[Bug 274748] net/mpd5: revision bump to unbreak ssl=openssl111 consumers on pkg-upgrade
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Fri, 27 Oct 2023 07:40:12 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=274748 Bug ID: 274748 Summary: net/mpd5: revision bump to unbreak ssl=openssl111 consumers on pkg-upgrade Product: Ports & Packages Version: Latest Hardware: Any URL: https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=2739 70 OS: Any Status: New Severity: Affects Some People Priority: --- Component: Individual Port(s) Assignee: eugen@freebsd.org Reporter: franco@opnsense.org Assignee: eugen@freebsd.org Flags: maintainer-feedback?(eugen@freebsd.org) Created attachment 245908 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=245908&action=edit revision Hi, I've mentioned it in 273970 but let's make it clear by adding a ticket and a trivial patch for it. ++++ While the commit states "The change does not affect build, so PORTREVISION not bumped." it does affect runtime with pkg-upgrade and openssl/openssl111 port shift resulting in a spurious conflict: openssl111-1.1.1w conflicts with openssl-1.1.1w,1 on /usr/local/bin/c_rehash Cannot solve problem using SAT solver, trying another plan You can read more about the observed pkg-upgrade behaviour here: https://github.com/opnsense/core/issues/6959 The obvious fix for us was to issue a revision bump. It would probably be safer to have it in the FreBSD ports too since otherwise this may lead pkg-upgrade into the conflict state and it can't resolve it automatically. ++++ Cheers, Franco -- You are receiving this mail because: You are the assignee for the bug.