From nobody Fri Jun 09 23:51:26 2023 X-Original-To: freebsd-ports@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4QdHtP5lB6z4bTvk for ; Fri, 9 Jun 2023 23:51:57 +0000 (UTC) (envelope-from eugen@grosbein.net) Received: from hz.grosbein.net (hz.grosbein.net [IPv6:2a01:4f8:c2c:26d8::2]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "hz.grosbein.net", Issuer "hz.grosbein.net" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 4QdHtN6Dlvz3stN; Fri, 9 Jun 2023 23:51:56 +0000 (UTC) (envelope-from eugen@grosbein.net) Authentication-Results: mx1.freebsd.org; none Received: from eg.sd.rdtc.ru (root@eg.sd.rdtc.ru [62.231.161.221] (may be forged)) by hz.grosbein.net (8.17.1/8.17.1) with ESMTPS id 359Nppvw023288 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 9 Jun 2023 23:51:51 GMT (envelope-from eugen@grosbein.net) X-Envelope-From: eugen@grosbein.net X-Envelope-To: bofh@freebsd.org Received: from [10.58.0.11] (dadvw [10.58.0.11] (may be forged)) by eg.sd.rdtc.ru (8.16.1/8.16.1) with ESMTPS id 359NpoNX007748 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NOT); Sat, 10 Jun 2023 06:51:50 +0700 (+07) (envelope-from eugen@grosbein.net) Subject: Re: OpenSSL 3.0 in the base system update To: Moin Rahman References: <257c6981-f49a-6d31-b5f8-7cad1d3e889a@grosbein.net> Cc: FreeBSD Ports From: Eugene Grosbein Message-ID: <91fa0a9f-0216-1391-443c-80deaf967daa@grosbein.net> Date: Sat, 10 Jun 2023 06:51:26 +0700 User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.8.0 List-Id: Porting software to FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-ports List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-ports@freebsd.org X-BeenThere: freebsd-ports@freebsd.org MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-1.0 required=5.0 tests=ALL_TRUSTED,SHORTCIRCUIT autolearn=disabled version=3.4.6 X-Spam-Report: * -0.0 SHORTCIRCUIT No description available. * -1.0 ALL_TRUSTED Passed through trusted hosts only via SMTP X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on hz.grosbein.net X-Rspamd-Queue-Id: 4QdHtN6Dlvz3stN X-Spamd-Bar: ---- X-Spamd-Result: default: False [-4.00 / 15.00]; REPLY(-4.00)[]; ASN(0.00)[asn:24940, ipnet:2a01:4f8::/32, country:DE] X-Rspamd-Pre-Result: action=no action; module=replies; Message is reply to one we originated X-ThisMailContainsUnwantedMimeParts: N 09.06.2023 18:33, Moin Rahman wrote: >> On Jun 9, 2023, at 5:22 AM, Eugene Grosbein wrote: >> >> 09.06.2023 0:13, Ed Maste wrote: >> >> [skip] >> >>> We welcome feedback from anyone willing to test the work in progress. >> >> Is it possible to grab some binary snapshot of 14-CURRENT to install into a VM and test my port that fails build? >> If not, how do I build 14-CURRENT with OpenSSL 3.0 myself? > > At the moment there is no binary snapshot as the codebase has not yet > been merged into the Source of Truth. The best way to test your port > is either with poudriere or with a local jail. In case you are using > poudriere the following might be helpful for you: > > git clone git@github.com:khorben/freebsd-src.git openssl3-src > cd openssl3-src && git checkout khorben/openssl-3.0.9 > poudriere jail -c -j MAINopenssl3 -b -m src=/openssl3-src -J 64 > > If you are the Eugen from gost-engine then I believe it should be a simple > upgrade to the latest 3.0.1 version. I am. The port security/gost-engine already supports OpenSSL 3.0 but requires non-default build option to use it. I guess, I need to rework the port to use flavours instead. But, I worry about net/mpd5 this time. > And if you do not have enough firepower for running HEAD jail submit a > patch and assign it to me. I will look into it. I will use my local bhyve to run HEAD+OpenSSL 3.0 I can build it myself and buildworld finished already, in fact :-) Thank you all who responded.