My VPN provider does not allow ipv6, so I disable the interface to prevent leaks. However, this causes the OpenVPN test file `t_cltsrv.sh` to fail when building. It gives this error: Options error: Bad protocol: 'udp6local'. Allowed protocols with --proto option: [proto-uninitialized] [udp] [tcp-server] [tcp-client] [tcp] [udp6] [tcp6-server] [tcp6-client] [tcp6] I've disabled ipv6 with these rc.conf entries: ip6addrctl_enable="NO" ip6addrctl_policy="ipv4_prefer" ipv6_activate_all_interfaces="NO"
I can't reproduce this with the options you're giving, but I'll add some spacing to the test script to see if it helps. NOTE: the self-test assumes that you do have IPv6 if the lo0 interface has any inet6 address, and it will use that for the testing.
A commit references this bug: Author: mandree Date: Sat Aug 27 12:23:58 UTC 2016 New revision: 420973 URL: https://svnweb.freebsd.org/changeset/ports/420973 Log: Fix self-tests in poudriere, make them more robust [1]. The self-tests used to fail in poudriere with dependency cycles in Makefile that weren't visible earlier. Conditionally change ALL_TARGET to check (do not use all check, that would require gmake) if the TEST option is set (default), or set TEST_TARGET if the TEST option is unset. While I am unable to reproduce 212146 claiming the self-tests fail on an IPv6-disabled host, and I believe it's a red herring masking a local configuration issue, doubt sed(1) and add blanks, and be sure to add the "proto" earlier. The reporter didn't mention his OS version. No PORTREVISION bump since the default build is unaffected. PR: 212146 [1] Changes: head/security/openvpn/Makefile head/security/openvpn/files/patch-tests__t_cltsrv.sh