From owner-freebsd-current@freebsd.org Mon Feb 24 19:23:43 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 874DB24058B for ; Mon, 24 Feb 2020 19:23:43 +0000 (UTC) (envelope-from david@catwhisker.org) Received: from mx.catwhisker.org (mx.catwhisker.org [107.204.234.170]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 48RBnB16m0z47jW for ; Mon, 24 Feb 2020 19:23:41 +0000 (UTC) (envelope-from david@catwhisker.org) Received: from albert.catwhisker.org (localhost [127.0.0.1]) by albert.catwhisker.org (8.15.2/8.15.2) with ESMTP id 01OJNXM1016793; Mon, 24 Feb 2020 19:23:33 GMT (envelope-from david@albert.catwhisker.org) Received: (from david@localhost) by albert.catwhisker.org (8.15.2/8.15.2/Submit) id 01OJNXjY016792; Mon, 24 Feb 2020 11:23:33 -0800 (PST) (envelope-from david) Date: Mon, 24 Feb 2020 11:23:33 -0800 From: David Wolfskill To: "O. Hartmann" Cc: FreeBSD CURRENT Subject: Re: r358062(ncurses) breaks installed ports, howto check? Message-ID: <20200224192333.GE1349@albert.catwhisker.org> Mail-Followup-To: David Wolfskill , "O. Hartmann" , FreeBSD CURRENT References: <20200224202021.65ca7f64@thor.intern.walstatt.dynvpn.de> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="1xx5Q0+Cw+ObE54D" Content-Disposition: inline In-Reply-To: <20200224202021.65ca7f64@thor.intern.walstatt.dynvpn.de> X-Rspamd-Queue-Id: 48RBnB16m0z47jW X-Spamd-Bar: ----- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of david@catwhisker.org designates 107.204.234.170 as permitted sender) smtp.mailfrom=david@catwhisker.org X-Spamd-Result: default: False [-5.98 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:107.204.234.170]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.20)[multipart/signed,text/plain]; RCVD_TLS_LAST(0.00)[]; DMARC_NA(0.00)[catwhisker.org]; TO_MATCH_ENVRCPT_SOME(0.00)[]; TO_DN_ALL(0.00)[]; RCPT_COUNT_TWO(0.00)[2]; SIGNED_PGP(-2.00)[]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; SUBJECT_ENDS_QUESTION(1.00)[]; ASN(0.00)[asn:7018, ipnet:107.192.0.0/12, country:US]; MIME_TRACE(0.00)[0:+,1:+,2:~]; IP_SCORE(-2.58)[ip: (-9.67), ipnet: 107.192.0.0/12(-4.84), asn: 7018(1.64), country: US(-0.05)]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 24 Feb 2020 19:23:43 -0000 --1xx5Q0+Cw+ObE54D Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Mon, Feb 24, 2020 at 08:19:59PM +0100, O. Hartmann wrote: > Hello, >=20 > After r358062, many installed ports do not work anymore on several runnin= g systems (CURRENT). > /usr/src/UPDATING states one should reinstall all ncurses depending ports= , but no hint is > given! Can someone mitigate this lack of information? Is there a simple w= ay to check what > ports installed on a system rely on ncurses provided by the system? >=20 > Thanks in advance, >=20 > oh Another alternative would be to install the (new) misc/compat12x port. Peace, david --=20 David H. Wolfskill david@catwhisker.org "Racism is a poison, hatred is a poison." -- Angela Merkel See http://www.catwhisker.org/~david/publickey.gpg for my public key. --1xx5Q0+Cw+ObE54D Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQGTBAEBCgB9FiEE4owz2QxMJyaxAefyQLJg+bY2PckFAl5UIrVfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUy OEMzM0Q5MEM0QzI3MjZCMTAxRTdGMjQwQjI2MEY5QjYzNjNEQzkACgkQQLJg+bY2 Pcn6dgf+LO8/3wkkuM5rec6I2IIvpHH9N3ZPSHVUwZ9qWVlnDbPmD0+99QMam+KE So7Bttl9Se5/T0mxoeFWcm0W2b4ye57MF6JWMlc6yFyZV017KcNTczWHFjvw2UQO /cA2bB9o7odQFApzKkBOMjoc1WC1lpGsbBp73aDppKdIQB74WoPFn8Z52c/gLWDU +Vg0DzFjRlT5fSqvy5w78QNXrCR2OhFdx3cS0sxHlViNgjtiVgVKh1agKmoc1nMj HYkoFvGhwbYSJH6bnq6v4xFcMArRDqT2OVixMA2NGo1CR5fI0Gkp5nQvlfQLTReh ejngagQu/A9osCWx/VxCgDIB8kCMDg== =ypgy -----END PGP SIGNATURE----- --1xx5Q0+Cw+ObE54D--