Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 26 Feb 2021 11:06:40 +0100
From:      Matthias Fechner <idefix@fechner.net>
To:        Dima Panov <fluffy@FreeBSD.org>, ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   Re: svn commit: r566534 - in head/security: py-cryptography py-openssl
Message-ID:  <c0e6a24c-587d-0716-5760-3c27e43400b8@fechner.net>
In-Reply-To: <202102251332.11PDWPTr091156@repo.freebsd.org>
References:  <202102251332.11PDWPTr091156@repo.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
Am 25.02.2021 um 14:32 schrieb Dima Panov:
> Log:
>    security/py-openssl: unbreak run for consumers
>    
>    Partially revert r566075 to previous py-openssl release only for
>    ${OSVERSION} < 1200085 and base OpenSSL 1.0.2 with PORTEPOCH bump
>    
>    This step is needed because since 20.0 release py-openssl have dropped off support
>    for openssl < 1.1.0 which still in base fo FreeBSD 11.4+ branch
>    
>    Due to dependency on recent cryptography, bump py-cryptography to 3.3.2 release
>    under same conditions as py-openssl. 3.3.2 was last release which not requred Rust to build
>    
>    With hat:	ports-secteam
>    Pointy hat to:	sbz (for skip dependencies verification and no reaction to complains)
>    Reported by:	many via ML

thanks for this, I can confirm that it fixed the problem for a FreeBSD 
12.2p4 installation.

Gruß
Matthias

-- 

"Programming today is a race between software engineers striving to
build bigger and better idiot-proof programs, and the universe trying to
produce bigger and better idiots. So far, the universe is winning." --
Rich Cook




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?c0e6a24c-587d-0716-5760-3c27e43400b8>