[Bug 274748] net/mpd5: revision bump to unbreak ssl=openssl111 consumers on pkg-upgrade

From: <bugzilla-noreply_at_freebsd.org>
Date: Fri, 27 Oct 2023 07:40:12 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=274748

            Bug ID: 274748
           Summary: net/mpd5: revision bump to unbreak ssl=openssl111
                    consumers on pkg-upgrade
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
               URL: https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=2739
                    70
                OS: Any
            Status: New
          Severity: Affects Some People
          Priority: ---
         Component: Individual Port(s)
          Assignee: eugen@freebsd.org
          Reporter: franco@opnsense.org
          Assignee: eugen@freebsd.org
             Flags: maintainer-feedback?(eugen@freebsd.org)

Created attachment 245908
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=245908&action=edit
revision

Hi,

I've mentioned it in 273970 but let's make it clear by adding a ticket and a
trivial patch for it.

++++
While the commit states "The change does not affect build, so PORTREVISION not
bumped." it does affect runtime with pkg-upgrade and openssl/openssl111 port
shift resulting in a spurious conflict:

openssl111-1.1.1w conflicts with openssl-1.1.1w,1 on /usr/local/bin/c_rehash
Cannot solve problem using SAT solver, trying another plan

You can read more about the observed pkg-upgrade behaviour here:

https://github.com/opnsense/core/issues/6959

The obvious fix for us was to issue a revision bump.  It would probably be
safer to have it in the FreBSD ports too since otherwise this may lead
pkg-upgrade into the conflict state and it can't resolve it automatically.
++++


Cheers,
Franco

-- 
You are receiving this mail because:
You are the assignee for the bug.