From owner-freebsd-elastic@freebsd.org Fri Nov 8 15:29:50 2019 Return-Path: Delivered-To: freebsd-elastic@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 1C5C61B5D92 for ; Fri, 8 Nov 2019 15:29:50 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 478kj974BRz4WHd for ; Fri, 8 Nov 2019 15:29:49 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id F0E531B5D91; Fri, 8 Nov 2019 15:29:49 +0000 (UTC) Delivered-To: elastic@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id F0A611B5D90 for ; Fri, 8 Nov 2019 15:29:49 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 478kj9642bz4WHc for ; Fri, 8 Nov 2019 15:29:49 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 96C73E8 for ; Fri, 8 Nov 2019 15:29:49 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id xA8FTnp7091613 for ; Fri, 8 Nov 2019 15:29:49 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id xA8FTncg091610 for elastic@FreeBSD.org; Fri, 8 Nov 2019 15:29:49 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: elastic@FreeBSD.org Subject: [Bug 229322] net/py-urllib3: Update to 1.24.3 (or 1.25.6 if possible) Date: Fri, 08 Nov 2019 15:29:49 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: needs-patch, needs-qa, security X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: kai@FreeBSD.org X-Bugzilla-Status: In Progress X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: kai@FreeBSD.org X-Bugzilla-Flags: maintainer-feedback? merge-quarterly? X-Bugzilla-Changed-Fields: attachments.created Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-elastic@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Support of ElasticSearch-related ports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 08 Nov 2019 15:29:50 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D229322 --- Comment #21 from Kai Knoblich --- Created attachment 208975 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D208975&action= =3Dedit py-urllib-1.25.6.patch Attached is a new patch that updates net/py-urllib3 to 1.25.6. It contains = also following modifications: - Convert the dependencies which are declared as extra dependencies in setu= p.py into OPTIONS - Set the options as default that were used by the previous RUN_DEPENDS - Update the TEST_DEPENDS and add a "do-test" target to make future QA easi= er - Remove the pkg-message, the related variable and patch as the info about = the broken IPv6 support of net/py-socks (was broken with 1.5.7) is obsolete. - Remove the limitation for security/py-certifi. It has no Python version restriction in setup.py and it's more likely a remnant of the time when the= re were separate versions of www/py-urllib3. See ports r443069 for some detail= s. - Separate USES block QA: ~~~ - poudriere (11.3-, 12.0, 12.1-RELEASE, 13.0-CURRENT@r353466 amd64) for each py27 + py36 flavor -> OK - "Mini" Exp-Runs with 11.3-, 12.0- and 12.1-RELEASE against all direct consumers of net/py-urllib3 and www/py-requests -> OK Results of "make test" with all tests enabled: 11.3-RELEASE, Python 3.6: > 1061 passed, 245 skipped, 121 warnings in 29.94 seconds 11.3-RELEASE, Python 2.7: > 1059 passed, 247 skipped, 86 warnings in 34.71 seconds 12.0-, 12.1-RELEASE, 13.0-CURRENT@r353466, Python 3.6: > 1 failed, 1130 passed, 175 skipped, 125 warnings in 51.85 seconds 12.0-, 12.1-RELEASE, 13.0-CURRENT@r353466, Python 2.7:=20 > 1 failed, 1128 passed, 177 skipped, 86 warnings in 51.86 seconds - With FreeBSD 11.3 there are many skipped tests because of the OpenSSL ver= sion in base that has no TLSv3 support. - With FreeBSD >=3D 12.0 one test permanently fails (=3D "test_ssl_read_tim= eout") but IMHO this shouldn't be a blocker because that test also fails with net/py-urllib3 1.22. But I'll do some investigation why it fails but I alre= ady excluded that test in the attached patch. TODO: ~~~~~ - In-depth checking - Investigate why 'test_ssl_read_timeout' fails - Request an Exp-Run? --=20 You are receiving this mail because: You are on the CC list for the bug.=