Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Rebuild for openssl3 #98

Conversation

regro-cf-autotick-bot
Copy link
Contributor

This PR has been triggered in an effort to update openssl3.

Notes and instructions for merging this PR:

  1. Please merge the PR only after the tests have passed.
  2. Feel free to push to the bot's branch to update this PR if needed.

Please note that if you close this PR we presume that the feedstock has been rebuilt, so if you are going to perform the rebuild yourself don't close this PR until the your rebuild has been merged.

If this PR was opened in error or needs to be updated please add the bot-rerun label to this PR. The bot will close this PR and schedule another one. If you do not have permissions to add this label, you can use the phrase @conda-forge-admin, please rerun bot in a PR comment to have the conda-forge-admin add it for you.

This PR was created by the regro-cf-autotick-bot. The regro-cf-autotick-bot is a service to automatically track the dependency graph, migrate packages, and propose package version updates for conda-forge. Feel free to drop us a line if there are any issues! This PR was generated by https://github.com/regro/autotick-bot/actions/runs/2353479475, please use this URL for debugging.

@conda-forge-linter
Copy link

Hi! This is the friendly automated conda-forge-linting service.

I just wanted to let you know that I linted all conda-recipes in your PR (recipe) and found it was in an excellent condition.

@hmaarrfk
Copy link
Contributor

Bug step forward!

@h-vetinari
Copy link
Member

Big step forward!

AFAICT this is the same status we had in #80 (or at least had here in the past) - windows fails while loading the DLL, the rest passes.

@hmaarrfk
Copy link
Contributor

@hmaarrfk
Copy link
Contributor

I think we need the legacy stuff you mentionned in : #80 (comment)

For what its worth, it is failing at this assert statement:

 cls._legacy_provider != cls.ffi.NULL

https://github.com/pyca/cryptography/blob/main/src/cryptography/hazmat/bindings/openssl/binding.py#L177

@h-vetinari
Copy link
Member

I didn't see the ping in conda-forge/openssl-feedstock#96 (maybe due to it being edited in, or perhaps I missed it). Might as well try...?

@h-vetinari
Copy link
Member

@conda-forge-admin, please rerender

@h-vetinari h-vetinari force-pushed the rebuild-openssl3-0-1_h370c22 branch from e319ccf to 08416a2 Compare July 7, 2022 06:21
@hmaarrfk
Copy link
Contributor

Lets just skip the memory leak tests?

@h-vetinari
Copy link
Member

h-vetinari commented Jul 12, 2022

Lets just skip the memory leak tests?

I'm not comfortable with pushing leaking builds to people. Some of those will inevitably used in long-running services, and leaking memory continuously is not great at all. More importantly, leaking memory from OpenSSL could be a security risk, so I'm pretty strongly opposed to just skip ahead (without a plan).

I've been wanting to file an openssl issue, but haven't gotten around to it yet...

@h-vetinari
Copy link
Member

@conda-forge-admin, please rerender

@jaimergp
Copy link
Member

jaimergp commented Aug 3, 2022

I wonder what's so special about CPython 3.8 - it's the only CPython version that passes with no leaks 🤷

@h-vetinari
Copy link
Member

I wonder what's so special about CPython 3.8 - it's the only CPython version that passes with no leaks 🤷

I had the exact same question, asked upstream for thoughts on this. No new insights so far though...

@jaimergp
Copy link
Member

jaimergp commented Aug 3, 2022

One hypothesis: CPython 3.8 introduced a change that prevents the leak, but it was reverted at some point in the 3.9 cycle back to 3.7-like behavior. Maybe swiping through the micro versions of Python might reveal a closer version range?

@h-vetinari
Copy link
Member

h-vetinari commented Aug 3, 2022

No new insights so far though...

(Except that this variance over python minor versions makes it much less likely that it's a openssl-only issue, and more likely an issue with (C)Python)

@h-vetinari
Copy link
Member

One hypothesis: CPython 3.8 introduced a change that prevents the leak, but it was reverted at some point in the 3.9 cycle back to 3.7-like behavior. Maybe swiping through the micro versions of Python might reveal a closer version range?

That sounds like a pretty good idea!

@ngam
Copy link

ngam commented Aug 3, 2022

@h-vetinari is letting the unix ones pass through an option at all? In a separate PR, so that this remains open. As you said in different threads, this has become a pain point in several corners... releasing the unix may help, but a maintainer will need to keep an eye on fixing windows eventually...

@h-vetinari
Copy link
Member

@h-vetinari is letting the unix ones pass through an option at all?

Not really, unless we accept that the rest of the openssl migration stalls (not useful) or fully split out windows from the migration. I guess the latter is a choice we could make, and eventually redo a windows-only migration.

@jaimergp
Copy link
Member

One hypothesis: CPython 3.8 introduced a change that prevents the leak, but it was reverted at some point in the 3.9 cycle back to 3.7-like behavior. Maybe swiping through the micro versions of Python might reveal a closer version range?

For completeness, these were the results: #102 (comment)

Same conclusion: only Python 3.8 works.

@regro-cf-autotick-bot
Copy link
Contributor Author

Due to the bot-rerun label I'm closing this PR. I will make another one as appropriate. This was generated by https://github.com/regro/autotick-bot/actions/runs/3282524611

@regro-cf-autotick-bot regro-cf-autotick-bot deleted the rebuild-openssl3-0-1_h370c22 branch October 19, 2022 14:45
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bot-rerun Instruct the bot to retry the PR
Projects
None yet
Development

Successfully merging this pull request may close these issues.

7 participants