From owner-freebsd-questions@freebsd.org Mon Feb 22 07:20:43 2021 Return-Path: Delivered-To: freebsd-questions@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 3AB9D54ACFF for ; Mon, 22 Feb 2021 07:20:43 +0000 (UTC) (envelope-from contact@evilham.com) Received: from yggdrasil.evilham.com (yggdrasil.evilham.com [IPv6:2a02:2770::216:3eff:fee1:cf9]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4DkYVy0hkzz4k2J for ; Mon, 22 Feb 2021 07:20:41 +0000 (UTC) (envelope-from contact@evilham.com) Received: from yggdrasil.evilham.com (localhost [IPv6:::1]) by yggdrasil.evilham.com (Postfix) with ESMTP id 4DkYVm3tMyzF0V for ; Mon, 22 Feb 2021 08:20:32 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=evilham.com; h=from:to :subject:references:in-reply-to:date:message-id:mime-version :content-type; s=mail; bh=MEQMyFw1YrbUdwe1cdfO4lYE/Is=; b=1+5qu6 N3ywtDAkXMPiXMfVPTSXAirSmsWiaJC5FtL8hdA2Z1FdEMNzlZdlOTkhQ0IhIthU kgaPe4t1dEEgEWoCX3Eoo/Vp+4vb2BrJjYz1u++uHZ/elq40AKNPOp0FlgMV8vQN Kig6Rb4+UjBTGzYCJOIzqUNF194ESTbrUkC9Y= Received: from yggdrasil.evilham.com (unknown [IPv6:2a0a:e5c1:121:1::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by yggdrasil.evilham.com (Postfix) with ESMTPSA id 4DkYVl6jkXzF0S for ; Mon, 22 Feb 2021 08:20:31 +0100 (CET) From: Evilham To: freebsd-questions@freebsd.org Subject: Re: Certbot crashes after update of python installed References: <018a01d70888$7b2fe5b0$718fb110$@seibercom.net> <20210221205146.364356E6BDB0@ary.qy> In-reply-to: <20210221205146.364356E6BDB0@ary.qy> Date: Mon, 22 Feb 2021 08:20:30 +0100 Message-ID: <6b735533-ad9a-441d-817f-afb4100b43bc@yggdrasil.evilham.com> MIME-Version: 1.0 Content-Type: text/plain; format=flowed X-Rspamd-Queue-Id: 4DkYVy0hkzz4k2J X-Spamd-Bar: ---- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=evilham.com header.s=mail header.b=1+5qu6 N; dmarc=pass (policy=none) header.from=evilham.com; spf=pass (mx1.freebsd.org: domain of contact@evilham.com designates 2a02:2770::216:3eff:fee1:cf9 as permitted sender) smtp.mailfrom=contact@evilham.com X-Spamd-Result: default: False [-4.00 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; RBL_DBL_DONT_QUERY_IPS(0.00)[2a02:2770::216:3eff:fee1:cf9:from]; R_DKIM_ALLOW(-0.20)[evilham.com:s=mail]; ARC_NA(0.00)[]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; R_SPF_ALLOW(-0.20)[+mx]; MIME_GOOD(-0.10)[text/plain]; TO_DN_NONE(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-questions@freebsd.org]; RCPT_COUNT_ONE(0.00)[1]; SPAMHAUS_ZRD(0.00)[2a02:2770::216:3eff:fee1:cf9:from:127.0.2.255]; RCVD_COUNT_THREE(0.00)[3]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; DKIM_TRACE(0.00)[evilham.com:+]; DMARC_POLICY_ALLOW(-0.50)[evilham.com,none]; NEURAL_HAM_SHORT(-1.00)[-1.000]; NEURAL_HAM_LONG(-1.00)[-1.000]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; RCVD_TLS_LAST(0.00)[]; ASN(0.00)[asn:196752, ipnet:2a02:2770::/32, country:NL]; MAILMAN_DEST(0.00)[freebsd-questions] X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 22 Feb 2021 07:20:43 -0000 On dg., febr. 21 2021, John Levine wrote: > It's telling you what the problem is: > >> raise VersionConflict(dist, req).with_context(dependent_req) >>pkg_resources.ContextualVersionConflict: (cryptography 2.9.2 >>(/usr/local/lib/python3.7/site-packages), >>Requirement.parse('cryptography>=3.2'), {'PyOpenSSL'}) > > It now requires version 3.2 or newer of the python cryptography > package > but the version in the ports and packages is only 2.9.2. > > You might drop a note to the person who maintains the > py-cryptography > port to see if he wants help updating it, or if you're feeling > brave, > you can use the python pip package manager to update it locally. > > (as root) > # pkg install rust # the crypto bits are written in rust > > # pip install -U cryptography > > # pkg lock py37-cryptography # tell freebsd package manager not > to downgrade it > # pkg delete rust # if you don't otherwise need rust, get > back 500MB > > I did this on FBSD 12.2 and it worked, leaving me with version > 3.4.6 of cryptography. Not 100% sure if following would have a positive effect on the ports system, but it certainly would be useful for FreeBSD+pip users if someone has the bandwidth to get involved upstream (the Python cryptography project: https://github.com/pyca/cryptography) and help them publish wheels for FreeBSD. That would mean, e.g. that pulling rust is not necessary for pip install cryptography. -- Evilham