Date: Tue, 16 Nov 2004 23:51:01 -0800 From: Kent Stewart <kstewart@owt.com> To: freebsd-ports@freebsd.org Cc: teo <rebonzo@libero.it> Subject: Re: portupgrade dependencies Message-ID: <200411162351.01461.kstewart@owt.com> In-Reply-To: <200411170215.07473.michaelnottebrock@gmx.net> References: <I7A6UV$BCB0086CD391F2339D84B2380E04C90A@libero.it> <200411170215.07473.michaelnottebrock@gmx.net>
next in thread | previous in thread | raw e-mail | index | archive | help
On Tuesday 16 November 2004 05:15 pm, Michael Nottebrock wrote: > On Tuesday, 16. November 2004 17:52, teo wrote: > > Is the only solution waiting for ruby 1.8.2.p3? > > Something smarter than deinstalling portaudit, installing portupgrade > > (thus no vulnerability check is done) and, at last, reinstalling > > portaudit? > > You can disable the the vulnerability check temporarily by doing 'make > DISABLE_VULNERABILITIES=true' and 'make DISABLE_VULNERABILITIES=true > install' One of the man portupgrade options is "-m". You can do what you suggested by just doing portupgrade -m '-DDISABLE_VULNERABILITIES' ruby Kent -- Kent Stewart Richland, WA http://users.owt.com/kstewart/index.html
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200411162351.01461.kstewart>