From owner-freebsd-current@freebsd.org Mon Feb 24 19:38:24 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 4CEF12412DC for ; Mon, 24 Feb 2020 19:38:24 +0000 (UTC) (envelope-from yasu@utahime.org) Received: from gate.utahime.jp (gate.utahime.jp [183.180.29.210]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 48RC655Z9Hz4Vyk for ; Mon, 24 Feb 2020 19:38:21 +0000 (UTC) (envelope-from yasu@utahime.org) Received: from eastasia.home.utahime.org (eastasia.home.utahime.org [192.168.174.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by gate.utahime.jp (Postfix) with ESMTPS id 3A78955458 for ; Tue, 25 Feb 2020 04:38:12 +0900 (JST) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=utahime.org; s=maybe2019112701; t=1582573092; bh=aFlCw95jyVc54qAOlk9RGIMxpd1OCt4M6xpkL8/lYCw=; h=Date:To:Subject:From:In-Reply-To:References; b=AOtKhxgEhWiQefuZ1yY96wP3xH27XMa8U/RKjcSnhf3+q4elv1Q5zaJ3U+ui5OlhS E4EatSYxnye9GhaRI8GbKnI/qPOJGsWxFhnv1xkh83dELJAnlsY4wNGtSrt/c/uT+W UE6C/MpoRSxxO96IileZUzQJnBEdwXqk/l5sT9w51N29OGVqAX7FNWX/fnusQlWb+5 6353Uqb1nAf+MVbkHFfpCsRkcKNxaqDLJaUWVffLpR1v7UBWPGJBav4NH56aSxgorh ACcFSU9GkjZNIs7PbvRss+z+eQpYYfHW3kHWj1YNzJwrGAchiJQM9d78Pxtysl/No4 bZ87AjNcNSjxw== Received: from localhost (rolling.home.utahime.org [192.168.174.11]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by eastasia.home.utahime.org (Postfix) with ESMTPSA id 1ED494F2C0; Tue, 25 Feb 2020 04:38:11 +0900 (JST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.102.2 at eastasia.home.utahime.org Date: Tue, 25 Feb 2020 04:37:11 +0900 (JST) Message-Id: <20200225.043711.677660873587364878.yasu@utahime.org> To: freebsd-current@freebsd.org Subject: Re: r358062(ncurses) breaks installed ports, howto check? From: Yasuhiro KIMURA In-Reply-To: <20200224202021.65ca7f64@thor.intern.walstatt.dynvpn.de> References: <20200224202021.65ca7f64@thor.intern.walstatt.dynvpn.de> X-Mailer: Mew version 6.8 on Emacs 26.3 Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: 48RC655Z9Hz4Vyk X-Spamd-Bar: ++ Authentication-Results: mx1.freebsd.org; dkim=pass header.d=utahime.org header.s=maybe2019112701 header.b=AOtKhxgE; dmarc=none; spf=pass (mx1.freebsd.org: domain of yasu@utahime.org designates 183.180.29.210 as permitted sender) smtp.mailfrom=yasu@utahime.org X-Spamd-Result: default: False [2.13 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_DKIM_ALLOW(-0.20)[utahime.org:s=maybe2019112701]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+a:spf-authorized.utahime.org]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; TO_DN_NONE(0.00)[]; NEURAL_SPAM_MEDIUM(0.24)[0.238,0]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-0.48)[-0.484,0]; RCVD_COUNT_THREE(0.00)[3]; DMARC_NA(0.00)[utahime.org]; MV_CASE(0.50)[]; DKIM_TRACE(0.00)[utahime.org:+]; MID_CONTAINS_FROM(1.00)[]; IP_SCORE(0.38)[ip: (0.21), ipnet: 183.180.0.0/16(0.10), asn: 2519(1.53), country: JP(0.04)]; FROM_EQ_ENVFROM(0.00)[]; SUBJECT_ENDS_QUESTION(1.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:2519, ipnet:183.180.0.0/16, country:JP]; RCVD_TLS_ALL(0.00)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 24 Feb 2020 19:38:24 -0000 From: "O. Hartmann" Subject: r358062(ncurses) breaks installed ports, howto check? Date: Mon, 24 Feb 2020 20:19:59 +0100 > After r358062, many installed ports do not work anymore on several running systems (CURRENT). > /usr/src/UPDATING states one should reinstall all ncurses depending ports, but no hint is > given! Can someone mitigate this lack of information? Is there a simple way to check what > ports installed on a system rely on ncurses provided by the system? Check thread starting with following message. https://lists.freebsd.org/pipermail/freebsd-ports/2020-February/117710.html --- Yasuhiro KIMURA