From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id 08031158042 for ; Sun, 3 Nov 2024 05:33:32 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 42DA1E07F0; Sun, 3 Nov 2024 05:33:23 +0000 (UTC) Received: from m4.out4.mxs.au (m4.out4.mxs.au [110.232.143.188]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id A8915E07D9 for ; Sun, 3 Nov 2024 05:33:22 +0000 (UTC) Received: from fe.s2.ax.email (fe.s2.ax.email [110.232.143.210]) by out4.mxs.au (Halon) with ESMTPS (TLSv1.3) tls TLS_AES_256_GCM_SHA384 id 1c8cbb14-99a5-11ef-991c-00163c87da3f for ; Sun, 03 Nov 2024 16:33:09 +1100 (AEDT) Authentication-Results: fe.s2.ax.email; dkim=pass header.d=kenworthy.id.au header.b="tWYIQQ1d" Received: from be4.s3.ax.email (10.40.10.219) by fe.s2.ax.email (Axigen) with (TLS_AES_256_GCM_SHA384 encrypted) ESMTPSA id 1B4B6C; Sun, 3 Nov 2024 16:33:09 +1100 DKIM-Signature: v=1; a=rsa-sha256; d=kenworthy.id.au; s=axigen; c=relaxed/relaxed; q=dns/txt; h=from:date:to:cc:message-id:subject; bh=aT9SLmhyZKdhqZ3rm/Jcdjx+hcGCj/kpT+xJQXirErY=; b=tWYIQQ1dqlic7k+APiEH+Lcls/YE3BmAxbK3uVWZp0/AIvxRfhLGAtJGaZqBBHLTvj2+nAjpRzrVYYWDHLe2KQzh9emcyLSl1aWIMjhJX2RtOxSi+F3TvAQz4CbEOWWM28pV41uwsaFRSgv6u0FH5v38IIIIqmhW0+xkkQW9gCR2+z+1KJFnAx8ZiS+fO9B56xGd4Rp+0KkQdAbOapBnL1p1VNcU4dAQDG3LZS1KrU29nIG0S3JhhgMvVuyRRieCMEDigUxBZtY0jmcQCaMJPQYinGvQYvwvWBnqgYdRBls5e42lv9gV8g1p0EiRKl5xIhfS9v+HfFIm0eCnEyQHOw==; Authentication-Results: be4.s3.ax.email; dkim=none Authentication-Results: be4.s3.ax.email; spf=pass smtp.mailfrom=bill@kenworthy.id.au Received: from fe.s4.ax.email (10.40.10.220) by be4.s3.ax.email (Axigen) with (TLS_AES_256_GCM_SHA384 encrypted) ESMTPSA id 1C8753; Sun, 3 Nov 2024 16:33:09 +1100 Authentication-Results: fe.s4.ax.email; dkim=none Received: from mail.infra.localdomain (10.40.10.201) by fe.s4.ax.email (Axigen) with (ECDHE-RSA-AES128-GCM-SHA256 encrypted) ESMTPSA id 2784FD; Sun, 3 Nov 2024 16:33:09 +1100 Received: from localhost (mail.infra.localdomain [127.0.0.1]) by mail.infra.localdomain (Postfix) with ESMTP id A7AC0DC46B554 for ; Sun, 03 Nov 2024 13:33:08 +0800 (AWST) X-Virus-Scanned: amavisd-new at localdomain Received: from mail.infra.localdomain ([127.0.0.1]) by localhost (mail.infra.localdomain [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ppnw6vC6-LAo for ; Sun, 3 Nov 2024 13:33:03 +0800 (AWST) Message-ID: <0c8c5852-be7f-4a6a-815f-c082c133e72b@kenworthy.id.au> Date: Sun, 3 Nov 2024 13:33:02 +0800 Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-user@lists.gentoo.org Reply-to: gentoo-user@lists.gentoo.org X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [gentoo-user] python breakage To: gentoo-user@lists.gentoo.org References: <386007d2-a237-47c3-b88f-ffccccddae7e@kenworthy.id.au> Content-Language: en-AU, en-US From: William Kenworthy Organization: me@home In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit DomainKey-Status: no signature DKIM-Status: good Received-SPF: X-AXIGEN-DK-Result: No records X-AXIGEN-DKIM-Result: Ok X-Archives-Salt: 3ad7aa3d-776d-4b8a-9896-0081857fb5fa X-Archives-Hash: bc2b9afd3eab5f46d2873d2de899e084 On 2/11/24 10:04, Matt Jolly wrote: > Hi Bill, > > On 2/11/24 10:51, William Kenworthy wrote: > >> My questions (for gentoo) is this another gentoo only hack, or an >> upstream hard requirement and how can it be turned off. >> >> BillK > > This is PEP 668 in action. > > https://peps.python.org/pep-0668/ > https://packaging.python.org/en/latest/specifications/externally-managed-environments/#externally-managed-environments > > > While annoying the intent here is to stop users from shooting > themselves in the foot by breaking critical system packages. > > As you've identified, virtual environments are the "solution" > to this "problem". > > https://packaging.python.org/en/latest/specifications/virtual-environments/#virtual-environments > > > If you wish to go back to the old behaviour you can install mask > the EXTERNALLY_MANAGED file. > > Cheers, > > Matt > Hi Matt, as per my previous email I already know about "EXTERNALLY_MANAGED" - this is really independent of the the problem PEP668 addresses which is package managers.  What I have run into (see the error message I included with the previous email) is that after deleting the "EXTERNALLY_MANAGED" tokens something is now enforcing using a venv but isnt providing a workaround for older packages and those that dont use a venv.  I am not sure if its within python or gentoo so I am asking for a hint as its a lot of code to go through.  Nothing is showing up that I have found in searching so far as everything is assuming its a user doing a direct install, not a python module auto installing/updating missing deps on startup. BillK It isnt clear that is being caused by the