From owner-freebsd-ports@FreeBSD.ORG Tue Sep 2 00:17:17 2014 Return-Path: Delivered-To: freebsd-ports@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 41E19B2B for ; Tue, 2 Sep 2014 00:17:17 +0000 (UTC) Received: from quine.pinyon.org (quine.pinyon.org [65.101.5.249]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 1D1641558 for ; Tue, 2 Sep 2014 00:17:16 +0000 (UTC) Received: by quine.pinyon.org (Postfix, from userid 122) id EF9F41603D0; Mon, 1 Sep 2014 17:17:09 -0700 (MST) X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on quine.pinyon.org X-Spam-Level: X-Spam-Status: No, score=-2.9 required=5.0 tests=ALL_TRUSTED,BAYES_00 autolearn=ham autolearn_force=no version=3.4.0 Received: from feyerabend.n1.pinyon.org (feyerabend.n1.pinyon.org [10.0.10.6]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by quine.pinyon.org (Postfix) with ESMTPSA id A8420160371 for ; Mon, 1 Sep 2014 17:17:06 -0700 (MST) Message-ID: <54050C82.7090607@pinyon.org> Date: Mon, 01 Sep 2014 17:17:06 -0700 From: "Russell L. Carter" User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:31.0) Gecko/20100101 Thunderbird/31.0 MIME-Version: 1.0 To: freebsd-ports@freebsd.org Subject: poudriere and DISABLE_VULNERABILITIES Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 02 Sep 2014 00:17:17 -0000 Greetings, root@terpsichore> cat /usr/local/etc/poudriere.d/make.conf # DISABLE_VULNERABILITIES=YES root@terpsichore> Running poudriere I see that it does indeed concatenate that make.conf into its configuration. But all those rotten, terrible, awful buggy ancient security-nightmare linux-f10 ports still fail. What should I do instead? Thanks, Russell