git sha of ports tree used to build packages from

2023-06-08 Thread Dave Cottlehuber
hi,

is there any way to know what commit was used from the ports tree, as the
base for the package builders? If not, can this be exposed somehow, maybe
in something like meta.conf ?

$ curl http://pkg.freebsd.org/FreeBSD:14:amd64/latest/meta.conf

version = 2;
packing_format = "txz";
manifests = "packagesite.yaml";
filesite = "filesite.yaml";
manifests_archive = "packagesite";
filesite_archive = "filesite";

I could use this commit to ensure my local poudriere ports branch isn't
ahead of what is pre-built on the official mirrors, and only rebase
up to what's there.

This would be a huge help in avoiding needless local poudriere rebuilds
when my ports tree is ahead of whatever the builders have done. Nothing
like watching cmake* openjdk* llvm* rust* etc starting up when all you
really needed was some trivial leaf package.

A+
Dave



OpenSSL 3.0 in the base system update

2023-06-08 Thread Ed Maste
As previously mentioned[1] FreeBSD 14.0 will include OpenSSL 3.0.  We
expect to merge the update to main in the near future (within the next
week or two) and are ready for wider testing.

Supported by the FreeBSD Foundation, Pierre Pronchery has been working
on the update in the src tree, with assistance from Enji Cooper
(ngie@), and me (emaste@). Thanks to Antoine Brodin (antoine@) and
Muhammad Moinur Rahman (bofh@) for ports exp-runs and
fixes/workarounds and to Dag-Erling (des@) for updating ldns in the
base system.

## Base system compatibility status

Most of the base system is ready for a seamless switch to OpenSSL 3.0.
For several components we've added `-DOPENSSL_API_COMPAT=0x1010L`
to CFLAGS to specify the API version, which avoids deprecation
warnings from OpenSSL 3.0. Changes have also been made to avoid
OpenSSL APIs already deprecated in OpenSSL 1.1. We can continue the
process of updating to contemporary APIs after OpenSSL 3.0 is in the
tree.

Additional changes are still required for libarchive and seven
Kerberos-related libraries or tools. Workarounds are ready to go along
with the OpenSSL 3 import, and proper fixes are in progress in the
upstream projects.

A segfault from `openssl x509` in the i386 ports exp-run is under
investigation and needs to be addressed prior to the merge.

## Ports compatibility

With bofh@'s recent www/node18 and www/node20 patches the ports tree
is in reasonable shape for OpenSSL 3.0 in the base system. The exp-run
(link below) has a list of the failing ports, and I've emailed all of
the maintainers as a heads-up. None of the remaining failures are
responsible for a large number of skipped ports (i.e., the failures
are either leaf ports or are responsible for only a small number of
skipped ports). I expect that some or many of these will need to be
addressed after the change lands in the src tree.

## Call for testing

We welcome feedback from anyone willing to test the work in progress.
Pierre's update can be obtained from the pull request[2] or by
fetching the branch[3]. If desired I will provide a large diff against
main.

## Links

- Base system OpenSSL 3.0 update tracking PR:
  https://bugs.freebsd.org/271615

- Ports exp-run with OpenSSL 3.0 in the base system:
  https://bugs.freebsd.org/271656

[1] https://lists.freebsd.org/archives/freebsd-current/2023-May/003609.html
[2] https://github.com/freebsd/freebsd-src/pull/760
[3] https://github.com/khorben/freebsd-src/tree/khorben/openssl-3.0.9



Re: git sha of ports tree used to build packages from

2023-06-08 Thread Tatsuki Makino
Hello.

Someone said something similar to that. :)
-> https://lists.freebsd.org/archives/freebsd-ports/2023-January/003292.html

It seems that the package download feature of poudriere-devel has to keep pace 
with the official builder.
Perhaps when updates are made to chromium, etc., the official will be delayed 
somewhat?

One of the reasons poudriere picks and chooses which packages to rebuild is 
that it cannot find the resulting package displayed by the following command.

pkg query -F 
/usr/local/poudriere/data/packages/jail-porttree/All/rust-1.69.0_2.pkg %dn-%dv

If rust is to use curl only for runtime linking, dynamic loading, or piping by 
executing commands, there would be little need to rebuild the entire rust.
Therefore, if only the discrepancy in the rust package is rewritten, packages 
can be built without any problems :)

Regards.

Dave Cottlehuber wrote on 2023/06/09 00:58:
> 
> This would be a huge help in avoiding needless local poudriere rebuilds
> when my ports tree is ahead of whatever the builders have done. Nothing
> like watching cmake* openjdk* llvm* rust* etc starting up when all you
> really needed was some trivial leaf package.




Re: OpenSSL 3.0 in the base system update

2023-06-08 Thread Eugene Grosbein
09.06.2023 0:13, Ed Maste wrote:

[skip]

> We welcome feedback from anyone willing to test the work in progress.

Is it possible to grab some binary snapshot of 14-CURRENT to install into a VM 
and test my port that fails build?
If not, how do I build 14-CURRENT with OpenSSL 3.0 myself?

Eugene




Re: OpenSSL 3.0 in the base system update

2023-06-08 Thread Matthias Fechner

Dear Ed,

Am 08.06.2023 um 20:13 schrieb Ed Maste:

Most of the base system is ready for a seamless switch to OpenSSL 3.0.
For several components we've added `-DOPENSSL_API_COMPAT=0x1010L`
to CFLAGS to specify the API version, which avoids deprecation
warnings from OpenSSL 3.0. Changes have also been made to avoid
OpenSSL APIs already deprecated in OpenSSL 1.1. We can continue the
process of updating to contemporary APIs after OpenSSL 3.0 is in the
tree.


at first thanks a lot to take care of it.
I only want to ask a question:

Regarding my information openssl 3.0 has a major performance problem 
compared to 1.1.
I have this information only from the haproxy mailing list, where many 
users downgraded from 3.0 to 1.1 as they were not able to handle the 
traffic anymore with the same hardware. Maybe talk to the developers of 
haproxy, they have a very deep knowledge of openssl.
OpenSSL 3.1 should be better, but what I read on the haproxy mailing 
list does not reaching the performance of 1.1.
(I do not have the technical background, but I only wanted to ask that 
you are aware of this issue)


Gruß
Matthias

--

"Programming today is a race between software engineers striving to
build bigger and better idiot-proof programs, and the universe trying to
produce bigger and better idiots. So far, the universe is winning." --
Rich Cook