From owner-freebsd-stable@freebsd.org Fri Jun 19 18:25:54 2020 Return-Path: Delivered-To: freebsd-stable@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 9F3323357D5 for ; Fri, 19 Jun 2020 18:25:54 +0000 (UTC) (envelope-from pi@freebsd.org) Received: from home.opsec.eu (home.opsec.eu [IPv6:2001:14f8:200::1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 49pS0y25DCz4cRF for ; Fri, 19 Jun 2020 18:25:54 +0000 (UTC) (envelope-from pi@freebsd.org) Received: from pi by home.opsec.eu with local (Exim 4.92.3 (FreeBSD)) (envelope-from ) id 1jmLht-000Oq9-3w; Fri, 19 Jun 2020 20:25:41 +0200 Date: Fri, 19 Jun 2020 20:25:41 +0200 From: Kurt Jaeger To: Greg Balfour Cc: freebsd-stable@freebsd.org Subject: Re: Firefox pkg for 11.4-RELEASE amd64 Message-ID: <20200619182541.GT39563@home.opsec.eu> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Rspamd-Queue-Id: 49pS0y25DCz4cRF X-Spamd-Bar: / Authentication-Results: mx1.freebsd.org; none X-Spamd-Result: default: False [0.00 / 15.00]; local_wl_from(0.00)[freebsd.org]; TAGGED_RCPT(0.00)[]; ASN(0.00)[asn:12502, ipnet:2001:14f8::/32, country:DE] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 19 Jun 2020 18:25:54 -0000 Hi! > After looking at this some more I see the problem. > > http://pkg.freebsd.org/FreeBSD:11:amd64/release_4/All/ [...] > Anyone know why firefox didn't make it into release_4? No, but I've started a build on https://repo.nepustil.net/114/, so that you can get it from there in a few hours. -- pi@opsec.eu +49 171 3101372 Now what ?