From owner-svn-ports-all@FreeBSD.ORG Fri May 30 16:40:34 2014 Return-Path: Delivered-To: svn-ports-all@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 56150775; Fri, 30 May 2014 16:40:34 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 43CC02857; Fri, 30 May 2014 16:40:34 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s4UGeY2r051415; Fri, 30 May 2014 16:40:34 GMT (envelope-from bdrewery@svn.freebsd.org) Received: (from bdrewery@localhost) by svn.freebsd.org (8.14.8/8.14.8/Submit) id s4UGeYiv051414; Fri, 30 May 2014 16:40:34 GMT (envelope-from bdrewery@svn.freebsd.org) Message-Id: <201405301640.s4UGeYiv051414@svn.freebsd.org> From: Bryan Drewery Date: Fri, 30 May 2014 16:40:34 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r355872 - head/Mk X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-all@freebsd.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: SVN commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 30 May 2014 16:40:34 -0000 Author: bdrewery Date: Fri May 30 16:40:33 2014 New Revision: 355872 URL: http://svnweb.freebsd.org/changeset/ports/355872 QAT: https://qat.redports.org/buildarchive/r355872/ Log: - When showing vulnerability warning give an explanation that there will not necessarily be an update. Give advice on how to skip the check. It is the user's choice afterall. With hat: portmgr Reported by: jhb Modified: head/Mk/bsd.port.mk Modified: head/Mk/bsd.port.mk ============================================================================== --- head/Mk/bsd.port.mk Fri May 30 16:37:57 2014 (r355871) +++ head/Mk/bsd.port.mk Fri May 30 16:40:33 2014 (r355872) @@ -3325,6 +3325,8 @@ check-vulnerable: ${ECHO_MSG} "===> ${PKGNAME} has known vulnerabilities:"; \ ${ECHO_MSG} "$$vlist"; \ ${ECHO_MSG} "=> Please update your ports tree and try again."; \ + ${ECHO_MSG} "=> Ports are marked vulnerable regardless of their being an update available."; \ + ${ECHO_MSG} "=> If you wish to ignore this vulnerability rebuild with 'make DISABLE_VULNERABILITIES=yes'"; \ exit 1; \ fi; \ fi