On Wed, Apr 05, 2017 at 12:51:38PM +0200, Ævar Arnfjörð Bjarmason wrote: > On Wed, Apr 5, 2017 at 11:33 AM, Tom G. Christensen wrote: > Whoah. So my assumption in > > that nobody was compiling this & thus not reporting failures was > false. Rather there's an entire community & distribution mechanism > around patching git for older EL versions, but the patches aren't > making it upstream. > > $ grep -h -e ^Subject -e ^Date *patch > Date: Tue, 13 Oct 2009 11:34:11 +0200 > Subject: [PATCH 1/7] Make NO_PERL_MAKEMAKER behave more like > Date: Fri, 13 Jun 2014 11:02:02 +0200 > Subject: [PATCH 2/7] Install man pages when NO_PERL_MAKEMAKER is used > Date: Mon, 22 Sep 2014 13:42:50 +0200 > Subject: [PATCH 3/7] Allow svnrdump_sim.py to be used with Python 2.2 > Date: Tue, 8 Mar 2016 09:31:56 +0100 > Subject: [PATCH 4/7] Handle missing HTTP_CONNECTCODE in curl < 7.10.7 > Date: Tue, 23 Aug 2016 10:32:51 +0200 > Subject: [PATCH 5/7] Add support for gnupg < 1.4 > Date: Tue, 23 Aug 2016 18:15:13 +0200 > Subject: [PATCH 6/7] Handle missing CURLINFO_SSL_DATA_{IN,OUT} > Date: Tue, 23 Aug 2016 18:26:54 +0200 > Subject: [PATCH 7/7] Do not use curl_easy_strerror with curl < 7.12.0 > Date: Wed, 2 Feb 2011 21:24:44 -0500 > Subject: [PATCH] Restore vc-git.el for basic compatibility on EL-5 > Date: Mon, 23 Mar 2009 00:03:36 -0400 > Subject: [PATCH] git-cvsimport: Ignore cvsps-2.2b1 Branches: output > > > Patches can be found in the src.rpm, though I can also post them here as > > patch series, they cover more than just curl. > > > > I don't use the el3 and el4 versions much any more and el5 use will also > > drop of now as I'm busy converting machines from el5 to el7. > > It would be great to have them on-list, as far as I can tell they were > never submitted? Is there some time/administrative reason for why > you're not submitting them? Some of these are many years old, it would > be great to have them on-list for wider review & included so vanilla > git works on these platforms. I'm very opposed to accepting patches for operating systems that are no longer security supported. Having insecure systems directly or indirectly connected to the Internet is a very bad thing, and we shouldn't make it easier for people who want to do that. CentOS 6 and 7 are still in use and security supported, and I think we should support them. CentOS 5 is EOL, although RHEL 5 is still supported in some cases. RHEL 4 and earlier are definitely out of support and we shouldn't support or consider them further. -- brian m. carlson / brian with sandals: Houston, Texas, US +1 832 623 2791 | https://www.crustytoothpaste.net/~bmc | My opinion only OpenPGP: https://keybase.io/bk2204