Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 13 Feb 2007 21:12:37 -0800
From:      Kent Stewart <kstewart@owt.com>
To:        freebsd-questions@freebsd.org
Cc:        Bob <bob@tamara-b.org>
Subject:   Re: Forcing a portupgrade?
Message-ID:  <200702132112.38339.kstewart@owt.com>
In-Reply-To: <20070213215329.G2526@wonkity.com>
References:  <20070213172123.620e32b3@tania.servebbs.org> <20070213174754.088e97b9@tania.servebbs.org> <20070213215329.G2526@wonkity.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Tuesday 13 February 2007 21:00, Warren Block wrote:
> On Tue, 13 Feb 2007, Bob wrote:
> > On Tue, 13 Feb 2007 16:41:29 -0600
> >
> > Paul Schmehl <pauls@utdallas.edu> wrote:
> >> Yikes!  That's a bit drastic.  What's wrong with make
> >> DISABLE_VULNERABILITIES install?
> >
> > Where would I find the documentation on all the possible
> > command-line options to make? IE, where is DISABLE_VULNERABILITIES
> > documented?
>
> man ports
>
> ISTR using it with portupgrade with the -M option.
>

Here is what I use. I gave it an alias and called it portforce
portupgrade -puf -m -DDISABLE_VULNERABILITIES

Kent

> A probably-better way to fix the vulnerabilities of Mozilla is to
> switch to the newest version, which is now called Seamonkey.
>
> > I am sure I would have occasion to use others if I knew what and
> > where they were.
>
> Also in the ports man page.  Other targets also avoid brute-force
> removal of files, like rmconfig.
>
> -Warren Block * Rapid City, South Dakota USA
> _______________________________________________
> freebsd-questions@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> To unsubscribe, send any mail to
> "freebsd-questions-unsubscribe@freebsd.org"

-- 
Kent Stewart
Richland, WA

http://www.soyandina.com/ "I am Andean project".
http://users.owt.com/kstewart/index.html



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200702132112.38339.kstewart>