From owner-freebsd-ports-bugs@freebsd.org Sun Feb 24 09:47:31 2019 Return-Path: Delivered-To: freebsd-ports-bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id C9E911518F69 for ; Sun, 24 Feb 2019 09:47:31 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 4730D8D853 for ; Sun, 24 Feb 2019 09:47:31 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id 0284E1518F66; Sun, 24 Feb 2019 09:47:31 +0000 (UTC) Delivered-To: ports-bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id E3DE91518F65 for ; Sun, 24 Feb 2019 09:47:30 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.ysv.freebsd.org (mxrelay.ysv.freebsd.org [IPv6:2001:1900:2254:206a::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.ysv.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 7D01C8D84F for ; Sun, 24 Feb 2019 09:47:30 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.ysv.freebsd.org (Postfix) with ESMTPS id B90E8D3B for ; Sun, 24 Feb 2019 09:47:29 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id x1O9lTrD033403 for ; Sun, 24 Feb 2019 09:47:29 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id x1O9lTwR033402 for ports-bugs@FreeBSD.org; Sun, 24 Feb 2019 09:47:29 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 235985] net/frr6: add frr-reload Date: Sun, 24 Feb 2019 09:47:27 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: yman@protonmail.ch X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: olivier@freebsd.org X-Bugzilla-Flags: maintainer-feedback? X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter flagtypes.name Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 24 Feb 2019 09:47:32 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D235985 Bug ID: 235985 Summary: net/frr6: add frr-reload Product: Ports & Packages Version: Latest Hardware: Any OS: Any Status: New Severity: Affects Only Me Priority: --- Component: Individual Port(s) Assignee: olivier@freebsd.org Reporter: yman@protonmail.ch Flags: maintainer-feedback?(olivier@freebsd.org) Assignee: olivier@freebsd.org In frr repository there are tools/frr-reload.py script, which can 'reload' current configuration of frr daemons without restarting them (works only in integrated-config mode). IMO frr pretty much useless without that tool as of now (YANG support and rollbacks is not ready). Can we get this script into main port? Or maybe in= to it's own port? For example it's distributed as frr-pythontools package for Linux. And if we can there are couple of problems, that must be solved: * where to put it? I'm not good in BSD hier, but maybe /usr/local/lib/frr = will do (Linux use /usr/lib/frr/) * how to execute it? FRR repo contains /tools/frr-reload shell script which call that python script in turn, but it is not included into frr-pythontools * sed binaries hard-links. /usr/bin/python3 and /usr/bin/vtysh is not suit= able for BSD I tested script on FreeBSD 12.0-RELEASE with python 3.7 and looks like it w= orks (both --test and --reload). --=20 You are receiving this mail because: You are the assignee for the bug.=