-conf";
>>> +SECTION = "net"
>>> +LICENSE = "GPLv2+"
>>> +LIC_FILES_CHKSUM = "file://LICENSE;md5=0636e73ff0215e8d672dc4c32c317bb3"
>>> +DEPENDS += "xmlto-native docbook-xml-dtd4-native \
>>> +            docbook-xsl-stylesheets-native libxslt-native"
>>> +
>>> +SRC_URI = "git://github.com/xelerance/dnssec-conf.git"
>>> +SRCREV = "8e799683736b4a7b5e5e78f98fba0a6f48393537"
>>> +
>>> +S = "${WORKDIR}/git"
>>> +
>>> +do_install () {
>>> +    rm -rf ${D}
>>> +    make PREFIX=${prefix} DESTDIR=${D} ETCDIR=${D}${sysconfdir} install
>>> +    # We no longer ship trust anchors. Most of these are in the DLV 
>>> Registry now.
>>> +    # and it prevents the problem of shipping outdated trust anchors.
>>> +    # For DLV, we ship the ISC DLV Registry key
>>> +    rm -rf ${D}${sysconfdir}/pki/dnssec-keys/harvest/*
>>> +    rm -rf ${D}${sysconfdir}/pki/dnssec-keys/production/reverse/*
>>> +    install -d -m 0755 ${D}${sysconfdir}/sysconfig
>>> +    install -m 0644 packaging/fedora/dnssec.sysconfig 
>>> ${D}${sysconfdir}/sysconfig/dnssec
>>> +}
>>> +
>>> +RDEPENDS_${PN} = "python"
>>> --
>>> 2.17.1
>>>
>>> --
>>> _______________________________________________
>>> Openembedded-devel mailing list
>>> Openembedded-devel@lists.openembedded.org
>>> http://lists.openembedded.org/mailman/listinfo/openembedded-devel



-- 
Regards,
Andrey.
-- 
_______________________________________________
Openembedded-devel mailing list
Openembedded-devel@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-devel

Reply via email to