Re: Macports baresip very out of date

2021-10-02 Thread Mark Lucas
Ryan

With many thanks to (I assume) the maintainer the package has already been 
updated to the latest version.

> On 2 Oct 2021, at 09:41, Ryan Schmidt  wrote:
> 
> On Sep 8, 2021, at 08:37, Mark Lucas wrote:
> 
>> The version of baresip on MacPorts appears to be *very* out of date (v 
>> 0.6.0_3) The MacPorts package info Homepage URL for baresip is dead. 
>> The project appears to have moved to GitHub - 
>> https://github.com/baresip/baresip and seems to under active development 
>> currently standing at version 1.1.0
>> Any chance of updating the MacPorts version?
> 
> You can file a ticket in the issue tracker requesting a port update, or you 
> can perform the update yourself and submit it to us as a pull request.
> 
> 



Re: Does MacPorts need ALL of Xcode?

2021-10-02 Thread Ryan Schmidt
On Oct 3, 2021, at 00:08, Ian Wadham wrote:

> OK, thanks Ryan, but how about https://guide.macports.org/#installing.xcode ?
> 
> It explicitly says to install Xcode first, as a dependency of MacPorts, and 
> then do xcode-select —install, which is what I have been doing for 10 years 
> or more as a MacPorts user. And I suppose almost all other MacPorts users 
> have too.
> 
> But in that time Xcode has grown from a gigabyte or two to 20 Gb on my 
> current MacOS, Catalina 10.15.7. That is a significant slice of the SSD 
> storage in a shop-standard MacBook Pro. So if a user does not need Xcode as a 
> prerequisite of MacPorts, he/she should not have to carry the time and space 
> overheads of downloading, installing and storing it.
> 
> My question then is please can https://guide.macports.org/#installing.xcode 
> be re-written to help users who do not need Xcode for any other reason?

Yes, it can. Anyone can contribute updates to the documentation by submitting a 
pull request. Much of the Guide has not been updated in over a decade and is in 
dire need of rewrites or replacement.


>>> Couldn’t those ports list Xcode as a build dependency?
>> 
>> They do, by using this keyword:
>> 
>> use_xcode yes
> 
> Chris Jones raised the point on 26/27 September on this thread that some 
> ports require Xcode and gave this as the reason for MacPorts requiring Xcode.
> 
> But how many ports are involved here? What percentage of users are likely to 
> need them? And what is the worst that can happen to a user if he/she happens 
> to run into one and does not have Xcode installed?

MacPorts will print a message saying Xcode is required to install that port.


> I tried port search use_xcode to try and shed some light on these questions, 
> but it gave "no match … found”.

"port search" does not do a search of the entire literal contents of portfiles, 
but you can use grep to do that.

Ports that include the xcode portgroup also most probably require Xcode. I 
would have thought that the xcode 1.0 portgroup would declare "use_xcode yes" 
somewhere in it, but it doesn't seem to. Maybe that is an oversight.

According to this:

port file all | sort -u | xargs grep -El 
'^[[:space:]]*(use_xcode[[:space:]]yes|PortGroup[[:space:]]+xcode[[:space:]])' 
| wc -l

there are around 180 ports that require Xcode. There may be others that require 
Xcode but that do not so indicate yet.




Re: ImportError: Couldn't locate OpenSlide dylib. Is OpenSlide installed?

2021-10-02 Thread Benjamin Gilbert
On Sat, Oct 2, 2021 at 11:56 PM Ryan Schmidt 
wrote:

> [...]
>

Hi Ryan,

I believe David's issue was addressed in
https://trac.macports.org/ticket/63492.

--Benjamin Gilbert


Re: Does MacPorts need ALL of Xcode?

2021-10-02 Thread Ian Wadham


> On 2 Oct 2021, at 6:20 pm, Ryan Schmidt  wrote:
> 
> On Sep 27, 2021, at 16:36, Ian Wadham wrote:
> 
>> So what is the “recipe” to install just the CLT with no version of Xcode 
>> present? And can that recipe be included in the MacPorts Guide?
> 
> Run
> 
> xcode-select --install
> 
> and click the button to install the command line tools.
> 
> Or download the command line tools installer from the Apple Developer 
> Downloads web site.

OK, thanks Ryan, but how about https://guide.macports.org/#installing.xcode ?

It explicitly says to install Xcode first, as a dependency of MacPorts, and 
then do xcode-select —install, which is what I have been doing for 10 years or 
more as a MacPorts user. And I suppose almost all other MacPorts users have too.

But in that time Xcode has grown from a gigabyte or two to 20 Gb on my current 
MacOS, Catalina 10.15.7. That is a significant slice of the SSD storage in a 
shop-standard MacBook Pro. So if a user does not need Xcode as a prerequisite 
of MacPorts, he/she should not have to carry the time and space overheads of 
downloading, installing and storing it.

My question then is please can https://guide.macports.org/#installing.xcode be 
re-written to help users who do not need Xcode for any other reason?

>> Couldn’t those ports list Xcode as a build dependency?
> 
> They do, by using this keyword:
> 
> use_xcode yes

Chris Jones raised the point on 26/27 September on this thread that some ports 
require Xcode and gave this as the reason for MacPorts requiring Xcode.

But how many ports are involved here? What percentage of users are likely to 
need them? And what is the worst that can happen to a user if he/she happens to 
run into one and does not have Xcode installed?

I tried port search use_xcode to try and shed some light on these questions, 
but it gave "no match … found”.

Cheers,
Ian Waham.




Re: ImportError: Couldn't locate OpenSlide dylib. Is OpenSlide installed?

2021-10-02 Thread Ryan Schmidt
Please write to list addresses at lists.macports.org, not at the old hostname 
that we discontinued using in late 2016.


On Sep 13, 2021, at 15:40, Epstein, David wrote:
> 
> MacPorts base version 2.7.1 installed
> MacOs 11.5.2
> MacBook Pro (Retina, 15-inch, Mid 2015)
> 
> I get the error message in the Subject Line. So I looked at the discussion at 
> https://github.com/openslide/openslide-python/issues/27
> and carefully followed all the advice given there, but the error persists.
> 
> bgilbert locked the topic on github in December 2019, saying that the problem 
> was resolved. He also said:
> "This is likely to be a problem with your installation, so I'll close. If 
> you're still seeing this with OpenSlide installed in your library search 
> path, please reopen.” I don’t know how one can reopen a locked topic on 
> Github. Perhaps this will do the trick.

I would guess you cannot reopen someone else's issue unless you are a member of 
the project.


> Here is the command I gave to macports, and the response from macports.This 
> seems to mean that openslide file(s) are installed,


> $ port search openslide
> openslide @3.4.1_1 (graphics)
> A C library for reading virtual slides.
> 
> py-openslide @1.1.2_1 (python, graphics)
> Python binding for the OpenSlide library.
> 
> py27-openslide @1.1.2_1 (python, graphics)
> Python binding for the OpenSlide library.
> 
> py34-openslide @1.1.2_1 (python, graphics)
> Obsolete port, replaced by py35-openslide
> 
> py35-openslide @1.1.2_1 (python, graphics)
> Python binding for the OpenSlide library.
> 
> py36-openslide @1.1.2_1 (python, graphics)
> Python binding for the OpenSlide library.
> 
> py37-openslide @1.1.2_1 (python, graphics)
> Python binding for the OpenSlide library.
> 
> py38-openslide @1.1.2_1 (python, graphics)
> Python binding for the OpenSlide library.
> 
> py39-openslide @1.1.2_1 (python, graphics)
> Python binding for the OpenSlide library.
> 
> Found 9 ports.

"port search" shows you what ports are available. It does not say anything 
about whether they are installed. "port installed" tells you what ports are 
installed.


> but is there a way of checking further,

"port contents" tells you the files MacPorts believes it has installed for a 
port. You can verify that the list contains the right files. You can then 
actually check the filesystem and see if the listed files do exist. (Something 
other than MacPorts could have removed the files after MacPorts installed them. 
If so, a "sudo port deactivate" followed by "sudo port activate" should bring 
them back.)


> in particular checking that there is nothing wrong with the files?

How would you define "wrong"? How should MacPorts know if the files are wrong?

MacPorts does include a feature called rev-upgrade which checks one specific 
way in which files could be wrong, specifically whether they are linked with 
libraries that don't exist. This could happen for example when a library 
provided by a dependency is upgraded to a new major version. Port maintainers 
should notice and fix this problem, but sometimes it is overlooked. If this 
situation is discovered, MacPorts automatically rebuilds the ports to fix them. 
rev-upgrade runs automatically after every port installation or upgrade. If 
things are still broken after rebuilding, it tells you that.


> From the discussion on Github, it seems that the problem may be with 
> Macports. I could (very reluctantly) delete my Macports installation and 
> reinstate it. Does anyone have some wise advice?

I don't see any reason why you should uninstall MacPorts for this. I don't 
think that will bring you any closer to solving the problem.

The error message you showed didn't tell us the exact path and name of the 
library it is looking for. Discover that first. Then check if the library 
exists at that path.

If yes, why can't it be used? Does it have the wrong install_name or is it the 
wrong version or broken due to linking with a nonexistent library?

If no, why not? What should be providing that library? Why isn't it?

Or is the issue perhaps that it is not looking for the library in a specific 
path, expecting you instead to be setting DYLD_LIBRARY_PATH to tell it where 
the library is? If so, don't do that; report the problem to the author of the 
software so that they can fix it so that it does not require setting 
DYLD_LIBRARY_PATH. No program should require a user to set DYLD_LIBRARY_PATH. 
Setting DYLD_LIBRARY_PATH will cause other problems.




Re: Let's Encrypt DST Root CA X3 Expiration

2021-10-02 Thread Michael
ugh. Well, doing a search shows a LOT of articles about this very issue -- this 
was apparently a known "this is going to affect a lot of people" deal, and 
"just update your software, or ... sorry." was the only answer.

But, I at least did find out why certs expire. 
Seriously though: A cert identifies a domain. If you sell/buy a domain, you 
want to be able to invalidate all existing certs for that domain.

And as I see that, I'm immediately struck by two things:
1. SSL, and a cert's job, is to validate the connection, not the person on the 
other end. It's to prevent MitM attacks. (Putting the domain name in -- when 
multiple names can go to the same server? Why?)
2. The DNS is the obvious place to put "Here's our fingerprint" or something to 
validate a cert -- that would prevent old owner certs from working. (So why 
isn't this done?)

And I cannot find any good reason for expiring root certs. They explicitly have 
much longer lifespans than anything else, and this isn't the first time that 
root certs have gone poof.

Off the list topic now. Thanks for  your help.

On 2021-10-02, at 8:32 PM, Ryan Schmidt  wrote:

> On Oct 2, 2021, at 22:06, Michael wrote:
>> 
>> So, first, I want to say "Thank you" for this bit:
>> 
>>> • From View menu select "Show Expired Certificates"
>> 
>> In keychain access, I could not see the expired certs, and was thinking that 
>> they were just deleted for being old. Once I could find the old ones, I 
>> could turn them back on.
>> 
>> The second thing is that for whatever reason, I could not download and 
>> install the new cert into keychain access. But ... oddly, Firefox 52 ESR had 
>> that cert installed (even that old ...???). I could export from firefox, and 
>> import THAT into keychain access, and at least enable that for my account.
>> 
>> So, ... well, not perfect. These certs are marked as trusted for *my 
>> account*. Not for the system. So predictably, some things done by the system 
>> in the background will fail, but at least Chrome and Firefox both now work 
>> fine. (Safari isn't tested, but ... well, Safari isn't tested :=-).
>> 
>> 
>> 
>> I have a much better question, that's outside of the scope of this list or 
>> even the site(s) in question.
>> 
>> Why does a signature expire?
>> 
>> If I have something that was signed by a cert, and it was signed in a valid 
>> time time stamp, why does that signature ever expire?
>> 
>> I've come across programs that have an expired signature, and I can't see a 
>> good reason for it.
>> 
>> And if  there's no good way to tell when something was actually signed 
>> (because a timestamp can be forged), then the question becomes, why does a 
>> cert expire as a function of time? Why not allow a cert to be "until 
>> revoked"? 
>> 
>> For that matter, why is "valid/not valid" not under the control of the 
>> system? Why is someone else allowed to say that my system is no longer valid?
>> 
>> I figure that there's a good answer to these questions somewhere, but I have 
>> no clue where to even begin looking. And yes, I know that quantum factoring 
>> will eventually permit all of these certs to be forged, but until then, why 
>> not allow them, and even after that point, why not allow me to allow them?
> 
> I'm not an expert on this stuff, just sharing what I learned about the issue 
> yesterday, but you can ask your search engine questions like "why do 
> certificates expire" or more specifically in this case "why do root ca 
> certificates expire".
> 
> My understanding is that the reason why Let's Encrypt recommends sites 
> continue to serve the ISRG Root X1 certificate that is signed by the expired 
> DST Root CA X3 certificate is that at least old browsers like those on old 
> Android phones should consider a web site's certificate to be valid, as long 
> as we are within its validity dates, even if the root certificate it's signed 
> by is expired. Like I said, I'm not an expert, I don't know why it would be 
> that way, and evidently it's not that way on some Apple devices, so server 
> administrators now have to choose between Let's Encrypt's default which 
> supports old Android devices or the other way which supports old Apple 
> devices.
> 
> 

---
Entertaining minecraft videos
http://YouTube.com/keybounce



Re: Home brew recipes for MacPorts

2021-10-02 Thread Ryan Schmidt
On Oct 2, 2021, at 20:11, André-John Mas wrote:

> Given a number of projects are only available for Homebrew, or only up to 
> date for Homebrew, has any looked at a process for adapting a Homebrew recipe 
> to a MacPorts one? Something like ‘port brew ’? I haven’t thought of 
> all the implications, but I am throwing this out there to see what the 
> thoughts are?

Probably not worth pursuing. Both are package managers but they go about things 
in fundamentally different ways. If something was trivial to add to Homebrew, 
it will probably be trivial to add to MacPorts so an automated conversion would 
not save much time. If it was complex to add to Homebrew, it will probably be 
complex to add to MacPorts and will require manual intervention anyway.

It is certainly worth pursuing adding software to MacPorts that users would 
find useful, whether or not it is in another package manager. Contributions are 
welcome.



Re: Let's Encrypt DST Root CA X3 Expiration

2021-10-02 Thread Ryan Schmidt
On Oct 2, 2021, at 22:06, Michael wrote:
> 
> So, first, I want to say "Thank you" for this bit:
> 
>> • From View menu select "Show Expired Certificates"
> 
> In keychain access, I could not see the expired certs, and was thinking that 
> they were just deleted for being old. Once I could find the old ones, I could 
> turn them back on.
> 
> The second thing is that for whatever reason, I could not download and 
> install the new cert into keychain access. But ... oddly, Firefox 52 ESR had 
> that cert installed (even that old ...???). I could export from firefox, and 
> import THAT into keychain access, and at least enable that for my account.
> 
> So, ... well, not perfect. These certs are marked as trusted for *my 
> account*. Not for the system. So predictably, some things done by the system 
> in the background will fail, but at least Chrome and Firefox both now work 
> fine. (Safari isn't tested, but ... well, Safari isn't tested :=-).
> 
> 
> 
> I have a much better question, that's outside of the scope of this list or 
> even the site(s) in question.
> 
> Why does a signature expire?
> 
> If I have something that was signed by a cert, and it was signed in a valid 
> time time stamp, why does that signature ever expire?
> 
> I've come across programs that have an expired signature, and I can't see a 
> good reason for it.
> 
> And if  there's no good way to tell when something was actually signed 
> (because a timestamp can be forged), then the question becomes, why does a 
> cert expire as a function of time? Why not allow a cert to be "until 
> revoked"? 
> 
> For that matter, why is "valid/not valid" not under the control of the 
> system? Why is someone else allowed to say that my system is no longer valid?
> 
> I figure that there's a good answer to these questions somewhere, but I have 
> no clue where to even begin looking. And yes, I know that quantum factoring 
> will eventually permit all of these certs to be forged, but until then, why 
> not allow them, and even after that point, why not allow me to allow them?

I'm not an expert on this stuff, just sharing what I learned about the issue 
yesterday, but you can ask your search engine questions like "why do 
certificates expire" or more specifically in this case "why do root ca 
certificates expire".

My understanding is that the reason why Let's Encrypt recommends sites continue 
to serve the ISRG Root X1 certificate that is signed by the expired DST Root CA 
X3 certificate is that at least old browsers like those on old Android phones 
should consider a web site's certificate to be valid, as long as we are within 
its validity dates, even if the root certificate it's signed by is expired. 
Like I said, I'm not an expert, I don't know why it would be that way, and 
evidently it's not that way on some Apple devices, so server administrators now 
have to choose between Let's Encrypt's default which supports old Android 
devices or the other way which supports old Apple devices.




Re: Let's Encrypt DST Root CA X3 Expiration

2021-10-02 Thread raf
On Sat, Oct 02, 2021 at 08:06:27PM -0700, Michael  wrote:

> So, first, I want to say "Thank you" for this bit:
> 
> > • From View menu select "Show Expired Certificates"
> 
> In keychain access, I could not see the expired certs, and was
> thinking that they were just deleted for being old. Once I could find
> the old ones, I could turn them back on.

Ah, that explains why I couldn't see it. :-)

> The second thing is that for whatever reason, I could not download
> and install the new cert into keychain access. But ... oddly, Firefox
> 52 ESR had that cert installed (even that old ...???). I could export
> from firefox, and import THAT into keychain access, and at least
> enable that for my account.
> 
> So, ... well, not perfect. These certs are marked as trusted for *my
> account*. Not for the system. So predictably, some things done by the
> system in the background will fail, but at least Chrome and Firefox
> both now work fine. (Safari isn't tested, but ... well, Safari isn't
> tested :=-).

On 10.6.8, I wasn't able to add to the system keychain
via the Keychain Access GUI (even after unlocking it),
but I was able to do it using the "security" command
following these instructions:

  How do I update my root certificates on an older version of Mac OS (e.g. El 
Capitan)?
  
https://apple.stackexchange.com/questions/422332/how-do-i-update-my-root-certificates-on-an-older-version-of-mac-os-e-g-el-capi

If you have ISRG Root X1 as a .pem file, something like this
should import it into the "System" keychain:

  sudo security -v add-trusted-cert -d -r trustRoot -k 
/Library/Keychains/System.keychain isrgrootx1.pem

For the "System Roots" keychain, instead of the "System" keychain:

  sudo security -v add-trusted-cert -d -r trustRoot -k 
/System/Library/Keychains/SystemRootCertificates.keychain isrgrootx1.pem

I don't know if it matters which of these keychains it goes into.

cheers,
raf



Re: Let's Encrypt DST Root CA X3 Expiration

2021-10-02 Thread Michael
So, first, I want to say "Thank you" for this bit:

> • From View menu select "Show Expired Certificates"

In keychain access, I could not see the expired certs, and was thinking that 
they were just deleted for being old. Once I could find the old ones, I could 
turn them back on.

The second thing is that for whatever reason, I could not download and install 
the new cert into keychain access. But ... oddly, Firefox 52 ESR had that cert 
installed (even that old ...???). I could export from firefox, and import THAT 
into keychain access, and at least enable that for my account.

So, ... well, not perfect. These certs are marked as trusted for *my account*. 
Not for the system. So predictably, some things done by the system in the 
background will fail, but at least Chrome and Firefox both now work fine. 
(Safari isn't tested, but ... well, Safari isn't tested :=-).



I have a much better question, that's outside of the scope of this list or even 
the site(s) in question.

Why does a signature expire?

If I have something that was signed by a cert, and it was signed in a valid 
time time stamp, why does that signature ever expire?

I've come across programs that have an expired signature, and I can't see a 
good reason for it.

And if  there's no good way to tell when something was actually signed (because 
a timestamp can be forged), then the question becomes, why does a cert expire 
as a function of time? Why not allow a cert to be "until revoked"? 

For that matter, why is "valid/not valid" not under the control of the system? 
Why is someone else allowed to say that my system is no longer valid?

I figure that there's a good answer to these questions somewhere, but I have no 
clue where to even begin looking. And yes, I know that quantum factoring will 
eventually permit all of these certs to be forged, but until then, why not 
allow them, and even after that point, why not allow me to allow them?

On 2021-10-02, at 7:52 PM, Ryan Schmidt  wrote:

> On Oct 2, 2021, at 10:57, Michael wrote:
>> 
>> Well, thank you for this, and it explains something else.
>> 
>> I've got an older OS (10.9.5), and suddenly Chrome (67 is latest here) has 
>> been complaining left right and center about LOTS of unsafe sites, refusing 
>> to let me connect, etc. Meanwhile, firefox (52 esr) is happy to connect, but 
>> is too old to display a lot of them correctly.
>> 
>> Is there any way for older OS's to declare extended trust for certificates?
> 
> I've added instructions for doing that here:
> 
> https://trac.macports.org/wiki/ProblemHotlist#letsencrypt
> 
> It helped Safari and /usr/bin/curl. I didn't test Chrome; you can let us know 
> if it helps.

---
This message was composed with the aid of a laptop cat, and no mouse



Re: Let's Encrypt DST Root CA X3 Expiration

2021-10-02 Thread Ryan Schmidt
I've added info about this to the problem hotlist including instructions for 
how to add the new ISRG Root X1 certificate to your older Mac manually:


https://trac.macports.org/wiki/ProblemHotlist#letsencrypt


I've done this on our Buildbot machines running OS X 10.11 and earlier which 
should allow them to continue to fetch packages and distfiles.



On Oct 2, 2021, at 04:14, Ryan Schmidt wrote:

> On the web servers we control, we can apparently remove the expired DST Root 
> CA X3 certificate from the chain that we send. That will help those systems 
> that already trust ISRG Root X1. I'm not sure how far back that is.

I have made this change on the buildbot web server. It seems to help OS X 10.11 
and earlier.

We should make the same changes to our other servers. Maybe Rainer or Clemens 
can take care of the hosts on Braeburn. I'll have to see what we need to do to 
get the change onto the distfiles and packages servers and mirrors.




Re: Let's Encrypt DST Root CA X3 Expiration

2021-10-02 Thread raf
On Sat, Oct 02, 2021 at 04:14:05AM -0500, Ryan Schmidt 
 wrote:

> macports.org and other secure web sites that use Let's Encrypt may
> no longer be accessible to you if you use older versions of macOS
> or older browsers or user agents. For example, the libcurl in macOS
> 10.14 can't talk to many Let's Encrypt web sites now, including
> distfiles.macports.org and packages.macports.org, and MacPorts uses
> macOS libcurl to download things. Safari and many browsers don't use
> libcurl so they may be affected differently.
> 
> Let's Encrypt is a free certificate provider used by macports.org
> and many other web sites to provide https encryption. Certificates
> they issue depend on their "ISRG Root X1" certificate which was
> cross-signed by the "DST Root CA X3" certificate, because DST Root
> CA X3 was more widely accepted by browsers when Let's Encrypt got
> started years ago. Both of these root certificates are included in the
> certificate chain served by web sites that use Let's Encrypt.
> 
> ISRG Root X1 itself has been trusted by browsers for some time
> now and DST Root CA X3 expired a couple days ago on September 30,
> 2021. Apparently in order to provide the widest compatibility,
> certificate chains continue to list the old expired root certificate
> after the new one. The idea as I understand it is that browsers should
> see the ISRG Root X1 certificate, realize that it itself is already
> trusted by the OS or browser, and not even look at the next expired
> DST Root CA X3 certificate in the chain.
> 
> They advertised this root certificate expiration as being a very minor
> situation, but unfortunately it seems that a large portion of Apple
> devices cannot deal with this change. On many Macs, it seems that the
> entire certificate chain is being validated, and the expired extra
> root certificate is causing the connection to be disallowed. What
> alerted me to the problem in the first place was seeing many failed
> builds on our Buildbot system due to fetch failures.
> 
> I'm not certain what to do to address this. On the web servers
> we control, we can apparently remove the expired DST Root CA X3
> certificate from the chain that we send. That will help those
> systems that already trust ISRG Root X1. I'm not sure how far back
> that is. For older systems, we can modify master_sites.tcl and
> archive_sites.tcl to change which OS versions try to access our mirror
> servers via https. None of this necessarily helps our build server be
> able to mirror distfiles in the first place. If you have ideas, let me
> know.
> 
> https://letsencrypt.org/docs/dst-root-ca-x3-expiration-september-2021/

There is a discussion on the LetsEncrypt community site
with instructions for installing the ISRG Root X1
certificate on older versions of macOS:

  
https://community.letsencrypt.org/t/connection-errors-on-apple-devices/161107/16

Here are instructions for 10.10 and 10.11:

  
https://community.letsencrypt.org/t/connection-errors-on-apple-devices/161107/25

Here's another approach that worked on 10.9.5 and
10.11.6 (i.e., override the expiry by always trusting
DST Root CA X3:

  
https://community.letsencrypt.org/t/connection-errors-on-apple-devices/161107/28

Here's my approach for 10.6.8 because the above didn't
work (i.e., export root certificates from a later macOS
and import them):

  
https://community.letsencrypt.org/t/connection-errors-on-apple-devices/161107/36

But these are all client-side fixes. The only
server-side fix seems to be to change to a different
certificate authority. I didn't see any mention of
removing the DST Root CA X3 certificate from the chain.
That would probably only work from macOS 10.12 onwards.
ISRG Root X1 is only trusted by macOS since 10.12.
Earlier than that, it needs to be added.

The rest is a bit rambly. It might be best to just
consult the LetsEncrypt community forum above.

I should mention that I didn't notice any problems with
macports on 10.6.8. curl has its own root certificates
and they are fine. And I was able to do an upgrade. But
I might have already installed the ISRG Root X1
certificate at least into my "local" keychain before
trying it (or maybe into the "System" and "System
Roots" keychains).

However, I still don't think that it's entirely OK.
Firefox on 10.6.8 can access macports.org with no
problem (but it certainly wasn't accessing my
LetsEncrypt-certified sites beforehand), but Sarafi
tells me that it can't verify macports.org's identity,
but it still lets me access it. If I quit and restart
Safari, and visit macports.org, it does the same thing.
Firefox uses its own root certificates. Safari uses the
system ones. But I definitely have ISRG Root X1 in both
the "System" and "System Roots" keychains. So I don't
know why Safari has a problem. In Keychain Access, it's
marked as "Always Trust" but it also says "trusted for
macports.org" (I don't know why it says that). That's
confusing. But in Safari, when viewing the certificate,
there was a checkbox 

Home brew recipes for MacPorts

2021-10-02 Thread André-John Mas
Hi,

I have been hesitant in asking this question, but here goes:

Given a number of projects are only available for Homebrew, or only up to date 
for Homebrew, has any looked at a process for adapting a Homebrew recipe to a 
MacPorts one? Something like ‘port brew ’? I haven’t thought of all 
the implications, but I am throwing this out there to see what the thoughts are?

André-John

Sent from my phone. Envoyé depuis mon téléphone. 

Re: MacPorts Only Has ImageMagick 6 not 7?

2021-10-02 Thread Christopher Stone
> On Oct 02, 2021, at 16:58, Bill Cole 
>  wrote:
> On 2021-10-02 at 17:02:20 UTC-0400 (Sat, 2 Oct 2021 16:02:20 -0500) 
> Christopher Stone  is rumored to have said:
>> I'm only seeing ImageMagick @6.9.11-60_1 from MacPorts with `port info`.
> ...
> It is correct, and is entirely unrelated to the LE cert issue.
> 
> There's an open ticket for getting v7 into ports 
> (https://trac.macports.org/ticket/51310) that provides insight to the issues 
> behind the delay.


Hey Bill,

Got it!

Many thanks.


--
Best Regards,
Chris



Re: MacPorts Only Has ImageMagick 6 not 7?

2021-10-02 Thread Bill Cole

On 2021-10-02 at 17:02:20 UTC-0400 (Sat, 2 Oct 2021 16:02:20 -0500)
Christopher Stone 
is rumored to have said:


Hey Folks,

I'm only seeing ImageMagick @6.9.11-60_1 from MacPorts with `port 
info`.


It looks like the most current version is ImageMagick 7.1.0-8.

https://imagemagick.org/

Is this correct, or does this have something to do with the Let's 
Encrypt DST Root CA X3 Expiration issue Ryan reported this morning?


It is correct, and is entirely unrelated to the LE cert issue.

There's an open ticket for getting v7 into ports 
(https://trac.macports.org/ticket/51310) that provides insight to the 
issues behind the delay.




--
Bill Cole
b...@scconsult.com or billc...@apache.org
(AKA @grumpybozo and many *@billmail.scconsult.com addresses)
Not Currently Available For Hire


MacPorts Only Has ImageMagick 6 not 7?

2021-10-02 Thread Christopher Stone
Hey Folks,

I'm only seeing ImageMagick @6.9.11-60_1 from MacPorts with `port info`.

It looks like the most current version is ImageMagick 7.1.0-8.

https://imagemagick.org/

Is this correct, or does this have something to do with the Let's Encrypt DST 
Root CA X3 Expiration issue Ryan reported this morning?

MacPorts 2.7.1
macOS 10.14.6
MacBookAir5,2 · 2 GHz Intel Core i7 · 8GB RAM

TIA.


--
Best Regards,
Chris



Let's Encrypt DST Root CA X3 Expiration

2021-10-02 Thread Ryan Schmidt
macports.org and other secure web sites that use Let's Encrypt may no longer be 
accessible to you if you use older versions of macOS or older browsers or user 
agents. For example, the libcurl in macOS 10.14 can't talk to many Let's 
Encrypt web sites now, including distfiles.macports.org and 
packages.macports.org, and MacPorts uses macOS libcurl to download things. 
Safari and many browsers don't use libcurl so they may be affected differently.

Let's Encrypt is a free certificate provider used by macports.org and many 
other web sites to provide https encryption. Certificates they issue depend on 
their "ISRG Root X1" certificate which was cross-signed by the "DST Root CA X3" 
certificate, because DST Root CA X3 was more widely accepted by browsers when 
Let's Encrypt got started years ago. Both of these root certificates are 
included in the certificate chain served by web sites that use Let's Encrypt.

ISRG Root X1 itself has been trusted by browsers for some time now and DST Root 
CA X3 expired a couple days ago on September 30, 2021. Apparently in order to 
provide the widest compatibility, certificate chains continue to list the old 
expired root certificate after the new one. The idea as I understand it is that 
browsers should see the ISRG Root X1 certificate, realize that it itself is 
already trusted by the OS or browser, and not even look at the next expired DST 
Root CA X3 certificate in the chain.

They advertised this root certificate expiration as being a very minor 
situation, but unfortunately it seems that a large portion of Apple devices 
cannot deal with this change. On many Macs, it seems that the entire 
certificate chain is being validated, and the expired extra root certificate is 
causing the connection to be disallowed. What alerted me to the problem in the 
first place was seeing many failed builds on our Buildbot system due to fetch 
failures.

I'm not certain what to do to address this. On the web servers we control, we 
can apparently remove the expired DST Root CA X3 certificate from the chain 
that we send. That will help those systems that already trust ISRG Root X1. I'm 
not sure how far back that is. For older systems, we can modify 
master_sites.tcl and archive_sites.tcl to change which OS versions try to 
access our mirror servers via https. None of this necessarily helps our build 
server be able to mirror distfiles in the first place. If you have ideas, let 
me know.

https://letsencrypt.org/docs/dst-root-ca-x3-expiration-september-2021/



Re: Macports baresip very out of date

2021-10-02 Thread Ryan Schmidt
On Sep 8, 2021, at 08:37, Mark Lucas wrote:

> The version of baresip on MacPorts appears to be *very* out of date (v 
> 0.6.0_3) The MacPorts package info Homepage URL for baresip is dead. 
> The project appears to have moved to GitHub - 
> https://github.com/baresip/baresip and seems to under active development 
> currently standing at version 1.1.0
> Any chance of updating the MacPorts version?

You can file a ticket in the issue tracker requesting a port update, or you can 
perform the update yourself and submit it to us as a pull request.




Re: How to get a developers' package for Ruby

2021-10-02 Thread Ryan Schmidt
On Sep 21, 2021, at 23:49, Ian Wadham wrote:

> I wish to download from the Web a package called CocoaPods, however it needs 
> a developers’ package of Ruby to build it.
> 
> I am using MacOS Catalina 10.15.7. Apple provides Ruby in this MacOSversion, 
> but will not allow it to be used for building non-Apple apps. They say they 
> are phasing out the use of Ruby in MacOS and Apple Mac apps.
> 
> Googling around about this problem, all the solutions I have found recommend 
> getting a "ruby-dev" package from Homebrew, but MacPorts, which I use a lot, 
> recommends against mixing MacPorts and Homebrew.

Some other package managers observe a distinction between "runtime" and 
"development" packages, with the latter having a "-dev" suffix. MacPorts does 
not observe such a distinction. All packages in MacPorts contain both the 
runtime and development parts, to the extent that each software package has 
those parts.

MacPorts does have port names with a "-devel" suffix, but they embody a 
completely unrelated concept. Ports with names not ending with "-devel" are 
typically for stable versions of software while ports with the "-devel" name 
suffix are for newer unstable versions.


> Failing that, would it be safe to install Homebrew and its ruby-dev, just for 
> building CocoaPods?

Please choose one package manager and uninstall the other. We do not want to 
spend time diagnosing problems that were caused by installing software with 
multiple conflicting package managers.



Re: ruby_select is broken

2021-10-02 Thread Ryan Schmidt



On Sep 25, 2021, at 23:14, Ian Wadham wrote:

> MacPorts contains packages of many versions of Ruby, similarly to the Python 
> and Perl groups, but the corresponding “ruby_select” port does not 
> automatically create the links needed to access commands “ruby”, “gem” etc. I 
> was able to get around this by using “sudo port select” manually, but would 
> it be possible for someone to fix “ruby_select” so that the ports “ruby$n” 
> work properly “out of the box".

I don't understand what you mean. ruby_select (and all _select ports) are 
helper infrastructure so that "port select" works. Using "port select" is not a 
workaround; it is *the* way to select a particular version of a set of ports.


> Also, the port actually called “ruby” is very old (version 1.8.7) and “port 
> notes ruby” deprecates it. Should it be removed from MacPorts?

If nobody needs it, I suppose it could be removed. Do you know that nobody 
needs it? I don't know that.


> Or reincarnated as “ruby18”, dropping “ruby186” as well?

If it ain't broke, don't fix it?



Re: Does MacPorts need ALL of Xcode?

2021-10-02 Thread Ryan Schmidt



On Sep 27, 2021, at 11:49, Filipp Gunbin wrote:

> On 26/09/2021 23:42 +0100, Chris Jones wrote:
> 
>> The majority of ports will indeed build fine with just the CLT
>> installed. There are a number though where the build does indeed
>> require a complete Xcode installation, which is why the baseline
>> recommendation is to install Xcode. However if you are ok with perhaps
>> running into the occasional port failure (the likelihood for which
>> depends on which ports you use) you likely can get by just fine with
>> just the CLT.
> 
> How can one check if a given port requires full XCode?

You can check if its portfile contains the line:

use_xcode yes

If it does, it requires Xcode to build.

However, if it is distributable, then it may already have been built by our 
build servers, which have both Xcode and the command line tools installed, in 
which case MacPorts can obtain and install that pre-built archive for you 
without you needing to have Xcode installed on your computer. In fact, if a 
port is distributable, you don't even need the command line tools installed to 
install it.

Re: Does MacPorts need ALL of Xcode?

2021-10-02 Thread Ryan Schmidt
On Sep 27, 2021, at 16:36, Ian Wadham wrote:

> So what is the “recipe” to install just the CLT with no version of Xcode 
> present? And can that recipe be included in the MacPorts Guide?

Run

xcode-select --install

and click the button to install the command line tools.

Or download the command line tools installer from the Apple Developer Downloads 
web site.


> Couldn’t those ports list Xcode as a build dependency?

They do, by using this keyword:

use_xcode yes




Re: geant4 and/or geant4.10.0

2021-10-02 Thread Ryan Schmidt
On Sep 29, 2021, at 04:01, Михаил Коротков wrote:

> Dear Mojka,
> Could you please to explain what I have to do for using Geant4.
> I have installed Geant4.10.6 by
>  sudo port install geant4 
> And seems everything is ok.
> Then I run geant4.sh in the /opt/local/libexec/Geant4/geant4.10.6/
> But when I tried to make .. I got the
> 
> CMake Error at CMakeLists.txt:24 (find_package):
>   By not providing "FindGeant4.cmake" in CMAKE_MODULE_PATH this project has
>   asked CMake to find a package configuration file provided by "Geant4", but
>   CMake did not find one.
> 
>   Could not find a package configuration file provided by "Geant4" with any
>   of the following names:
> 
> Geant4Config.cmake
> geant4-config.cmake
> 
>   Add the installation prefix of "Geant4" to CMAKE_PREFIX_PATH or set
>   "Geant4_DIR" to a directory containing one of the above files.  If "Geant4"
>   provides a separate development package or SDK, be sure it has been
>   installed.
> 
> And the second question is - can I work with the Geant4 in python?
> If yes what I have to do?
> It seems to me that in any case I need to add something in PATHS.
> 
> I work on Mac OS BIG SUR with M1.
> 
> Thank you very much,
> Mikhail

In the future please write to macports-users@lists.macports.org, not at the old 
hostname that we stopped using in late 2016.