From nobody Wed Jan 25 19:08:49 2023 X-Original-To: freebsd-embedded@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4P2D062Hlzz3bCD0 for ; Wed, 25 Jan 2023 19:08:54 +0000 (UTC) (envelope-from embhd@posteo.de) Received: from mout02.posteo.de (mout02.posteo.de [185.67.36.66]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4P2D051BDMz3k0R for ; Wed, 25 Jan 2023 19:08:53 +0000 (UTC) (envelope-from embhd@posteo.de) Authentication-Results: mx1.freebsd.org; dkim=pass header.d=posteo.de header.s=2017 header.b=D4SkrJTr; spf=pass (mx1.freebsd.org: domain of embhd@posteo.de designates 185.67.36.66 as permitted sender) smtp.mailfrom=embhd@posteo.de; dmarc=pass (policy=none) header.from=posteo.de Received: from submission (posteo.de [185.67.36.169]) by mout02.posteo.de (Postfix) with ESMTPS id 5CC0D240886 for ; Wed, 25 Jan 2023 20:08:50 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=posteo.de; s=2017; t=1674673730; bh=CGMRdA286u3Iljne5Rv/zn8VQFypEc+KVhpipO1iL6A=; h=Date:From:To:Subject:From; b=D4SkrJTrdz2sjzSIA3rVoltwthpPe0K2K5eNlllwF5qQyJEkweQ5fxH797mU7cfKN VsJa8K39lxsdgsglykqcoWZ+Wqc9jvPGfVzrB9k8kvbdKLeCIxrgx9WYpeKlQAkTJj aV+A+8Kaao7a8b50EIfSeXSkIzzina6ePtx73b92hhLKs10CezKskxwaQhPe5Klm48 OLIGZm++3Yxowgbx8UMkWdYrbsQUe6vcPYra1Ts53O4mZMTsokXchBM5AObe/jqJv8 jcDae0+6EKiSboB9lGyW9SZeOByD+rf49dWUDuTWRUOHttldjiEs5KE8d7IJceJm3X wOE7h8wQ7ikkg== Received: from customer (localhost [127.0.0.1]) by submission (posteo.de) with ESMTPSA id 4P2D016crnz6tn5 for ; Wed, 25 Jan 2023 20:08:49 +0100 (CET) List-Id: Dedicated and Embedded Systems List-Archive: https://lists.freebsd.org/archives/freebsd-embedded List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-embedded@freebsd.org MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="=_41935738af19752ee442b1616b1dd0f9" Date: Wed, 25 Jan 2023 19:08:49 +0000 From: Michael To: freebsd-embedded@freebsd.org Subject: nanoBSD: =?UTF-8?Q?cust=5Fpkgng=28=29=20bootstraps=20pkg=28=38=29?= =?UTF-8?Q?=20regardless=20of=20required=20pkg-X=2EY=2EZ?= Message-ID: <447bf50fdf772bc645446bca6d40637f@posteo.de> X-Spamd-Result: default: False [-2.97 / 15.00]; SUBJ_EXCESS_QP(1.20)[]; MIME_BASE64_TEXT_BOGUS(1.00)[]; DWL_DNSWL_LOW(-1.00)[posteo.de:dkim]; NEURAL_HAM_MEDIUM(-1.00)[-0.998]; NEURAL_HAM_SHORT(-0.98)[-0.983]; NEURAL_HAM_LONG(-0.59)[-0.591]; DMARC_POLICY_ALLOW(-0.50)[posteo.de,none]; RCVD_DKIM_ARC_DNSWL_MED(-0.50)[]; R_SPF_ALLOW(-0.20)[+ip4:185.67.36.0/23]; RCVD_IN_DNSWL_MED(-0.20)[185.67.36.66:from]; R_DKIM_ALLOW(-0.20)[posteo.de:s=2017]; MIME_GOOD(-0.10)[multipart/mixed,text/plain,text/x-patch]; MIME_BASE64_TEXT(0.10)[]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-embedded@freebsd.org]; RCPT_COUNT_ONE(0.00)[1]; MLMMJ_DEST(0.00)[freebsd-embedded@freebsd.org]; RCVD_VIA_SMTP_AUTH(0.00)[]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_COUNT_THREE(0.00)[3]; TO_DN_NONE(0.00)[]; HAS_ATTACHMENT(0.00)[]; ARC_NA(0.00)[]; DKIM_TRACE(0.00)[posteo.de:+]; MIME_TRACE(0.00)[0:+,1:+,2:+]; FROM_EQ_ENVFROM(0.00)[]; ASN(0.00)[asn:8495, ipnet:185.67.36.0/23, country:DE]; RWL_MAILSPIKE_POSSIBLE(0.00)[185.67.36.66:from]; RCVD_TLS_ALL(0.00)[] X-Rspamd-Queue-Id: 4P2D051BDMz3k0R X-Spamd-Bar: -- X-ThisMailContainsUnwantedMimeParts: N --=_41935738af19752ee442b1616b1dd0f9 Content-Transfer-Encoding: 7bit Content-Type: text/plain; charset=US-ASCII; format=flowed Hello, I noticed that in cust_pkng(), pkg(7) bootstraps to pkg(8) even though the function itself requires a pkg-* for bootstrapping. This also seems to be the reason why _.cust.cust_pkng notes that "the most recent version of pkg-X.Y.Z is already installed" if the function has been run with an active internet connection - first, pkg(7) bootstraps to pkg(8), which then tries to install pkg(8) once more. At the same time, I would think that if the nanoBSD-image is for an entirely different plattform/architecture, the just bootstrapped pkg(8) would not be able to run during operation, since it has been compiled for the "host" system. My current solution is to change the command set in ${PKGCMD} to use the host's pkg(8), which chroots itself to ${NANO_WORLDDIR}. This also makes the separate calls to chroot(8) by means of CR() and CR0() unnecessary. Since the latter does not seem to be used anywhere else and the former only once in clean_build(), they can be removed altogether if CR() is replaced with a direct call to chroot(8) in clean_build(). Am I missing anything? Otherwise I would go ahead and open a PR. Regards, Michael --=_41935738af19752ee442b1616b1dd0f9 Content-Transfer-Encoding: base64 Content-Type: text/x-patch; name=defaults.patch Content-Disposition: attachment; filename=defaults.patch; size=2023 ZGlmZiAtLWdpdCBhL3Rvb2xzL3Rvb2xzL25hbm9ic2QvZGVmYXVsdHMuc2ggYi90b29scy90b29s cy9uYW5vYnNkL2RlZmF1bHRzLnNoCmluZGV4IDQ1ZDlmZTQ0YzY1MC4uZTVkNmNhY2RiMzQ0IDEw MDc1NQotLS0gYS90b29scy90b29scy9uYW5vYnNkL2RlZmF1bHRzLnNoCisrKyBiL3Rvb2xzL3Rv b2xzL25hbm9ic2QvZGVmYXVsdHMuc2gKQEAgLTI3NywxNiArMjc3LDYgQEAgdGd0X2RpcjJzeW1s aW5rICggKSAoCiAJZmkKICkKIAotIyBydW4gaW4gdGhlIHdvcmxkIGNocm9vdCwgZXJyb3JzIGZh dGFsCi1DUiAoICkgewotCWNocm9vdCAiJHtOQU5PX1dPUkxERElSfSIgL2Jpbi9zaCAtZXhjICIk KiIKLX0KLQotIyBydW4gaW4gdGhlIHdvcmxkIGNocm9vdCwgZXJyb3JzIG5vdCBmYXRhbAotQ1Iw ICggKSB7Ci0JY2hyb290ICIke05BTk9fV09STERESVJ9IiAvYmluL3NoIC1jICIkKiIgfHwgdHJ1 ZQotfQotCiBjbGVhbl9idWlsZCAoICkgKAogCXBwcmludCAyICJDbGVhbiBhbmQgY3JlYXRlIG9i amVjdCBkaXJlY3RvcnkgKCR7TUFLRU9CSkRJUlBSRUZJWH0pIgogCkBAIC03NDAsNyArNzMwLDcg QEAgY3VzdF9pbnN0YWxsX2ZpbGVzICggKSAoCiAJZmluZCAuIC1wcmludCB8IGdyZXAgLUV2ICcv KENWU3xcLnN2bnxcLmhnfFwuZ2l0KS8nIHwgY3BpbyAke0NQSU9fU1lNTElOS30gLUxkdW1wdiAk e05BTk9fV09STERESVJ9CiAKIAlpZiBbIC1uICIke05BTk9fQ1VTVF9GSUxFU19NVFJFRX0iIC1h IC1mICR7TkFOT19DVVNUX0ZJTEVTX01UUkVFfSBdOyB0aGVuCi0JCUNSICJtdHJlZSAtZWlVIC1w IC8iIDwke05BTk9fQ1VTVF9GSUxFU19NVFJFRX0KKwkJY2hyb290ICIke05BTk9fV09STERESVJ9 IiAvYmluL3NoIC1leGMgIm10cmVlIC1laVUgLXAgLyA8JHtOQU5PX0NVU1RfRklMRVNfTVRSRUV9 IgogCWZpCiApCiAKQEAgLTc1MCw3ICs3NDAsNyBAQCBjdXN0X2luc3RhbGxfZmlsZXMgKCApICgK IGN1c3RfcGtnbmcgKCApICgKIAlta2RpciAtcCAke05BTk9fV09STERESVJ9L3Vzci9sb2NhbC9l dGMKIAlsb2NhbCBQS0dfQ09ORj0iJHtOQU5PX1dPUkxERElSfS91c3IvbG9jYWwvZXRjL3BrZy5j b25mIgotCWxvY2FsIFBLR0NNRD0iZW52IEJBVENIPVlFUyBBU1NVTUVfQUxXQVlTX1lFUz1ZRVMg UEtHX0RCRElSPSR7TkFOT19QS0dfTUVUQV9CQVNFfS9wa2cgU0lHTkFUVVJFX1RZUEU9bm9uZSAv dXNyL3NiaW4vcGtnIgorCWxvY2FsIFBLR0NNRD0iZW52IEJBVENIPVlFUyBBU1NVTUVfQUxXQVlT X1lFUz1ZRVMgUEtHX0RCRElSPSR7TkFOT19QS0dfTUVUQV9CQVNFfS9wa2cgU0lHTkFUVVJFX1RZ UEU9bm9uZSBwa2cgLWMgJHtOQU5PX1dPUkxERElSfSIKIAogCSMgRW5zdXJlIHBrZy5jb25mIHBv aW50cyBwa2cgdG8gd2hlcmUgdGhlIHBhY2thZ2UgbWV0YSBkYXRhIGxpdmVzLgogCXRvdWNoICR7 UEtHX0NPTkZ9CkBAIC03ODMsNyArNzczLDcgQEAgY3VzdF9wa2duZyAoICkgKAogCXRyYXAgInVt b3VudCAke05BTk9fV09STERESVJ9L2RldjsgdW1vdW50ICR7TkFOT19XT1JMRERJUn0vXy5wIDsg cm0gLXhyZiAke05BTk9fV09STERESVJ9L18ucCIgMSAyIDE1IEVYSVQKIAogCSMgSW5zdGFsbCBw a2ctKiBwYWNrYWdlCi0JQ1IgIiR7UEtHQ01EfSBhZGQgL18ucC8ke19OQU5PX1BLR19QQUNLQUdF fSIKKwkke1BLR0NNRH0gYWRkIC9fLnAvJHtfTkFOT19QS0dfUEFDS0FHRX0KIAogCSgKIAkJIyBF eHBhbmQgYW55IGdsb2IgY2hhcmFjdGVycyBpbiBwYWNha2dlIGxpc3QKQEAgLTc5OCwxMSArNzg4 LDExIEBAIGN1c3RfcGtnbmcgKCApICgKIAogCQkjIEluc3RhbGwgcGFja2FnZXMKIAkJZm9yIF9Q S0cgaW4gJF9QS0dTOyBkbwotCQkJQ1IgIiR7UEtHQ01EfSBhZGQgL18ucC8ke19QS0d9IgorCQkJ JHtQS0dDTUR9IGFkZCAvXy5wLyR7X1BLR30KIAkJZG9uZQogCSkKIAotCUNSMCAiJHtQS0dDTUR9 IGluZm8iCisJJHtQS0dDTUR9IGluZm8gfHwgdHJ1ZQogCiAJdHJhcCAtIDEgMiAxNSBFWElUCiAJ dW1vdW50ICR7TkFOT19XT1JMRERJUn0vZGV2Cg== --=_41935738af19752ee442b1616b1dd0f9--