I see the following:

sh-3.2$ port list openssl\*
openssl                        @1.1.1c         devel/openssl
openssl10                      @1.0.2s         devel/openssl10
openssl11                      @1.1.1c         devel/openssl11
sh-3.2$ 
sh-3.2$ 
sh-3.2$ port installed openssl\*
The following ports are currently installed:
  openssl @1.0.2s_0
  openssl @1.1.1c_0 (active)
  openssl10 @1.0.2s_0 (active)
sh-3.2$ port select openssl

Apparently sometime recently, plain "openssl" changes from 1.0.x to 1.1.x.  At 
least the following ports may have problems with that - they're the smaller 
number that failed the rev-upgrade test compared to what failed with 1.0.2s_0 
active as openssl.
 elinks @0.11.7
 fetchmail @6.3.26+ssl
 gnome-vfs @2.24.4
 virtuoso-7 @7.2.5
 ipmitool @1.8.15
 xmms2 @0.8DrO_o+python27

They all appear to have dependencies on  openssl rather than explicitly on 
openssl10 or openssl11.

This is definitely not a comprehensive list, it's just the ones I had trouble 
with, all of which have a dependency on openssl.

It seems to me that anything that can work equally well with either can use 
openssl, but anything else should have an explicit dependency on openssl10 or 
openssl11 instead. In particular, anything that cannot yet work with 1.1.x 
should have an explicit dependency on openssl10 rather than openssl.

Does that make sense?

 Aside from those that have to be mutually exclusive, I'd prefer not to have to 
do without some ports to have others.

Reply via email to