* [PR PATCH] Use system CA Certificates.
@ 2023-03-15 16:50 sgn
2023-06-14 1:59 ` github-actions
2023-06-28 2:07 ` [PR PATCH] [Closed]: " github-actions
0 siblings, 2 replies; 3+ messages in thread
From: sgn @ 2023-03-15 16:50 UTC (permalink / raw)
To: ml
[-- Attachment #1: Type: text/plain, Size: 1257 bytes --]
There is a new pull request by sgn against master on the void-packages repository
https://github.com/sgn/void-packages system-ca-cert
https://github.com/void-linux/void-packages/pull/42787
Use system CA Certificates.
<!-- Uncomment relevant sections and delete options which are not applicable -->
#### Testing the changes
- I tested the changes in this PR: **YES**|**briefly**|**NO**
<!--
#### New package
- This new package conforms to the [package requirements](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#package-requirements): **YES**|**NO**
-->
<!-- Note: If the build is likely to take more than 2 hours, please add ci skip tag as described in
https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration
and test at least one native build and, if supported, at least one cross build.
Ignore this section if this PR is not skipping CI.
-->
<!--
#### Local build testing
- I built this PR locally for my native architecture, (ARCH-LIBC)
- I built this PR locally for these architectures (if supported. mark crossbuilds):
- aarch64-musl
- armv7l
- armv6l-musl
-->
A patch file from https://github.com/void-linux/void-packages/pull/42787.patch is attached
[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-system-ca-cert-42787.patch --]
[-- Type: text/x-diff, Size: 19882 bytes --]
From c9d833affcfca1d2c98ab858938dff8c2d8250a3 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?=C4=90o=C3=A0n=20Tr=E1=BA=A7n=20C=C3=B4ng=20Danh?=
<congdanhqx@gmail.com>
Date: Thu, 9 Mar 2023 10:38:58 +0700
Subject: [PATCH 1/7] python3-certifi: use system cacert
---
.../patches/system-cacert.patch | 53 +++++++++++++++++++
srcpkgs/python3-certifi/template | 9 ++--
2 files changed, 59 insertions(+), 3 deletions(-)
create mode 100644 srcpkgs/python3-certifi/patches/system-cacert.patch
diff --git a/srcpkgs/python3-certifi/patches/system-cacert.patch b/srcpkgs/python3-certifi/patches/system-cacert.patch
new file mode 100644
index 000000000000..7e41029aa1ea
--- /dev/null
+++ b/srcpkgs/python3-certifi/patches/system-cacert.patch
@@ -0,0 +1,53 @@
+--- a/certifi/core.py
++++ b/certifi/core.py
+@@ -10,36 +10,15 @@ import sys
+ if sys.version_info >= (3, 11):
+
+ from importlib.resources import as_file, files
++ from pathlib import Path
+
+- _CACERT_CTX = None
+- _CACERT_PATH = None
++ _CACERT_PATH = '/etc/ssl/certs.pem'
+
+ def where() -> str:
+- # This is slightly terrible, but we want to delay extracting the file
+- # in cases where we're inside of a zipimport situation until someone
+- # actually calls where(), but we don't want to re-extract the file
+- # on every call of where(), so we'll do it once then store it in a
+- # global variable.
+- global _CACERT_CTX
+- global _CACERT_PATH
+- if _CACERT_PATH is None:
+- # This is slightly janky, the importlib.resources API wants you to
+- # manage the cleanup of this file, so it doesn't actually return a
+- # path, it returns a context manager that will give you the path
+- # when you enter it and will do any cleanup when you leave it. In
+- # the common case of not needing a temporary file, it will just
+- # return the file system location and the __exit__() is a no-op.
+- #
+- # We also have to hold onto the actual context manager, because
+- # it will do the cleanup whenever it gets garbage collected, so
+- # we will also store that at the global level as well.
+- _CACERT_CTX = as_file(files("certifi").joinpath("cacert.pem"))
+- _CACERT_PATH = str(_CACERT_CTX.__enter__())
+-
+ return _CACERT_PATH
+
+ def contents() -> str:
+- return files("certifi").joinpath("cacert.pem").read_text(encoding="ascii")
++ return Path(_CACERT_PATH).read_text(encoding="ascii")
+
+ elif sys.version_info >= (3, 7):
+
+--- a/setup.py
++++ b/setup.py
+@@ -41,7 +41,7 @@ setup(
+ 'certifi',
+ ],
+ package_dir={'certifi': 'certifi'},
+- package_data={'certifi': ['*.pem', 'py.typed']},
++ package_data={'certifi': ['py.typed']},
+ # data_files=[('certifi', ['certifi/cacert.pem'])],
+ include_package_data=True,
+ zip_safe=False,
diff --git a/srcpkgs/python3-certifi/template b/srcpkgs/python3-certifi/template
index f58123986d63..c494c9721643 100644
--- a/srcpkgs/python3-certifi/template
+++ b/srcpkgs/python3-certifi/template
@@ -1,7 +1,7 @@
# Template file for 'python3-certifi'
pkgname=python3-certifi
version=2022.09.24
-revision=2
+revision=3
build_style=python3-module
hostmakedepends="python3-setuptools"
depends="python3"
@@ -12,7 +12,10 @@ homepage="https://certifi.io"
distfiles="https://github.com/certifi/python-certifi/archive/${version}.tar.gz"
checksum=8c1db7f2a3b272e8a90b2e1910763930fa81e2512fbb96cb7a25787d63765c78
+post_extract() {
+ rm -f certifi/cacert.pem
+}
+
do_check() {
- cd build/lib
- python3 -c 'import certifi as m; print(m)'
+ python3 -m unittest
}
From 0120e443d873d428acf176a987293a83c1cb5ad0 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?=C4=90o=C3=A0n=20Tr=E1=BA=A7n=20C=C3=B4ng=20Danh?=
<congdanhqx@gmail.com>
Date: Thu, 9 Mar 2023 10:45:29 +0700
Subject: [PATCH 2/7] python3-pip: use system CACert
---
.../python3-pip/patches/system-cacert.patch | 42 +++++++++++++++++++
srcpkgs/python3-pip/template | 6 ++-
2 files changed, 47 insertions(+), 1 deletion(-)
create mode 100644 srcpkgs/python3-pip/patches/system-cacert.patch
diff --git a/srcpkgs/python3-pip/patches/system-cacert.patch b/srcpkgs/python3-pip/patches/system-cacert.patch
new file mode 100644
index 000000000000..28fded3e7b48
--- /dev/null
+++ b/srcpkgs/python3-pip/patches/system-cacert.patch
@@ -0,0 +1,42 @@
+--- a/src/pip/_vendor/certifi/core.py
++++ b/src/pip/_vendor/certifi/core.py
+@@ -10,36 +10,15 @@ import sys
+ if sys.version_info >= (3, 11):
+
+ from importlib.resources import as_file, files
++ from pathlib import Path
+
+- _CACERT_CTX = None
+- _CACERT_PATH = None
++ _CACERT_PATH = '/etc/ssl/certs.pem'
+
+ def where() -> str:
+- # This is slightly terrible, but we want to delay extracting the file
+- # in cases where we're inside of a zipimport situation until someone
+- # actually calls where(), but we don't want to re-extract the file
+- # on every call of where(), so we'll do it once then store it in a
+- # global variable.
+- global _CACERT_CTX
+- global _CACERT_PATH
+- if _CACERT_PATH is None:
+- # This is slightly janky, the importlib.resources API wants you to
+- # manage the cleanup of this file, so it doesn't actually return a
+- # path, it returns a context manager that will give you the path
+- # when you enter it and will do any cleanup when you leave it. In
+- # the common case of not needing a temporary file, it will just
+- # return the file system location and the __exit__() is a no-op.
+- #
+- # We also have to hold onto the actual context manager, because
+- # it will do the cleanup whenever it gets garbage collected, so
+- # we will also store that at the global level as well.
+- _CACERT_CTX = as_file(files("pip._vendor.certifi").joinpath("cacert.pem"))
+- _CACERT_PATH = str(_CACERT_CTX.__enter__())
+-
+ return _CACERT_PATH
+
+ def contents() -> str:
+- return files("pip._vendor.certifi").joinpath("cacert.pem").read_text(encoding="ascii")
++ return Path(_CACERT_PATH).read_text(encoding="ascii")
+
+ elif sys.version_info >= (3, 7):
+
diff --git a/srcpkgs/python3-pip/template b/srcpkgs/python3-pip/template
index 5f928c3b6df1..66afa47f72f4 100644
--- a/srcpkgs/python3-pip/template
+++ b/srcpkgs/python3-pip/template
@@ -1,7 +1,7 @@
# Template file for 'python3-pip'
pkgname=python3-pip
version=23.0.1
-revision=1
+revision=2
build_style=python3-module
hostmakedepends="python3-setuptools"
depends="python3-setuptools"
@@ -15,6 +15,10 @@ checksum=cd015ea1bfb0fcef59d8a286c1f8bebcb983f6317719d415dc5351efb7cd7024
# Tests have unpackaged dependencies
make_check=no
+post_extract() {
+ rm -f src/pip/_vendor/certifi/cacert.pem
+}
+
post_install() {
vlicense LICENSE.txt
ln -s pip3 "${DESTDIR}/usr/bin/pip"
From 6f821a951a6c858cb59c53dc8a9d0b0d844894b0 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?=C4=90o=C3=A0n=20Tr=E1=BA=A7n=20C=C3=B4ng=20Danh?=
<congdanhqx@gmail.com>
Date: Thu, 9 Mar 2023 10:56:09 +0700
Subject: [PATCH 3/7] python-pip: use system CACert
---
.../python-pip/patches/system-cacert.patch | 68 +++++++++++++++++++
srcpkgs/python-pip/template | 6 +-
2 files changed, 73 insertions(+), 1 deletion(-)
create mode 100644 srcpkgs/python-pip/patches/system-cacert.patch
diff --git a/srcpkgs/python-pip/patches/system-cacert.patch b/srcpkgs/python-pip/patches/system-cacert.patch
new file mode 100644
index 000000000000..7814bdb742d9
--- /dev/null
+++ b/srcpkgs/python-pip/patches/system-cacert.patch
@@ -0,0 +1,68 @@
+--- a/src/pip/_vendor/certifi/core.py
++++ b/src/pip/_vendor/certifi/core.py
+@@ -8,53 +8,18 @@ This module returns the installation loc
+ """
+ import os
+
+-try:
+- from importlib.resources import path as get_path, read_text
+-
+- _CACERT_CTX = None
+- _CACERT_PATH = None
+-
+- def where():
+- # This is slightly terrible, but we want to delay extracting the file
+- # in cases where we're inside of a zipimport situation until someone
+- # actually calls where(), but we don't want to re-extract the file
+- # on every call of where(), so we'll do it once then store it in a
+- # global variable.
+- global _CACERT_CTX
+- global _CACERT_PATH
+- if _CACERT_PATH is None:
+- # This is slightly janky, the importlib.resources API wants you to
+- # manage the cleanup of this file, so it doesn't actually return a
+- # path, it returns a context manager that will give you the path
+- # when you enter it and will do any cleanup when you leave it. In
+- # the common case of not needing a temporary file, it will just
+- # return the file system location and the __exit__() is a no-op.
+- #
+- # We also have to hold onto the actual context manager, because
+- # it will do the cleanup whenever it gets garbage collected, so
+- # we will also store that at the global level as well.
+- _CACERT_CTX = get_path("pip._vendor.certifi", "cacert.pem")
+- _CACERT_PATH = str(_CACERT_CTX.__enter__())
+-
+- return _CACERT_PATH
+-
+-
+-except ImportError:
+- # This fallback will work for Python versions prior to 3.7 that lack the
+- # importlib.resources module but relies on the existing `where` function
+- # so won't address issues with environments like PyOxidizer that don't set
+- # __file__ on modules.
+- def read_text(_module, _path, encoding="ascii"):
+- with open(where(), "r", encoding=encoding) as data:
+- return data.read()
+-
+- # If we don't have importlib.resources, then we will just do the old logic
+- # of assuming we're on the filesystem and munge the path directly.
+- def where():
+- f = os.path.dirname(__file__)
+-
+- return os.path.join(f, "cacert.pem")
+-
++# This fallback will work for Python versions prior to 3.7 that lack the
++# importlib.resources module but relies on the existing `where` function
++# so won't address issues with environments like PyOxidizer that don't set
++# __file__ on modules.
++def read_text(_module, _path, encoding="ascii"):
++ with open(where(), "r", encoding=encoding) as data:
++ return data.read()
++
++# If we don't have importlib.resources, then we will just do the old logic
++# of assuming we're on the filesystem and munge the path directly.
++def where():
++ return '/etc/ssl/certs.pem'
+
+ def contents():
+ return read_text("certifi", "cacert.pem", encoding="ascii")
diff --git a/srcpkgs/python-pip/template b/srcpkgs/python-pip/template
index 00d8875f2f9e..7e50aa7caadf 100644
--- a/srcpkgs/python-pip/template
+++ b/srcpkgs/python-pip/template
@@ -1,7 +1,7 @@
# Template file for 'python-pip'
pkgname=python-pip
version=20.3.4
-revision=1
+revision=2
build_style=python2-module
hostmakedepends="python-setuptools"
depends="python-setuptools"
@@ -13,6 +13,10 @@ changelog="https://raw.githubusercontent.com/pypa/pip/master/NEWS.rst"
distfiles="${PYPI_SITE}/p/pip/pip-${version}.tar.gz"
checksum=6773934e5f5fc3eaa8c5a44949b5b924fc122daa0a8aa9f80c835b4ca2a543fc
+post_extract() {
+ rm -f src/pip/_vendor/certifi/cacert.pem
+}
+
post_install() {
vlicense LICENSE.txt
mv ${DESTDIR}/usr/bin/pip{,2}
From ed9ecba7ecd97cc3264223123051adb9a05d6757 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?=C4=90o=C3=A0n=20Tr=E1=BA=A7n=20C=C3=B4ng=20Danh?=
<congdanhqx@gmail.com>
Date: Thu, 9 Mar 2023 11:04:52 +0700
Subject: [PATCH 4/7] python3-botocore: use system CACert
---
.../patches/system-cacert.patch | 19 +++++++++++++++++++
srcpkgs/python3-botocore/template | 5 +++--
2 files changed, 22 insertions(+), 2 deletions(-)
create mode 100644 srcpkgs/python3-botocore/patches/system-cacert.patch
diff --git a/srcpkgs/python3-botocore/patches/system-cacert.patch b/srcpkgs/python3-botocore/patches/system-cacert.patch
new file mode 100644
index 000000000000..ea4b7057e2d3
--- /dev/null
+++ b/srcpkgs/python3-botocore/patches/system-cacert.patch
@@ -0,0 +1,19 @@
+--- a/botocore/httpsession.py
++++ b/botocore/httpsession.py
+@@ -53,13 +53,10 @@ filter_ssl_warnings()
+ logger = logging.getLogger(__name__)
+ DEFAULT_TIMEOUT = 60
+ MAX_POOL_CONNECTIONS = 10
+-DEFAULT_CA_BUNDLE = os.path.join(os.path.dirname(__file__), 'cacert.pem')
++DEFAULT_CA_BUNDLE = '/etc/ssl/certs.pem'
+
+-try:
+- from certifi import where
+-except ImportError:
+- def where():
+- return DEFAULT_CA_BUNDLE
++def where():
++ return DEFAULT_CA_BUNDLE
+
+
+ def get_cert_path(verify):
diff --git a/srcpkgs/python3-botocore/template b/srcpkgs/python3-botocore/template
index 538c25ed82e5..6a4b16aa7cd4 100644
--- a/srcpkgs/python3-botocore/template
+++ b/srcpkgs/python3-botocore/template
@@ -1,7 +1,7 @@
# Template file for 'python3-botocore'
pkgname=python3-botocore
version=1.24.33
-revision=2
+revision=3
build_style=python3-module
# integration tests want aws credentials
make_check_target="tests/functional tests/unit"
@@ -15,6 +15,7 @@ homepage="https://github.com/boto/botocore"
distfiles="https://github.com/boto/botocore/archive/${version}.tar.gz"
checksum=df97ad5dd13847d2684597798214bc35603c1bd9df7fef04ba5d583cb4229629
-pre_check() {
+post_extract() {
+ rm -f botocore/cacert.pem
rm -r tests/functional/leak # these 6 tests fail, probably fixable
}
From 64dc38019d639f91b40504dc3bb31533b7490cdc Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?=C4=90o=C3=A0n=20Tr=E1=BA=A7n=20C=C3=B4ng=20Danh?=
<congdanhqx@gmail.com>
Date: Thu, 9 Mar 2023 11:08:30 +0700
Subject: [PATCH 5/7] python3-pipenv: use system CA Cert
---
.../patches/system-cacert.patch | 42 +++++++++++++++++++
srcpkgs/python3-pipenv/template | 6 ++-
2 files changed, 47 insertions(+), 1 deletion(-)
create mode 100644 srcpkgs/python3-pipenv/patches/system-cacert.patch
diff --git a/srcpkgs/python3-pipenv/patches/system-cacert.patch b/srcpkgs/python3-pipenv/patches/system-cacert.patch
new file mode 100644
index 000000000000..58a5d4c830e9
--- /dev/null
+++ b/srcpkgs/python3-pipenv/patches/system-cacert.patch
@@ -0,0 +1,42 @@
+--- a/pipenv/patched/pip/_vendor/certifi/core.py
++++ b/pipenv/patched/pip/_vendor/certifi/core.py
+@@ -10,36 +10,15 @@ import sys
+ if sys.version_info >= (3, 11):
+
+ from importlib.resources import as_file, files
++ from pathlib import Path
+
+- _CACERT_CTX = None
+- _CACERT_PATH = None
++ _CACERT_PATH = '/etc/ssl/certs.pem'
+
+ def where() -> str:
+- # This is slightly terrible, but we want to delay extracting the file
+- # in cases where we're inside of a zipimport situation until someone
+- # actually calls where(), but we don't want to re-extract the file
+- # on every call of where(), so we'll do it once then store it in a
+- # global variable.
+- global _CACERT_CTX
+- global _CACERT_PATH
+- if _CACERT_PATH is None:
+- # This is slightly janky, the importlib.resources API wants you to
+- # manage the cleanup of this file, so it doesn't actually return a
+- # path, it returns a context manager that will give you the path
+- # when you enter it and will do any cleanup when you leave it. In
+- # the common case of not needing a temporary file, it will just
+- # return the file system location and the __exit__() is a no-op.
+- #
+- # We also have to hold onto the actual context manager, because
+- # it will do the cleanup whenever it gets garbage collected, so
+- # we will also store that at the global level as well.
+- _CACERT_CTX = as_file(files("pipenv.patched.pip._vendor.certifi").joinpath("cacert.pem"))
+- _CACERT_PATH = str(_CACERT_CTX.__enter__())
+-
+ return _CACERT_PATH
+
+ def contents() -> str:
+- return files("pipenv.patched.pip._vendor.certifi").joinpath("cacert.pem").read_text(encoding="ascii")
++ return Path(_CACERT_PATH).read_text(encoding="ascii")
+
+ elif sys.version_info >= (3, 7):
+
diff --git a/srcpkgs/python3-pipenv/template b/srcpkgs/python3-pipenv/template
index c619da985ef8..5eeebb44f11a 100644
--- a/srcpkgs/python3-pipenv/template
+++ b/srcpkgs/python3-pipenv/template
@@ -1,7 +1,7 @@
# Template file for 'python3-pipenv'
pkgname=python3-pipenv
version=2023.2.4
-revision=1
+revision=2
build_style=python3-pep517
hostmakedepends="python3-wheel"
depends="python3 python3-pip python3-virtualenv python3-virtualenv-clone"
@@ -15,6 +15,10 @@ checksum=18a3eba519e36d59f0d5a7f9c42bd268521e4b9b7b3d1bd6adcf131569323275
conflicts="python-pipenv>=0"
make_check=no # tests are not contained in release tarball
+post_extract() {
+ rm -f pipenv/patched/pip/_vendor/certifi/cacert.pem
+}
+
post_install() {
vlicense LICENSE
}
From fc49224a05f947c666f00f65f65d13e77685d304 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?=C4=90o=C3=A0n=20Tr=E1=BA=A7n=20C=C3=B4ng=20Danh?=
<congdanhqx@gmail.com>
Date: Thu, 9 Mar 2023 11:44:47 +0700
Subject: [PATCH 6/7] perl-Mozilla-CA: use system CA Cert
---
srcpkgs/perl-Mozilla-CA/template | 8 +++++++-
1 file changed, 7 insertions(+), 1 deletion(-)
diff --git a/srcpkgs/perl-Mozilla-CA/template b/srcpkgs/perl-Mozilla-CA/template
index 0ca3767f30f9..12db786b49ed 100644
--- a/srcpkgs/perl-Mozilla-CA/template
+++ b/srcpkgs/perl-Mozilla-CA/template
@@ -1,7 +1,7 @@
# Template file for 'perl-Mozilla-CA'
pkgname=perl-Mozilla-CA
version=20221114
-revision=1
+revision=2
build_style=perl-module
hostmakedepends="perl"
makedepends="${hostmakedepends}"
@@ -12,3 +12,9 @@ license="MPL-2.0"
homepage="https://metacpan.org/release/Mozilla-CA"
distfiles="${CPAN_SITE}/Mozilla/${pkgname/perl-/}-$version.tar.gz"
checksum=701bea67be670add5a102f9f8c879402b4983096b1cb0e20dd47d52d7a10666b
+
+post_install() {
+ rm -f "${DESTDIR}/usr/share/perl5/vendor_perl/Mozilla/CA/cacert.pem"
+ ln -sf /etc/ssl/certs.pem \
+ "${DESTDIR}/usr/share/perl5/vendor_perl/Mozilla/CA/cacert.pem"
+}
From 7ef81b547808c1b7dcfa4c073ba28e06a059ac82 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?=C4=90o=C3=A0n=20Tr=E1=BA=A7n=20C=C3=B4ng=20Danh?=
<congdanhqx@gmail.com>
Date: Thu, 9 Mar 2023 11:59:38 +0700
Subject: [PATCH 7/7] pex: use system CA Cert
---
srcpkgs/pex/template | 25 ++++++++++++++++++++++++-
1 file changed, 24 insertions(+), 1 deletion(-)
diff --git a/srcpkgs/pex/template b/srcpkgs/pex/template
index 359f9d4c53d4..69b7de345edd 100644
--- a/srcpkgs/pex/template
+++ b/srcpkgs/pex/template
@@ -1,7 +1,7 @@
# Template file for 'pex'
pkgname=pex
version=2.1.126
-revision=1
+revision=2
build_style=python3-pep517
hostmakedepends="python3-flit_core python3-Sphinx"
depends="python3"
@@ -13,6 +13,29 @@ changelog="https://raw.githubusercontent.com/pantsbuild/pex/main/CHANGES.rst"
distfiles="${PYPI_SITE}/p/pex/pex-${version}.tar.gz"
checksum=3fcd6cf993815f2a2ad1d826ea194e35bca3c82f485f9886e9e681e400566b15
+post_extract() {
+ rm -f pex/vendor/_vendored/pip/pip/_vendor/certifi/cacert.pem
+ cat <<-EOF >pex/vendor/_vendored/pip/pip/_vendor/certifi/core.py
+ # -*- coding: utf-8 -*-
+ """
+ certifi.py
+ ~~~~~~~~~~
+
+ This module returns the installation location of cacert.pem or its contents.
+ """
+ import os
+ from pathlib import Path
+
+ _CACERT_PATH = '/etc/ssl/certs.pem'
+
+ def where():
+ return _CACERT_PATH
+
+ def contents():
+ return Path(_CACERT_PATH).read_text(encoding="ascii")
+ EOF
+}
+
post_build() {
PYTHONPATH="$PWD" make -C docs man
}
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: Use system CA Certificates.
2023-03-15 16:50 [PR PATCH] Use system CA Certificates sgn
@ 2023-06-14 1:59 ` github-actions
2023-06-28 2:07 ` [PR PATCH] [Closed]: " github-actions
1 sibling, 0 replies; 3+ messages in thread
From: github-actions @ 2023-06-14 1:59 UTC (permalink / raw)
To: ml
[-- Attachment #1: Type: text/plain, Size: 305 bytes --]
New comment by github-actions[bot] on void-packages repository
https://github.com/void-linux/void-packages/pull/42787#issuecomment-1590325978
Comment:
Pull Requests become stale 90 days after last activity and are closed 14 days after that. If this pull request is still relevant bump it or assign it.
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [PR PATCH] [Closed]: Use system CA Certificates.
2023-03-15 16:50 [PR PATCH] Use system CA Certificates sgn
2023-06-14 1:59 ` github-actions
@ 2023-06-28 2:07 ` github-actions
1 sibling, 0 replies; 3+ messages in thread
From: github-actions @ 2023-06-28 2:07 UTC (permalink / raw)
To: ml
[-- Attachment #1: Type: text/plain, Size: 1107 bytes --]
There's a closed pull request on the void-packages repository
Use system CA Certificates.
https://github.com/void-linux/void-packages/pull/42787
Description:
<!-- Uncomment relevant sections and delete options which are not applicable -->
#### Testing the changes
- I tested the changes in this PR: **YES**|**briefly**|**NO**
<!--
#### New package
- This new package conforms to the [package requirements](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#package-requirements): **YES**|**NO**
-->
<!-- Note: If the build is likely to take more than 2 hours, please add ci skip tag as described in
https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration
and test at least one native build and, if supported, at least one cross build.
Ignore this section if this PR is not skipping CI.
-->
<!--
#### Local build testing
- I built this PR locally for my native architecture, (ARCH-LIBC)
- I built this PR locally for these architectures (if supported. mark crossbuilds):
- aarch64-musl
- armv7l
- armv6l-musl
-->
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2023-06-28 2:07 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2023-03-15 16:50 [PR PATCH] Use system CA Certificates sgn
2023-06-14 1:59 ` github-actions
2023-06-28 2:07 ` [PR PATCH] [Closed]: " github-actions
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).