Overview
Comment: | Fix missing URNs in the PackageDownloader::useServerId procedure. Add comments. |
---|---|
Downloads: | Tarball | ZIP archive | SQL archive |
Timelines: | family | ancestors | descendants | both | trunk |
Files: | files | file ages | folders |
SHA1: |
6a9d5b82b4b57ebf231a83fc523a2391 |
User & Date: | mistachkin on 2017-07-05 21:15:22 |
Other Links: | manifest | tags |
Context
2017-07-21
| ||
21:55 | Move all the package files into the 'packages' sub-directory. check-in: 4a0a76829e user: mistachkin tags: trunk | |
2017-07-05
| ||
21:15 | Fix missing URNs in the PackageDownloader::useServerId procedure. Add comments. check-in: 6a9d5b82b4 user: mistachkin tags: trunk | |
2017-07-01
| ||
21:32 | Make the HelloWorld package index more cross-platform. check-in: 333c76413b user: mistachkin tags: trunk | |
Changes
Modified client/1.0/neutral/pkgd.eagle from [1436a2a861] to [f75ad80cb6].
︙ | ︙ | |||
38 39 40 41 42 43 44 | } # # NOTE: The fallback URN, relative to the base URI, where the Package # Signing Keys may be downloaded. This should only be used when # the primary URN did not produce valid data. # | | | | | 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 | } # # NOTE: The fallback URN, relative to the base URI, where the Package # Signing Keys may be downloaded. This should only be used when # the primary URN did not produce valid data. # variable openPgpKeyUrnFallback1; # DEFAULT: pkg_keys_mirror_1 if {$force || ![info exists openPgpKeyUrnFallback1]} then { set openPgpKeyUrnFallback1 pkg_keys_mirror_1 } # # NOTE: The URN, relative to the base URI, where a login request may # be sent. # variable loginUrn; # DEFAULT: pkgd_login |
︙ | ︙ | |||
135 136 137 138 139 140 141 | # # NOTE: The fallback URI where the Package Signing Keys may be # downloaded. This should return a payload containing the OpenPGP # key data. This should only be used when the primary URN did not # produce valid OpenPGP key data. # | | | | 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 | # # NOTE: The fallback URI where the Package Signing Keys may be # downloaded. This should return a payload containing the OpenPGP # key data. This should only be used when the primary URN did not # produce valid OpenPGP key data. # variable openPgpKeyUriFallback; # DEFAULT: .../${openPgpKeyUrnFallback1} if {$force || ![info exists openPgpKeyUriFallback]} then { set openPgpKeyUriFallback {${baseUri}/${openPgpKeyUrnFallback1}} } # # NOTE: The URI where a login request may be sent. This should return a # payload containing the necessary HTTP(S) cookie information. # variable loginUri; # DEFAULT: ${baseUri}/${loginUrn}?... |
︙ | ︙ | |||
312 313 314 315 316 317 318 319 320 321 322 323 | # a letter. # # <public> proc useServerId { {serverId ""} } { variable downloadUrn variable loginUrn variable logoutUrn ::PackageRepository::verifyServerId $serverId if {[string length $serverId] > 0} then { # | > > > | | | | > > > > > > > | 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 | # a letter. # # <public> proc useServerId { {serverId ""} } { variable downloadUrn variable loginUrn variable logoutUrn variable openPgpKeyUrn variable openPgpKeyUrnFallback1 variable platformsUrn ::PackageRepository::verifyServerId $serverId if {[string length $serverId] > 0} then { # # NOTE: Reset the URN variables to values that should cause # the specified server Id to be used (assume the server # Id itself is valid and active). # # HACK: These prefixes are hard-coded and must be manually kept # synchronized with those in the setupDownloadServerVars # procedure. # set downloadUrn [appendArgs pkgd_file_ $serverId] set loginUrn [appendArgs pkgd_login_ $serverId] set logoutUrn [appendArgs pkgd_logout_ $serverId] set openPgpKeyUrn [appendArgs pkg_keys_ $serverId] set openPgpKeyUrnFallback1 [appendArgs pkg_keys_mirror_1_ $serverId] set platformsUrn [appendArgs pkgd_platforms_ $serverId] } else { # # NOTE: Forcibly reset URN variables to their default values. # setupDownloadServerVars true } } |
︙ | ︙ | |||
518 519 520 521 522 523 524 | # # <internal> proc downloadAndSaveOpenPgpKeyFile { fileName } { variable baseUri variable openPgpKeyUri variable openPgpKeyUriFallback variable openPgpKeyUrn | | | 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 | # # <internal> proc downloadAndSaveOpenPgpKeyFile { fileName } { variable baseUri variable openPgpKeyUri variable openPgpKeyUriFallback variable openPgpKeyUrn variable openPgpKeyUrnFallback1 set errors [list] foreach substUri [list $openPgpKeyUri $openPgpKeyUriFallback] { # # NOTE: Attempt to download the Package Signing Keys using the # configured URI. |
︙ | ︙ |
Modified client/1.0/neutral/pkgd.eagle.asc from [052c5a500c] to [51806b9a69].
1 2 3 4 | -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 Comment: Eagle Package Repository | | | | | | | | | | | | | | | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 | -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 Comment: Eagle Package Repository iQIcBAABCAAGBQJZXVbRAAoJEFAslq9JXcLZbLsQAMFZs0051Kv+nZBDbDRhqHIm +zoHA50Grc7EQAmAsI5p7jnk8a5gCy0iToIykdxKAozYcJZP7YDWNvpTzc3GDBNA nNIJpZYRAoQB/ZH9WnlCuIFUXttyY+qtyYUJ92P2c8pPCX1xdVCZck1COGLvOU8f ZyoUCaYbK+2hHh5GoZMapuJnB7Vf4ahPSXHYCwwadWNmQY464ZfwppzqcuZX+6rj KQoR9xfBT6aGkT9cdK5wtIJnW2my5iZTA8Yu3KUQ4TiWmIah3D4NISehQwQa6370 IomaLeKpusC5+N29TKMvWLoeaJXT72xdgjcKkqesFq4uqLMZDA6OMGq09VP/sNP6 OQf1FcF6fzqq/nqXZpnMItiwwNZYfuS1PrvNDkxw02QYC0r3kDFb4wFLKZO0BbZ9 KW8m+chWCp6SECbGI7j3UDGSQDe+MeYhHFBE6765gzVh7nAmXA8hn3thL2miuviG 2ZOkKKSXJ8bVDzo8Te9UDmwZu1mkEJw3N9BorX9gGoQ1ZGYZuN75xSMAeK6rDM9h QGckSIAFEp98p+bUTYytOdTRZJ6u5zdgGtDONdRfQ0h5pzfnlyqHU5JoqXWKTgO6 gOwyw+BLW2UGbVsJh8x6nhrEch4QVcOPWtS01PVOD41PaLT14xgDDl6pZiaKdV9M 1C+3VXTYk4mTNls+U4s8 =DPNl -----END PGP SIGNATURE----- |
Modified client/1.0/neutral/pkgd.eagle.harpy from [27a068b050] to [e4290de787].
︙ | ︙ | |||
17 18 19 20 21 22 23 | THE ASSOCIATED SOFTWARE MAY NOT WORK PROPERLY IF THIS FILE IS ALTERED. --> <Certificate xmlns="https://eagle.to/2011/harpy" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema"> <Protocol>None</Protocol> <Vendor>Mistachkin Systems</Vendor> | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 | THE ASSOCIATED SOFTWARE MAY NOT WORK PROPERLY IF THIS FILE IS ALTERED. --> <Certificate xmlns="https://eagle.to/2011/harpy" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema"> <Protocol>None</Protocol> <Vendor>Mistachkin Systems</Vendor> <Id>2d19e162-f160-461d-9d92-4bb3f55fc49f</Id> <HashAlgorithm>SHA512</HashAlgorithm> <EntityType>Script</EntityType> <TimeStamp>2017-07-05T21:13:55.3203125Z</TimeStamp> <Duration>-1.00:00:00</Duration> <Key>0x9559f6017247e3e2</Key> <Signature> wfhPEj1BPnAZC3PXCuO1tVOERdgqinobwKh/VSB4t/zdxY9drYmH3tzm63YfHoLnOKA/qVz8PAlw S3yov1vVGYCJR05sdYaNOeAkDfZoE/t00Sn3NGlljvEIipkPiK9cRc7d3cH+vi0ZodLs62jSw4o6 nd6fOWzv/1jXWXKw203kuevPjfgp9N/ytJ9SjYa32rpg8Tuzl2fFfgoKaPvr6iyVDoVUQrjRIQJw o+U8M4DHdoXQ9sKJks3ab8+rLjVPsli+ui+ijCiXkK12+6yVCSeVeYQfH5Q5Rg0SuyWqxFfYvDMA FovZ8YMOKqRQBu52eYImLnDtWznHWrNpQLz/Rc/sk82v5TWoxakGwE9Ibl14yAfxl4pWdBEfP8Mr BljnEvMUlclPzBHpCX5C0XtX0a8A1NyGckqOR0dcB8ZpEFLqvKwKujoBheYOmv3P8R/r2a58+pn3 MiOZNlX/smQHHo3AEMRBqCyfdB8l3DUb9WvoBcPAeiQIsOik5LN8Vx2EprfeJcPff1DMGoSuTfQa 3Qw/o4wsfeopCD2e6gAIYkZlN8Doataz02ejbg4PCNJ71KyuhuoIPUWG4NuyRv7ia2aOxftYz3ep zjCtA1x27OnhrrUG+Nfn8AKSkQw+5C2TnpL2ioW5xDw0zXq5R2geW7dDT4gI9XeywXUIDqC7rQNU CUk1m674NVFLIHfzFDy6hy3Gwa7qiRpT0MmntZbnUALLtFAF7cGZSG2+kzf1EE0j2BfxZeCppkW6 lJED7TNidnwrSLVjpj3ZrbMfT3gX1Q2zfS06BIhJ5FcllB/d2SVRYmP3aCJymMm/+Z2SSutUTafu bhI3pug5kGig3F1ngrZ3aB4vQAnqzKkvp4zzX4e9pwKMaaNksJF5AZeAzYruFzeNXM4k9rTwGc31 5VZJqAgKQXBT4sqyQygjR0F5x0+7EP2y0R7RNIKQnKdzjNJeVNd9PF3MHd4me6s/nzPw4IRz+IF/ DMqStWeNhGRxUHD3bIUlg4xPI/C1+lnsngPwx/X3j1phwavzbC/EuVGta9xi2qQOdoVysb25tBR6 JYzoj23QjNhR4i/6FUMlunSXq2nL1AjGqHawSau7dqS27to06rFkUbBjYrcKsUyC2is6uuJwPc/u Ps2rWPEivQOxH1WGrmT3SZhKUKeNCSe+4RmSAeHH7zUXjwNGt/lEdKnr3bodphQlQq6UmTZk4TP3 1wg5FwBjvQouCpx7pB62CzBLcI6/MBDy0sg4zVNUtc2Fe4LY5uMoZ0tp748ZXxbKCDyW3HlUhA3T B139NTqH4Yz+41XB6YuApEaO+ieK8Oj45Ok1gu0v75PDeotFb3jOnWbhl3On9GVk//7Uym73BEcY RCmHUFePti6U+3vwqThxEMyFNNtLfHB0rhrXZJz0KEh9dkFGYFZMdRa7po6SgH6PxO1U67jHn0U8 er7V/dGMLYN0KVZH9hn+l1CpKaIaypOZ/fvqstH+BnSPBG56GOdtcmMvOr7U41jABkJrhpPj9Yhf /wS6M4KB4ljQuq4joR3VQH0VnftgR0f/5IcRSbdZ3wcDl3r7oMhzyCXnXa2f2EYPtDySVgmZ0a7O Ts1NwE9BPwsPdWT7gTrqwN6iMSRp1aMzE73u3FToIAObPIn7rmusqktnOpT0NLExHAiGI9xpmfuR b0DQsM08kgyAZDv4/X/iAOUl33sZXLDoDT6RZp3MDoegB2fymW8py2TfGyJq4Iky1qiWKDWOTdPY jt3E/o0GiKGxTvH5dFJjnfSLgYpokBx/x6Cn8fFSbqcTE4NAkXTiF223y7nW1XBQqp0WMQdDWTgf 29+TJUYJs0HoOS/9pH2NbZgkyieQyB4suAlFHLkv2VT2+vwLhe7cQOmkBclQPmyiyczuV8MW2ibM ekCD9VK6cc+0le4g0ALQ4jaOPBaNWphrQcuqnaxwdnh+veDiXAduiUm3aJOiC+UM4kPZGTyisEal gpk9q/wBclxoxGmxs8b1t+WX9xAq6/1ZRvESNCxJp8zlqyOzENdkiTnnRznLKkebUANzstRHXIgF fZsNIidMibHS+LLiUA80YWMtyc82Y+PRf2hpZJYt8VWp39ZiwZvjG1J3c3Do2MGqVmZkmZHD4bMc eZrmne7nWdcJ5uSpP5hLuvb03mh6kB6xGgmfaO/4ZPMWnDPq8DfxDSrZFdsA8RlgFoRwUASI8UiI cTroDAFVFtsuq2C9CP/jKGGVisGYT8bx698W3llzWc5Z8QnbX07Qv8oz2lyC/MkKeD1ixjEIzG/k D8uk5LOrN0jTrPYxmmcuKb8SU/gF+2BgCo6BT/rv++z9vEYipJtKWatnmkD6/luiccEphElxMjjK ljApjdJgOARYz59At0YSW5K39fXhXJ7GBehVSQmNrCOflu4/8NAYOYy2LL9/yhq0ftOljO5rHKul 4FdvtxtkBP5BV08rX9C8xp1goCHscSjdDPxD3GBkcBGWCWfPj8gIPXIcHGjzhXk5tU3LkoCMCDX/ 1XQPvdZWkqdgSrw2c3DHs+4vlx+6VgJ1hg7+gXLPAaqYTsy6tAt/f1FXsirgm1yqVf6hWLYUrvgc oSvz104SujQc7m6z3XBZmkT2cg8ke5yazK1fL5b/U90dywjJQ3znr7UzXND7dsAKI+UAr620NZMF s08E2VDRXMOl3LxZYHEmMYdEzyC0ZeVPkgeBS2yVAK+iESJ765SwCHJK3RI3mkWrESt6Gwc= </Signature> </Certificate> |
Modified client/1.0/neutral/pkgd.eagle.harpy.asc from [5ad4ccd236] to [5359d626ab].
1 2 3 4 | -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 Comment: Eagle Package Repository | | | | | | | | | | | | | | | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 | -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 Comment: Eagle Package Repository iQIcBAABCAAGBQJZXVbSAAoJEFAslq9JXcLZKKMP/2Zxipv35Xi4JAz9gASdYmUN dzd7g+gBxIwVUNwa/CjoFLDmzMqfEjsxcJBqJdjSQsXf3927Gu7/fZWLGf7FIv0t Qj82coqA6qQY9UfSc0g2yLlNA6wNUHvJkmKe/l3Vfy2V8/TJbFpevz3PwMoZh6mW Z2KGGCtTfVMBcDV+E25zOGtQa2vxGFJvvP0F2NQab3LCBPIrzJCQ97snS7E3u61f SWeljqmUUTAzEktj/AMWwBpsNEJwt7KzCgwcJ5IuzsUfLVlZIKKAoOyAcpDNX17k wDscww9nADu8WVSZzRv4lHIvLvZISVnHUVGzCDyOlRtoARg7Aci3ph0S/l0Xc3WV OZ4BiQpUJmqu5cagJHcLth5IHjhBHgpT/c5qJCq9xVVT3WBOeAZH44FbIz/rpr5e lrFPee7NVvBRxq0dNwKYeomKXhueyQ16ZQ70sPlAbu2uNfLXnpmuD6tHB7quEPk+ bHWkebsHTw5EDDUQiBBcGu6OD+Y6oS084PPfv1PEFA3+9459IakUi3qRCbxhs+iq wfHAaYflvxVq446EZKv7/H/kymmMthlWWHn4J5yc0xcSJE3kkie2VobQSSSk4my5 Kjr2d/95Z1eagOUeOLpbYa+qFlAoQ8ETc4Fk2Fl3Kx98c67u4iXzrdeWqqTgBno+ GeaX9Twvi4Skh/YLMLBe =jN/w -----END PGP SIGNATURE----- |