Date: Fri, 26 Feb 2021 11:06:40 +0100 From: Matthias Fechner <idefix@fechner.net> To: Dima Panov <fluffy@FreeBSD.org>, ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: Re: svn commit: r566534 - in head/security: py-cryptography py-openssl Message-ID: <c0e6a24c-587d-0716-5760-3c27e43400b8@fechner.net> In-Reply-To: <202102251332.11PDWPTr091156@repo.freebsd.org> References: <202102251332.11PDWPTr091156@repo.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Am 25.02.2021 um 14:32 schrieb Dima Panov: > Log: > security/py-openssl: unbreak run for consumers > > Partially revert r566075 to previous py-openssl release only for > ${OSVERSION} < 1200085 and base OpenSSL 1.0.2 with PORTEPOCH bump > > This step is needed because since 20.0 release py-openssl have dropped off support > for openssl < 1.1.0 which still in base fo FreeBSD 11.4+ branch > > Due to dependency on recent cryptography, bump py-cryptography to 3.3.2 release > under same conditions as py-openssl. 3.3.2 was last release which not requred Rust to build > > With hat: ports-secteam > Pointy hat to: sbz (for skip dependencies verification and no reaction to complains) > Reported by: many via ML thanks for this, I can confirm that it fixed the problem for a FreeBSD 12.2p4 installation. Gruß Matthias -- "Programming today is a race between software engineers striving to build bigger and better idiot-proof programs, and the universe trying to produce bigger and better idiots. So far, the universe is winning." -- Rich Cook
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?c0e6a24c-587d-0716-5760-3c27e43400b8>