Bug 204185 - security/py-kerberos: Update to 1.2.2
Summary: security/py-kerberos: Update to 1.2.2
Status: Closed FIXED
Alias: None
Product: Ports & Packages
Classification: Unclassified
Component: Individual Port(s) (show other bugs)
Version: Latest
Hardware: Any Any
: --- Affects Only Me
Assignee: Dan Langille
URL:
Keywords: needs-patch, needs-qa
Depends on:
Blocks:
 
Reported: 2015-11-01 02:14 UTC by John W. O'Brien
Modified: 2018-01-14 00:15 UTC (History)
7 users (show)

See Also:
bugzilla: maintainer-feedback? (dvl)


Attachments
security/py-kerberos: update to 1.2.2 (2.58 KB, patch)
2015-11-01 02:14 UTC, John W. O'Brien
no flags Details | Diff
security/py-kerberos: portlint output (221 bytes, text/plain)
2015-11-01 02:14 UTC, John W. O'Brien
no flags Details
security/py-kerberos: poudriere testport output (2.7) (20.90 KB, text/plain)
2015-11-01 02:15 UTC, John W. O'Brien
no flags Details
security/py-kerberos: poudriere testport output (3.4) (20.81 KB, text/plain)
2015-11-01 02:15 UTC, John W. O'Brien
no flags Details
py-kerberos-1.2.4.diff (2.71 KB, patch)
2016-05-02 23:43 UTC, David Shane Holden
no flags Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description John W. O'Brien 2015-11-01 02:14:28 UTC
Created attachment 162660 [details]
security/py-kerberos: update to 1.2.2

Changelog:

    *   Update to 1.2.2
    *   Patch setup.py to enable py3k
    *   Refactor setup.py patching

QA:

See attached portlint and poudriere logs.
Comment 1 John W. O'Brien 2015-11-01 02:14:52 UTC
Created attachment 162661 [details]
security/py-kerberos: portlint output
Comment 2 John W. O'Brien 2015-11-01 02:15:22 UTC
Created attachment 162662 [details]
security/py-kerberos: poudriere testport output (2.7)
Comment 3 John W. O'Brien 2015-11-01 02:15:41 UTC
Created attachment 162663 [details]
security/py-kerberos: poudriere testport output (3.4)
Comment 4 Kubilay Kocak freebsd_committer freebsd_triage 2015-11-01 04:44:53 UTC
@John, can you confirm this links against the expected krb5 library?

I have a work in progress patch to this port which added OPTIONS to switch between: 

+OPTIONS_SINGLE_GSSAPI= GSSAPI_BASE GSSAPI_HEIMDAL GSSAPI_MIT

If you want to take a look at it to integrate those changes let me know
Comment 5 John W. O'Brien 2015-11-01 13:59:58 UTC
@koobs:

I expected it to link against MIT Kerberos, and it does.

% ldd /usr/local/lib/python2.7/site-packages/kerberos.so
/usr/local/lib/python2.7/site-packages/kerberos.so:
        libpython2.7.so.1 => /usr/local/lib/libpython2.7.so.1 (0x801608000)
        libgssapi_krb5.so.2.2 => /usr/local/lib/libgssapi_krb5.so.2.2 (0x8019c3000)
        libkrb5.so.3.3 => /usr/local/lib/libkrb5.so.3.3 (0x801c0a000)
        libk5crypto.so.3.1 => /usr/local/lib/libk5crypto.so.3.1 (0x801eea000)
        libcom_err.so.3.0 => /usr/local/lib/libcom_err.so.3.0 (0x802119000)
        libc.so.7 => /lib/libc.so.7 (0x800821000)
        libthr.so.3 => /lib/libthr.so.3 (0x80231c000)
        libintl.so.8 => /usr/local/lib/libintl.so.8 (0x802540000)
        libutil.so.9 => /lib/libutil.so.9 (0x80274b000)
        libm.so.5 => /lib/libm.so.5 (0x80295d000)
        libkrb5support.so.0.1 => /usr/local/lib/libkrb5support.so.0.1 (0x802b86000)

I would also be interested in testing your work. However, first there are some basic smoke tests that are failing, and I'm not sure yet if it's me or v1.2.2.
Comment 6 John W. O'Brien 2015-11-02 01:28:18 UTC
Something changed from 1.1.1 to 1.2.2 to break (at least) the following.

    % pkg info -x kerberos
    py27-kerberos-1.1.1_1
    % sudo python -c "
        import kerberos
        result, ctx = kerberos.authGSSServerInit('HTTP')
        print(result==kerberos.AUTH_GSS_COMPLETE)
        "
    True

vs.

    % pkg info -x kerberos
    py27-kerberos-1.2.2
    % sudo python -c "
        import kerberos
        result, ctx = kerberos.authGSSServerInit('HTTP')
        print(result==kerberos.AUTH_GSS_COMPLETE)
        "
    Traceback (most recent call last):
      File "<string>", line 3, in <module>
    kerberos.GSSError: (('Unspecified GSS failure.  Minor code may provide more
    information', 851968), ('No Kerberos credentials available', -1765328243))

I've done a little bit of digging, and I suspect a change to the way that kerberosgss.c:authenticate_gss_server_init() calls gss_acquire_cred(), but I don't yet have proof.

The point is that we may wish to defer this update.
Comment 7 Kubilay Kocak freebsd_committer freebsd_triage 2015-11-02 02:28:13 UTC
@John, if/when in situations such as this (attached patch may not be ready) always obsolete it, then set 'needs-patch' and/or 'needs-qa' as necessary. YOu can always 'unobsolete' an attachment later if necessary.

Descriptions of keywords and what theyre used for can be found here: 

https://bugs.freebsd.org/bugzilla/describekeywords.cgi
Comment 8 John W. O'Brien 2015-11-02 12:00:42 UTC
Comment on attachment 162660 [details]
security/py-kerberos: update to 1.2.2

Obsoleting this patch pending investigation and resolution of apparent regressions in 1.2.2.
Comment 9 John W. O'Brien 2015-11-02 12:01:31 UTC
@koobs: The keywords do not appear editable to me.
Comment 10 Kubilay Kocak freebsd_committer freebsd_triage 2015-11-02 12:04:25 UTC
That's annoying.
Comment 11 John W. O'Brien 2015-11-22 17:04:07 UTC
This is the upstream commit and associated ticket that breaks my test case.

https://trac.calendarserver.org/changeset/14486
https://trac.calendarserver.org/ticket/862

I have opened a new upstream ticket to the effect.

https://trac.calendarserver.org/ticket/924
Comment 12 Kubilay Kocak freebsd_committer freebsd_triage 2015-11-27 02:05:40 UTC
@John, what needs to be done to progress this issue, or resolve it?
Comment 13 John W. O'Brien 2015-11-27 02:21:58 UTC
@koobs: I will rebase my patch on r401816 (dvl's work) and add a new patch that reverts the upstream r14486. This will break support for S4U2Proxy, but I have a hard time seeing how that's really a problem.
Comment 14 Kubilay Kocak freebsd_committer freebsd_triage 2015-11-27 02:51:24 UTC
@John, Understood thank you.
Comment 15 John W. O'Brien 2015-11-29 20:44:40 UTC
I'm blocked on this for the time being. I was having trouble getting tests to pass with my patch, so I rolled back to make sure I could get them to pass on the current version, and they don't. I've submitted bug #204899 to address some apparent problems with dvl's patches that add support for BASE and HEIMDAL Kerberos, and will resume work on this patch once that is resolved.

Also, adding dvl@ to the CC list for this bug as the new maintainer for security/py-kerberos. Hi Dan!
Comment 16 Dan Langille freebsd_committer freebsd_triage 2015-11-30 01:28:56 UTC
(In reply to John W. O'Brien from comment #15)
Sadly John, I don't know what to do in order to fix this.  I was working on it for a $WORK project and will see if I can devote time to it this week.
Comment 17 John W. O'Brien 2015-11-30 03:06:55 UTC
(In reply to Dan Langille from comment #16)
@dvl, I'm in no particular rush, and will be glad to help you track down the root cause. I've been trying to get up to speed on how to use GSSAPI directly in C so that I can make more sense of how PyKerberos is using it.
Comment 18 David Shane Holden 2016-05-02 23:43:19 UTC
Created attachment 169898 [details]
py-kerberos-1.2.4.diff

The bug listed in comment 6 appears to have been fixed upstream in 1.2.3.  This patch updates the port to 1.2.4.
Comment 19 commit-hook freebsd_committer freebsd_triage 2016-05-03 00:47:21 UTC
A commit references this bug:

Author: dvl
Date: Tue May  3 00:46:43 UTC 2016
New revision: 414499
URL: https://svnweb.freebsd.org/changeset/ports/414499

Log:
  Upgrade to 1.2.4
  Fixed bug noticed by John W. O'Brien <john@saltant.com>
  PR: 204185
  Submitted by: David Shane Holden <dpejesh@yahoo.com>

Changes:
  head/security/py-kerberos/Makefile
  head/security/py-kerberos/distinfo
  head/security/py-kerberos/files/extra-patch-src_kerberosgss.c
Comment 20 Dan Langille freebsd_committer freebsd_triage 2016-05-03 00:49:51 UTC
John: please test.  re #204899
Comment 21 Walter Schwarzenfeld freebsd_triage 2018-01-09 06:16:33 UTC
Makefile shows 1.2.5
I think this could closed.
Comment 22 Dan Langille freebsd_committer freebsd_triage 2018-01-09 14:41:04 UTC
(In reply to w.schwarzenfeld from comment #21)
I will defer to John Baldwin.
Comment 23 John W. O'Brien 2018-01-13 23:14:43 UTC
(In reply to Dan Langille from comment #22)

I'm guessing you mean me.

The tests in comment #6 now pass with all three GSSAPI libs and all four versions of python. That plus the fact that the port has been upgraded past 1.2.2 adds up to closing this bug. 

I believe I can still reproduce the failing tests I reported in bug #204899, but it clearly didn't block this upgrade.