Subject: pkg/24371: security/audit-packages: support for FreeBSD fetch(1) command
To: None <gnats-bugs@gnats.NetBSD.org>
From: None <dotz@irc.pl>
List: netbsd-bugs
Date: 02/09/2004 03:33:36
>Number:         24371
>Category:       pkg
>Synopsis:       security/audit-packages: support for FreeBSD fetch(1) command
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    pkg-manager
>State:          open
>Class:          change-request
>Submitter-Id:   net
>Arrival-Date:   Mon Feb 09 03:34:01 UTC 2004
>Closed-Date:
>Last-Modified:
>Originator:     Michal Pasternak
>Release:        N/A
>Organization:
>Environment:
FreeBSD 4.9-STABLE
>Description:

download-vulnerability-list chokes on FreeBSD-STABLE with
FETCH_CMD=/usr/bin/fetch and tells me to send-pr ;)


>How-To-Repeat:
Get FreeBSD, 
get security/audit-packages, 
set FETCH_CMD to /usr/bin/fetch in /etc/mk.conf, 
try to download the list
>Fix:
Here's the patch. For very curious, link to manpage:

http://www.freebsd.org/cgi/man.cgi?query=fetch&apropos=0&sektion=0&manpath=FreeBSD+5.2-RELEASE+and+Ports&format=html

the switch is "-o".

--- download-vulnerability-list~        Mon Feb  9 04:27:32 2004
+++ download-vulnerability-list Mon Feb  9 04:29:44 2004
@@ -55,6 +55,7 @@
 *curl) /usr/bin/fetch ${FETCH_ARGS} -o ${NEW_VUL_LIST} ${VUL_SOURCE} ;;
 *ftp)  /usr/bin/fetch ${FETCH_ARGS} -o ${NEW_VUL_LIST} ${VUL_SOURCE} ;;
 *wget) /usr/bin/fetch ${FETCH_ARGS} -O ${NEW_VUL_LIST} ${VUL_SOURCE} ;;
+*fetch) /usr/bin/fetch ${FETCH_ARGS} -o ${NEW_VUL_LIST} ${VUL_SOURCE} ;;
 *)     echo "Unknown fetch command - please use send-pr to send in support for your fetch command" 1>&2
        exit 1
        ;;

>Release-Note:
>Audit-Trail:
>Unformatted: