From owner-freebsd-pkg@FreeBSD.ORG Fri Oct 17 12:04:45 2014 Return-Path: Delivered-To: freebsd-pkg@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id DD76664F for ; Fri, 17 Oct 2014 12:04:45 +0000 (UTC) Received: from smtp2.bway.net (smtp2.v6.bway.net [IPv6:2607:d300:1::28]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id BC67DDF6 for ; Fri, 17 Oct 2014 12:04:45 +0000 (UTC) Received: from gecko3.bs.net (host-216-220-115-58.dsl.bway.net [216.220.115.58]) (using SSLv3 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) (Authenticated sender: mfv@bway.net) by smtp2.bway.net (Postfix) with ESMTPSA id 7FBD495870 for ; Fri, 17 Oct 2014 08:04:37 -0400 (EDT) Date: Fri, 17 Oct 2014 08:04:31 -0400 From: mfv To: freebsd-pkg@freebsd.org Subject: Ports vs Packages MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-pkg@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: Binary package management and package tools discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 17 Oct 2014 12:04:46 -0000 Hello, For the great majority of programs I've been using the new package system and am very pleased with it. However, there are times when I need to compile a port rather than installing a package. Is there a way of using "pkg info" or "pkg query" to identify which programs are locally compiled versus those that have been installed? I've noticed that for some, but not all, installed programs the following annotation appears: repo_type : binary repository : FreeBSD It may be useful if there were some notation to identify ports that were locally compiled from the ports tree. Cheers ... __o _ \<,_ Marek (+)/ (+) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~