-
-
Notifications
You must be signed in to change notification settings - Fork 508
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Timeline for closing out OpenSSL 3 migration / dropping OpenSSL 1.1.1 #3838
Comments
From the side of conda-forge, aside from all other concerns, there's obviously an interest in closing this migration sooner rather than later, because it keeps many feedstocks on a doubled build matrix, which is especially painful for packages that need manual builds. |
Considering conda-forge on its own, I would really like to declare this migration complete (or, "as complete as it's going to get") sooner rather than later — the massive build matrixing is indeed very painful, IMO. I don't understand the migration machinery super well but I'd be tempted to say that we declare it done when the "Essential" packages above are dealt with, and mop up the rest as their maintainers deal with them. However, the status with regards to Anaconda is certainly important, and I don't think we should drop support for the 1.x series until we understand the timeline there. So hopefully at some point we'll get an update on that. Finally, regarding CPython and cryptography, I think that's actually a bit of a red herring — it's not like they're going to stick with OpenSSL 1.x rather than 3.x, and indeed 3.x is now supported; it's just that they may wish to move away from OpenSSL altogether in the future. That would be something to deal with, but is orthogonal to the OpenSSL update. |
It's supported in cryptography, but incomplete in CPython. Also, there's at least some speculation about pushing 1.1.1 past its EOL:
|
We discussed this at the core meeting. The main thing to discuss from our perspective is when we consider this done. Given OpenSSL 3 will become the only supported version in the Fall of 2023 and we are still migrating a few things (notably TensorFlow), we thought moving to OpenSSL 3 only by Spring of 2023 seemed like a reasonable timeline to be done, but we can pull this in sooner if the remaining pieces are in before then. Will discuss again in the New Year to see where things are and if that needs to change. |
As there hasn't been a contradicting view: I'm keen to give this a little longer as I still find I have too many issues with OpenSSL 3.x for it to be usable (hopefully I'll deal with them over the next few weeks). |
Yeah the general consensus at the meeting was this won't be closed until 2023. Spring 2023 seemed reasonable by most of those gathered. Maybe it is worth spelling out the specific issues encountered so they are tracked here? |
@chenghlee could you or someone on the Anaconda side please comment on your OpenSSL 1 to 3 plans? |
Anaconda is planning to kick off its repositories' OpenSSL 3.x migration in early 2023; the goal is definitely to get it done before September 2023. |
I think i resolved the tmate issue a while back. it was a different package that had an issuie. |
tmate still pins openssl 1 in the recipe, so it's not done yet. |
On second look, those pins are only there for testing. Still, I guess we should ensure that it works for both... |
Tensorflow is finally done! 🥳 In fact, because the manual builds there are so much work (~roughly one build per overnight run), it already preempted the closing of the migration and only built for OpenSSL 3. That leaves the ruby ecosystem, where the ruby 3 migration got started (ruby 2.x won't support OpenSSL 3), but it seems that there were some layout changes and several packages there don't build anymore. |
At this point in the process, it might make sense to reorganize the (very helpful!) lists at the top of this issue to more clearly separate what's done and what's left to do. As far as I can tell, the remaining to-dos are all approximately equal priority? |
I tried to do this already - all that's left (to my knowledge) is under the "Todo:" heading. I don't know how to judge the importance of ruby, but from my POV the remaining packages are not important enough to hold up the closing of the migration. PS. Happy for suggestions about how to make the OP more clear |
@h-vetinari Yes, at this point I think the closing of the migration is more about a policy choice of when to start de-matrixing OpenSSL 1.1, rather than about resolving technical blockers. OK if I edit the top post? |
Go right ahead! |
For various reasons1, the list in the OP here is more comprehensive than what's shown on the migrator status.
Would suggest to keep it in this issue, but don't mind moving to the PR if that's what people prefer. Footnotes
|
Question on this item from the list:
Should we open a PR manually migrating this feedstock? Edit: Actually looks like this was done quite some time ago ( conda-forge/libtins-feedstock#2 ) |
On a different list item:
We now have a Ruby 3 migrator for |
Hello folks! As per the last core meeting, there have been no comments against closing this migration once and for all. In other words, we can proceed and close the OpenSSL 3 migration. cc @h-vetinari |
Marking PR ( #3892 ) ready for review. Think we can merge it |
This is now fixed by conda-forge/libpcap-feedstock#18 . |
Just an FYI for anyone curious: OpenSSL 1.1.1 is end-of-life as of today. |
One of the longest-running migrations (and painful for the solver, see here) has been the one for OpenSSL 3.
However, due to the efforts of many people, this is now turning into home stretch (more below).
The reason for opening this issue is that people might not be ready for a world in which there are no more 1.1.1 builds, if only due to the sheer lengths of time it's been there.
In particular, anaconda does not yet build for OpenSSL 3, which would mean that after dropping 1.1.1, many of their packages would not be co-installable with continuing-to-be-migrated conda-forge ones anymore.
I don't know Anaconda's timeline, but the EOL for OpenSSL 1.1.1 is in 2023/09/11, so only 9 months away.
CC @chenghlee @jezdez @skupr-anaconda @AndrewVallette
Status of remaining OpenSSL 3 PRs
(not everything shows up in the migrator status; I also used the recently much-improved GH search)
Essential
Ready to merge
openssl
pin kubo-feedstock#11Todo:
# [osx]
and one is# [win]
for OpenSSL)Problematic
Ruby 2.5 & 2.6 will very likely not support OpenSSL 3
Started a ruby 3 migration:
Feedstocks that still pin to 1.1.1
(sidenote: loving the new GH search functionality 🤩 )
Abandoned / Obsolete Packages
mysql-connector-cpp
)PS. There are some grumblings in upstream CPython about not moving to OpenSSL 3, and the cryptography devs are also not enthusiastic about OpenSSL 3 (despite supporting it from the start, and defaulting to it nowadays). However, there are no really compelling alternatives, so assuming OpenSSL 3 stabilizes a bit in the perception of the community, it might be the least bad option after all.
The text was updated successfully, but these errors were encountered: