︙ | | | ︙ | |
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
|
}
#
# NOTE: The fallback URN, relative to the base URI, where the Package
# Signing Keys may be downloaded. This should only be used when
# the primary URN did not produce valid data.
#
variable openPgpKeyUrnFallback; # DEFAULT: pkg_keys_mirror_1
if {$force || ![info exists openPgpKeyUrnFallback]} then {
set openPgpKeyUrnFallback pkg_keys_mirror_1
}
#
# NOTE: The URN, relative to the base URI, where a login request may
# be sent.
#
variable loginUrn; # DEFAULT: pkgd_login
|
|
|
|
|
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
|
}
#
# NOTE: The fallback URN, relative to the base URI, where the Package
# Signing Keys may be downloaded. This should only be used when
# the primary URN did not produce valid data.
#
variable openPgpKeyUrnFallback1; # DEFAULT: pkg_keys_mirror_1
if {$force || ![info exists openPgpKeyUrnFallback1]} then {
set openPgpKeyUrnFallback1 pkg_keys_mirror_1
}
#
# NOTE: The URN, relative to the base URI, where a login request may
# be sent.
#
variable loginUrn; # DEFAULT: pkgd_login
|
︙ | | | ︙ | |
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
|
#
# NOTE: The fallback URI where the Package Signing Keys may be
# downloaded. This should return a payload containing the OpenPGP
# key data. This should only be used when the primary URN did not
# produce valid OpenPGP key data.
#
variable openPgpKeyUriFallback; # DEFAULT: .../${openPgpKeyUrnFallback}
if {$force || ![info exists openPgpKeyUriFallback]} then {
set openPgpKeyUriFallback {${baseUri}/${openPgpKeyUrnFallback}}
}
#
# NOTE: The URI where a login request may be sent. This should return a
# payload containing the necessary HTTP(S) cookie information.
#
variable loginUri; # DEFAULT: ${baseUri}/${loginUrn}?...
|
|
|
|
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
|
#
# NOTE: The fallback URI where the Package Signing Keys may be
# downloaded. This should return a payload containing the OpenPGP
# key data. This should only be used when the primary URN did not
# produce valid OpenPGP key data.
#
variable openPgpKeyUriFallback; # DEFAULT: .../${openPgpKeyUrnFallback1}
if {$force || ![info exists openPgpKeyUriFallback]} then {
set openPgpKeyUriFallback {${baseUri}/${openPgpKeyUrnFallback1}}
}
#
# NOTE: The URI where a login request may be sent. This should return a
# payload containing the necessary HTTP(S) cookie information.
#
variable loginUri; # DEFAULT: ${baseUri}/${loginUrn}?...
|
︙ | | | ︙ | |
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
|
# a letter.
#
# <public>
proc useServerId { {serverId ""} } {
variable downloadUrn
variable loginUrn
variable logoutUrn
::PackageRepository::verifyServerId $serverId
if {[string length $serverId] > 0} then {
#
# NOTE: Set the URN variables to values that should cause the
# specified server Id to be used (assume the server Id
# itself is valid and active).
#
set loginUrn [appendArgs pkgd_login_ $serverId]
set downloadUrn [appendArgs pkgd_file_ $serverId]
set logoutUrn [appendArgs pkgd_logout_ $serverId]
} else {
#
# NOTE: Forcibly reset URN variables to their default values.
#
setupDownloadServerVars true
}
}
|
>
>
>
|
|
|
|
>
>
>
>
>
>
>
|
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
|
# a letter.
#
# <public>
proc useServerId { {serverId ""} } {
variable downloadUrn
variable loginUrn
variable logoutUrn
variable openPgpKeyUrn
variable openPgpKeyUrnFallback1
variable platformsUrn
::PackageRepository::verifyServerId $serverId
if {[string length $serverId] > 0} then {
#
# NOTE: Reset the URN variables to values that should cause
# the specified server Id to be used (assume the server
# Id itself is valid and active).
#
# HACK: These prefixes are hard-coded and must be manually kept
# synchronized with those in the setupDownloadServerVars
# procedure.
#
set downloadUrn [appendArgs pkgd_file_ $serverId]
set loginUrn [appendArgs pkgd_login_ $serverId]
set logoutUrn [appendArgs pkgd_logout_ $serverId]
set openPgpKeyUrn [appendArgs pkg_keys_ $serverId]
set openPgpKeyUrnFallback1 [appendArgs pkg_keys_mirror_1_ $serverId]
set platformsUrn [appendArgs pkgd_platforms_ $serverId]
} else {
#
# NOTE: Forcibly reset URN variables to their default values.
#
setupDownloadServerVars true
}
}
|
︙ | | | ︙ | |
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
|
#
# <internal>
proc downloadAndSaveOpenPgpKeyFile { fileName } {
variable baseUri
variable openPgpKeyUri
variable openPgpKeyUriFallback
variable openPgpKeyUrn
variable openPgpKeyUrnFallback
set errors [list]
foreach substUri [list $openPgpKeyUri $openPgpKeyUriFallback] {
#
# NOTE: Attempt to download the Package Signing Keys using the
# configured URI.
|
|
|
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
|
#
# <internal>
proc downloadAndSaveOpenPgpKeyFile { fileName } {
variable baseUri
variable openPgpKeyUri
variable openPgpKeyUriFallback
variable openPgpKeyUrn
variable openPgpKeyUrnFallback1
set errors [list]
foreach substUri [list $openPgpKeyUri $openPgpKeyUriFallback] {
#
# NOTE: Attempt to download the Package Signing Keys using the
# configured URI.
|
︙ | | | ︙ | |