From owner-freebsd-gnome@FreeBSD.ORG Sat Apr 26 19:10:01 2014 Return-Path: Delivered-To: gnome@smarthost.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 48F55FC for ; Sat, 26 Apr 2014 19:10:01 +0000 (UTC) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 371FF1A82 for ; Sat, 26 Apr 2014 19:10:01 +0000 (UTC) Received: from freefall.freebsd.org (localhost [127.0.0.1]) by freefall.freebsd.org (8.14.8/8.14.8) with ESMTP id s3QJA1c0025351 for ; Sat, 26 Apr 2014 19:10:01 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.8/8.14.8/Submit) id s3QJA1Ot025350; Sat, 26 Apr 2014 19:10:01 GMT (envelope-from gnats) Date: Sat, 26 Apr 2014 19:10:01 GMT Message-Id: <201404261910.s3QJA1Ot025350@freefall.freebsd.org> To: gnome@FreeBSD.org From: Kevin Oberman Subject: Re: ports/189030: sysutils/brasero build failure X-BeenThere: freebsd-gnome@freebsd.org X-Mailman-Version: 2.1.17 Precedence: list Reply-To: Kevin Oberman List-Id: GNOME for FreeBSD -- porting and maintaining List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 26 Apr 2014 19:10:01 -0000 The following reply was made to PR ports/189030; it has been noted by GNATS. From: Kevin Oberman To: bug-followup@FreeBSD.org, sbruno@freebsd.org Cc: Subject: Re: ports/189030: sysutils/brasero build failure Date: Sat, 26 Apr 2014 12:01:27 -0700 --047d7b15a4cd9c446804f7f6b57e Content-Type: text/plain; charset=UTF-8 This is a dup of ports/189015 which contains the correct patch. -- R. Kevin Oberman, Network Engineer, Retired E-mail: rkoberman@gmail.com --047d7b15a4cd9c446804f7f6b57e Content-Type: text/html; charset=UTF-8
This is a dup of ports/189015 which contains the correct patch.
--
R. Kevin Oberman, Network Engineer, Retired
E-mail: rkoberman@gmail.com
--047d7b15a4cd9c446804f7f6b57e--