From owner-freebsd-current@FreeBSD.ORG Tue Nov 4 07:03:51 2014 Return-Path: Delivered-To: current@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 4EF4113E for ; Tue, 4 Nov 2014 07:03:51 +0000 (UTC) Received: from mail-ig0-x22d.google.com (mail-ig0-x22d.google.com [IPv6:2607:f8b0:4001:c05::22d]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 0FBD5BD3 for ; Tue, 4 Nov 2014 07:03:51 +0000 (UTC) Received: by mail-ig0-f173.google.com with SMTP id r10so6194579igi.0 for ; Mon, 03 Nov 2014 23:03:50 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:date:message-id:subject :from:to:content-type; bh=7+ugHwRXuUL7EVfZrDxDKNvc+Ww+ySEqxVNn3FDF9uQ=; b=HgWKE38QxdEJjQrRRbSvLzr12KrelJRioRWV5ozBD6Mot08Q80Nu+gWaU9lUBQ3Qh8 mzRZHUHqOYTR9bDTUs1NzQT6vcqQGMXvXZTDPpKlHpnTZR92zP3EsZY5ZlVW7C2q91cT L54uDd2B6VRDzkzECMUyWNs8/3g3Q5eKMBujHvHQXSfVJ/OyrBTAMTw09BhF3zT9cql6 llL0oppS8RgfBlOMuhbkNHXGGOMYrO7cuT9yjR8E2OYBOkfyokAfY/4gioFiE49pzHN7 pYuhX3N+6yosQZe7zSgn/W7I56kRiD8AqIPuexzg4hmGTq/0SbktpP61kEUloN3kKN6V Y5fA== MIME-Version: 1.0 X-Received: by 10.50.122.106 with SMTP id lr10mr21855038igb.32.1415084630377; Mon, 03 Nov 2014 23:03:50 -0800 (PST) Sender: kob6558@gmail.com Received: by 10.107.11.152 with HTTP; Mon, 3 Nov 2014 23:03:50 -0800 (PST) In-Reply-To: <54587759.4050206@bluerosetech.com> References: <20141028231933.GG26796@ivaldir.etoilebsd.net> <20141101161332.b9c8fc19bf9fc54f73bc5c00@gmail.com> <20141101224549.GG15967@ivaldir.etoilebsd.net> <20141102102455.30d42f85ff81e079788eae06@gmail.com> <5457F64F.6090408@selasky.org> <54587759.4050206@bluerosetech.com> Date: Mon, 3 Nov 2014 23:03:50 -0800 X-Google-Sender-Auth: aTF5IRwuVsnAu5dCLs5tyBSDXlk Message-ID: Subject: Re: pkg 1.4 freeze please test test test! From: Kevin Oberman To: "current@freebsd.org" Content-Type: text/plain; charset=UTF-8 X-Content-Filtered-By: Mailman/MimeDel 2.1.18-1 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 04 Nov 2014 07:03:51 -0000 Thanks you! That dies the trick. R. Kevin Oberman, Network Engineer, Retired E-mail: rkoberman@gmail.com On Mon, Nov 3, 2014 at 10:51 PM, Darren Pilgrim < list_freebsd@bluerosetech.com> wrote: > On 11/3/2014 9:50 PM, Kevin Oberman wrote: > >> I simply do periodic(8) weekly runs of "pkg version -vRl\<" to catch any >> port that has not been updated due to being locked. On option to only >> report locked packages would simplify this and looks to me like it would >> be >> pretty easy to add, but unless you have a lot of locked packages, it's not >> a problem. >> > > I just do `pkg info -ka | egrep 'yes$'`. > > >