Date: Wed, 17 Nov 2004 00:01:51 -0800 From: Kent Stewart <kstewart@owt.com> To: freebsd-ports@freebsd.org Cc: teo <rebonzo@libero.it> Subject: Re: portupgrade dependencies Message-ID: <200411170001.52002.kstewart@owt.com> In-Reply-To: <200411170215.07473.michaelnottebrock@gmx.net> References: <I7A6UV$BCB0086CD391F2339D84B2380E04C90A@libero.it> <200411170215.07473.michaelnottebrock@gmx.net>
next in thread | previous in thread | raw e-mail | index | archive | help
On Tuesday 16 November 2004 05:15 pm, Michael Nottebrock wrote: > On Tuesday, 16. November 2004 17:52, teo wrote: > > Is the only solution waiting for ruby 1.8.2.p3? > > Something smarter than deinstalling portaudit, installing portupgrade > > (thus no vulnerability check is done) and, at last, reinstalling > > portaudit? > > You can disable the the vulnerability check temporarily by doing 'make > DISABLE_VULNERABILITIES=true' and 'make DISABLE_VULNERABILITIES=true > install' Oops, I tried it on ruby and it didn't work. I edited the command and it worked with cups-base. The two cases I tried are 1049 23:50 portupgrade -puf -m '-DDISABLE_VULNERABILITIES' ruby 1050 23:56 portupgrade -puf -m '-DDISABLE_VULNERABILITIES' cups-base I don't have any idea what happen to the build on ruby. Kent -- Kent Stewart Richland, WA http://users.owt.com/kstewart/index.html
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200411170001.52002.kstewart>