Diff
Not logged in

Differences From Artifact [1436a2a861]:

To Artifact [f75ad80cb6]:


40
41
42
43
44
45

46
47
48


49
50
51
52
53
40
41
42
43
44

45
46


47
48
49
50
51
52
53





-
+

-
-
+
+





    # 
    # NOTE: The fallback URN, relative to the base URI, where the Package 
    #       Signing Keys may be downloaded.  This should only be used when 
    #       the primary URN did not produce valid data. 
    # 
    variable openPgpKeyUrnFallback; # DEFAULT: pkg_keys_mirror_1 
    variable openPgpKeyUrnFallback1; # DEFAULT: pkg_keys_mirror_1 
 
    if {$force || ![info exists openPgpKeyUrnFallback]} then { 
      set openPgpKeyUrnFallback pkg_keys_mirror_1 
    if {$force || ![info exists openPgpKeyUrnFallback1]} then { 
      set openPgpKeyUrnFallback1 pkg_keys_mirror_1 
    } 
 
    # 
    # NOTE: The URN, relative to the base URI, where a login request may 
    #       be sent. 
137
138
139
140
141
142

143
144
145

146
147
148
149
150
137
138
139
140
141

142
143
144

145
146
147
148
149
150





-
+


-
+





    # NOTE: The fallback URI where the Package Signing Keys may be 
    #       downloaded.  This should return a payload containing the OpenPGP 
    #       key data.  This should only be used when the primary URN did not 
    #       produce valid OpenPGP key data. 
    # 
    variable openPgpKeyUriFallback; # DEFAULT: .../${openPgpKeyUrnFallback} 
    variable openPgpKeyUriFallback; # DEFAULT: .../${openPgpKeyUrnFallback1} 
 
    if {$force || ![info exists openPgpKeyUriFallback]} then { 
      set openPgpKeyUriFallback {${baseUri}/${openPgpKeyUrnFallback}} 
      set openPgpKeyUriFallback {${baseUri}/${openPgpKeyUrnFallback1}} 
    } 
 
    # 
    # NOTE: The URI where a login request may be sent.  This should return a 
    #       payload containing the necessary HTTP(S) cookie information. 
314
315
316
317
318



319
320
321
322
323
324
325
326



327
328




329

330



331
332
333
334
335
314
315
316
317
318
319
320
321
322
323
324
325
326



327
328
329
330

331
332
333
334
335
336
337
338
339
340
341
342
343
344
345





+
+
+





-
-
-
+
+
+

-
+
+
+
+

+

+
+
+





  # <public> 
  proc useServerId { {serverId ""} } { 
    variable downloadUrn 
    variable loginUrn 
    variable logoutUrn 
    variable openPgpKeyUrn 
    variable openPgpKeyUrnFallback1 
    variable platformsUrn 
 
    ::PackageRepository::verifyServerId $serverId 
 
    if {[string length $serverId] > 0} then { 
      # 
      # NOTE: Set the URN variables to values that should cause the 
      #       specified server Id to be used (assume the server Id 
      #       itself is valid and active). 
      # NOTE: Reset the URN variables to values that should cause 
      #       the specified server Id to be used (assume the server 
      #       Id itself is valid and active). 
      # 
      set loginUrn [appendArgs pkgd_login_ $serverId] 
      # HACK: These prefixes are hard-coded and must be manually kept 
      #       synchronized with those in the setupDownloadServerVars 
      #       procedure. 
      # 
      set downloadUrn [appendArgs pkgd_file_ $serverId] 
      set loginUrn [appendArgs pkgd_login_ $serverId] 
      set logoutUrn [appendArgs pkgd_logout_ $serverId] 
      set openPgpKeyUrn [appendArgs pkg_keys_ $serverId] 
      set openPgpKeyUrnFallback1 [appendArgs pkg_keys_mirror_1_ $serverId] 
      set platformsUrn [appendArgs pkgd_platforms_ $serverId] 
    } else { 
      # 
      # NOTE: Forcibly reset URN variables to their default values. 
      # 
      setupDownloadServerVars true 
520
521
522
523
524
525

526
527
528
529
530
530
531
532
533
534

535
536
537
538
539
540





-
+





  proc downloadAndSaveOpenPgpKeyFile { fileName } { 
    variable baseUri 
    variable openPgpKeyUri 
    variable openPgpKeyUriFallback 
    variable openPgpKeyUrn 
    variable openPgpKeyUrnFallback 
    variable openPgpKeyUrnFallback1 
 
    set errors [list] 
 
    foreach substUri [list $openPgpKeyUri $openPgpKeyUriFallback] { 
      #