[Bug 274748] net/mpd5: revision bump to unbreak ssl=openssl111 consumers on pkg-upgrade
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Fri, 27 Oct 2023 07:40:12 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=274748
            Bug ID: 274748
           Summary: net/mpd5: revision bump to unbreak ssl=openssl111
                    consumers on pkg-upgrade
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
               URL: https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=2739
                    70
                OS: Any
            Status: New
          Severity: Affects Some People
          Priority: ---
         Component: Individual Port(s)
          Assignee: eugen@freebsd.org
          Reporter: franco@opnsense.org
          Assignee: eugen@freebsd.org
             Flags: maintainer-feedback?(eugen@freebsd.org)
Created attachment 245908
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=245908&action=edit
revision
Hi,
I've mentioned it in 273970 but let's make it clear by adding a ticket and a
trivial patch for it.
++++
While the commit states "The change does not affect build, so PORTREVISION not
bumped." it does affect runtime with pkg-upgrade and openssl/openssl111 port
shift resulting in a spurious conflict:
openssl111-1.1.1w conflicts with openssl-1.1.1w,1 on /usr/local/bin/c_rehash
Cannot solve problem using SAT solver, trying another plan
You can read more about the observed pkg-upgrade behaviour here:
https://github.com/opnsense/core/issues/6959
The obvious fix for us was to issue a revision bump.  It would probably be
safer to have it in the FreBSD ports too since otherwise this may lead
pkg-upgrade into the conflict state and it can't resolve it automatically.
++++
Cheers,
Franco
-- 
You are receiving this mail because:
You are the assignee for the bug.