Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 16 Nov 2004 23:51:01 -0800
From:      Kent Stewart <kstewart@owt.com>
To:        freebsd-ports@freebsd.org
Cc:        teo <rebonzo@libero.it>
Subject:   Re: portupgrade dependencies
Message-ID:  <200411162351.01461.kstewart@owt.com>
In-Reply-To: <200411170215.07473.michaelnottebrock@gmx.net>
References:  <I7A6UV$BCB0086CD391F2339D84B2380E04C90A@libero.it> <200411170215.07473.michaelnottebrock@gmx.net>

next in thread | previous in thread | raw e-mail | index | archive | help
On Tuesday 16 November 2004 05:15 pm, Michael Nottebrock wrote:
> On Tuesday, 16. November 2004 17:52, teo wrote:
> > Is the only solution waiting for ruby 1.8.2.p3?
> > Something smarter than deinstalling portaudit, installing portupgrade
> > (thus no vulnerability check is done) and, at last, reinstalling
> > portaudit?
>
> You can disable the the vulnerability check temporarily by doing 'make
> DISABLE_VULNERABILITIES=true' and 'make DISABLE_VULNERABILITIES=true
> install'

One of the man portupgrade options is "-m". You can do what you suggested by 
just doing

portupgrade -m '-DDISABLE_VULNERABILITIES' ruby

Kent

-- 
Kent Stewart
Richland, WA

http://users.owt.com/kstewart/index.html



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200411162351.01461.kstewart>