From nobody Tue Jan 28 23:00:10 2025 X-Original-To: ports-bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4YjLNB5Bzyz5mHtZ for ; Tue, 28 Jan 2025 23:00:10 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R11" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4YjLNB4NNkz3MsK for ; Tue, 28 Jan 2025 23:00:10 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1738105210; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=ZhRLkk06MjifhcX03OPOfJvsIeeiSgxEerJrNXTBq4g=; b=i/QQXjJm1DC6UHOgZhpQQKh/s/cimmou3VD+f4Zbn/axqualjSmUrKjLtBlLv3Ht4WbOrY 3WC9Tt9vvR8QLPYpJ297w2KnFydrlTqmxcbpN7Vol2fvmocB2+APfN3y7mGskRWKU0vz4U SPUjI+fNyURJUfwgMKPSY1HdOvfIYt3zGs646KbG5iYSJ0at2lun2QkSwbfox49QUp361F txrwh/2Wg/oPeEFtbElgvZ6uEz+Es5PBg/SrMSeE9WzSHMgxBi0U6LNRIawzZSi/mbF2jK 38RoRZkYKu+5nsRs5ZvmogTOlsbc7rZNYw/meD1f5ZUKigXrSzDHYOD/BQTh8Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1738105210; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=ZhRLkk06MjifhcX03OPOfJvsIeeiSgxEerJrNXTBq4g=; b=xSq5WI3iTp8RELaOjebAR6o10Sm9/+EWEy5GexMZkbv50qTMR6bHPjynpR9sH5BH+fDQiV MqCs7ry8Q1hhq/Ewmju98F8RE3jBLJMWjcO0N2OfEL6TK9SVB8BVImCExYwt8taq3AopEe HpK9+i+WzpCiyRNLgXPwAh9EedmkBFIa7TAwQxRHdpWYj6LpQAqxEUfyBe+u0EMFJd+qG+ xFO0ArLCRz3KPlo1hFNrqZJSagbGyoW3CKExi+sUeWK34P57Yan7i7HYuzJaHcjjktOoIZ FFwy+sXGWu4l3xR2o+qJyRqnD7LsLr8wj6iO9Ku031acbC/mosYm0CLCv2u0Pw== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1738105210; a=rsa-sha256; cv=none; b=qiw8zGZ9JGfFDj7MqfGgrraGwJxjsmagXNuLtf25yBDKrNUfAEw9m8vcXmZTqzJLhHFB69 E+UtMT2A+oIlNf3JKbUF3Cb1K+8VCo5XMEyysuBY1x69rwOoxn6bgY/+LWimqoyA/tGb/s ueIo90udomdc/rL51RZyj8davuZSYVPkYegO+ymbKdesYxNoS9DKYlpJ4sfr/uEWdEjZQ/ V32rWK/0a8P52PJvbLFQdJoiUndlHW0O5pG85CmBOtq9CcyAciCwAHVD6c17/vo7ryNcs7 fSSHlVNxot0yxj2sh8fUHQ3w/MkMH+h8o6gFZWZ2Vf/mDVmbDKqG+UQta6i1RA== ARC-Authentication-Results: i=1; mx1.freebsd.org; none Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4YjLNB3yZ6zcH7 for ; Tue, 28 Jan 2025 23:00:10 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 50SN0AWf052790 for ; Tue, 28 Jan 2025 23:00:10 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 50SN0Arb052789 for ports-bugs@FreeBSD.org; Tue, 28 Jan 2025 23:00:10 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 284429] devel/android-tools: Rename fastboot to prevent conflict within $PATH Date: Tue, 28 Jan 2025 23:00:10 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Many People X-Bugzilla-Who: polarian@polarian.dev X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: nc@FreeBSD.org X-Bugzilla-Flags: maintainer-feedback? X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter flagtypes.name Message-ID: Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="UTF-8" X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Ports bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-ports-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: freebsd-ports-bugs@freebsd.org Sender: owner-freebsd-ports-bugs@FreeBSD.org MIME-Version: 1.0 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D284429 Bug ID: 284429 Summary: devel/android-tools: Rename fastboot to prevent conflict within $PATH Product: Ports & Packages Version: Latest Hardware: Any OS: Any Status: New Severity: Affects Many People Priority: --- Component: Individual Port(s) Assignee: nc@FreeBSD.org Reporter: polarian@polarian.dev Flags: maintainer-feedback?(nc@FreeBSD.org) Assignee: nc@FreeBSD.org Hello, I would like to open discussions on solutions to fixing the $PATH issue with fastboot. FreeBSD ships with a fastboot within /sbin/fastboot which will take priority over the android fastboot which is installed to /usr/local/bin/fastboot. This has a few issues: 1. "flash-all.sh", the bundled flashing script in android ROMs will always = call FreeBSD's fastboot, which is bad. 2. Its a pain to have to type the full path So I suggest installing it as android-fastboot, or afastboot for faster typ= ing so that this $PATH conflict doesn't occur. flash-all.sh already needs to be modified to use the full path anyways, so it already breaks flashing without modification, so this change is breaking something which is already broken. Sure you can always add an alias to your shrc, but I do not feel like that = is a concrete solution to the problem. Obviously this is a short term quality of life improvement, does anyone else have any better ideas which allows flash-all.sh to work seamlessly without modification? I think the real benefit is if ROM bundles started shipping with a uname ch= eck and hard code the path into it, but Google won't care about that, too much effort for such a small community of hackers (which are fully capable of fi= xing the script themself). Adjusting the $PATH is likely not wise either, although would fix this prob= lem. Thank you, Polarian --=20 You are receiving this mail because: You are the assignee for the bug.=