Date: Tue, 13 Feb 2007 21:12:37 -0800 From: Kent Stewart <kstewart@owt.com> To: freebsd-questions@freebsd.org Cc: Bob <bob@tamara-b.org> Subject: Re: Forcing a portupgrade? Message-ID: <200702132112.38339.kstewart@owt.com> In-Reply-To: <20070213215329.G2526@wonkity.com> References: <20070213172123.620e32b3@tania.servebbs.org> <20070213174754.088e97b9@tania.servebbs.org> <20070213215329.G2526@wonkity.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Tuesday 13 February 2007 21:00, Warren Block wrote: > On Tue, 13 Feb 2007, Bob wrote: > > On Tue, 13 Feb 2007 16:41:29 -0600 > > > > Paul Schmehl <pauls@utdallas.edu> wrote: > >> Yikes! That's a bit drastic. What's wrong with make > >> DISABLE_VULNERABILITIES install? > > > > Where would I find the documentation on all the possible > > command-line options to make? IE, where is DISABLE_VULNERABILITIES > > documented? > > man ports > > ISTR using it with portupgrade with the -M option. > Here is what I use. I gave it an alias and called it portforce portupgrade -puf -m -DDISABLE_VULNERABILITIES Kent > A probably-better way to fix the vulnerabilities of Mozilla is to > switch to the newest version, which is now called Seamonkey. > > > I am sure I would have occasion to use others if I knew what and > > where they were. > > Also in the ports man page. Other targets also avoid brute-force > removal of files, like rmconfig. > > -Warren Block * Rapid City, South Dakota USA > _______________________________________________ > freebsd-questions@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-questions > To unsubscribe, send any mail to > "freebsd-questions-unsubscribe@freebsd.org" -- Kent Stewart Richland, WA http://www.soyandina.com/ "I am Andean project". http://users.owt.com/kstewart/index.html
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200702132112.38339.kstewart>