From owner-freebsd-gnome@FreeBSD.ORG Sun Mar 13 18:50:17 2005 Return-Path: Delivered-To: freebsd-gnome@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 84BCE16A4CE for ; Sun, 13 Mar 2005 18:50:17 +0000 (GMT) Received: from connectmail.carleton.ca (connectmail.carleton.ca [134.117.2.12]) by mx1.FreeBSD.org (Postfix) with ESMTP id 32E7843D46 for ; Sun, 13 Mar 2005 18:50:17 +0000 (GMT) (envelope-from adamw@FreeBSD.org) Received: from [192.168.1.141] ([134.117.145.25]) by connectmail.carleton.ca (iPlanet Messaging Server 5.2 HotFix 2.02 (built Oct 21 2004)) with ESMTPSA id <0IDB0094C0BT42@connectmail.carleton.ca> for freebsd-gnome@freebsd.org; Sun, 13 Mar 2005 13:50:17 -0500 (EST) Date: Sun, 13 Mar 2005 13:50:36 -0500 From: Adam Weinberger In-reply-to: <20050313122613.337f7e4f.rpratt1950@earthlink.net> To: Randy Pratt Message-id: <42348B7C.4030701@FreeBSD.org> MIME-version: 1.0 Content-type: text/plain; charset=ISO-8859-1; format=flowed Content-transfer-encoding: 7BIT X-Accept-Language: en-us, en User-Agent: Mozilla Thunderbird 1.0 (Windows/20041206) References: <20050313122613.337f7e4f.rpratt1950@earthlink.net> cc: freebsd-gnome@freebsd.org Subject: Re: Gnome-210 upgrade comments X-BeenThere: freebsd-gnome@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: GNOME for FreeBSD -- porting and maintaining List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 13 Mar 2005 18:50:17 -0000 Randy Pratt wrote: > If portaudit is being used and there are any installed ports which have > a security issue then gnome_upgrade.sh will fail. The gnome_upgrade.sh > does a pkg_deinstall and later tries to pkg_install which fails since > there is a security issue with that port. Hrmmn. You're not the first person to approach us about this. I wish that there were a better way to do this... but lofi suggested that we add DISABLE_VULNERABILITIES to the build environment. I wish that there were a way to do this without having to disable vulnerability checking for people who have explicitly called for it, but it does seem the simplest and most functional workaround. I'll commit that to gnome_upgrade.sh. > I noticed that when the gnome_update.sh script would stop that > quite a few packages that had been installed were still missing. > Being a bit more cautious, I always used the -restart option for > the script since I wasn't sure if starting the script fresh would > reinstall those packages. *nod* that's what the -restart option is there for. If you had re-run the script from the beginning, you wouldn't have gotten your applications back. I wish that there were a way to make this clearer. Do you have any suggestions on how to make sure that people understand that if something fails, they need only to correct that build problem (or remove the offending port from the upgrade list) and use the -restart option? # Adam -- Adam Weinberger adamw@magnesium.net || adamw@FreeBSD.org adamw@vectors.cx || adamw@gnome.org http://www.vectors.cx