From owner-freebsd-ports@FreeBSD.ORG Wed Nov 17 07:51:05 2004 Return-Path: Delivered-To: freebsd-ports@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 78E3116A4CE for ; Wed, 17 Nov 2004 07:51:05 +0000 (GMT) Received: from smtp.owt.com (smtp.owt.com [204.118.6.19]) by mx1.FreeBSD.org (Postfix) with ESMTP id 1806E43D1F for ; Wed, 17 Nov 2004 07:51:05 +0000 (GMT) (envelope-from kstewart@owt.com) Received: from [207.41.94.233] (owt-207-41-94-233.owt.com [207.41.94.233]) by smtp.owt.com (8.12.8/8.12.8) with ESMTP id iAH7oDLc023950; Tue, 16 Nov 2004 23:50:14 -0800 From: Kent Stewart To: freebsd-ports@freebsd.org Date: Tue, 16 Nov 2004 23:51:01 -0800 User-Agent: KMail/1.7.1 References: <200411170215.07473.michaelnottebrock@gmx.net> In-Reply-To: <200411170215.07473.michaelnottebrock@gmx.net> MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit Content-Disposition: inline Message-Id: <200411162351.01461.kstewart@owt.com> cc: teo Subject: Re: portupgrade dependencies X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 17 Nov 2004 07:51:05 -0000 On Tuesday 16 November 2004 05:15 pm, Michael Nottebrock wrote: > On Tuesday, 16. November 2004 17:52, teo wrote: > > Is the only solution waiting for ruby 1.8.2.p3? > > Something smarter than deinstalling portaudit, installing portupgrade > > (thus no vulnerability check is done) and, at last, reinstalling > > portaudit? > > You can disable the the vulnerability check temporarily by doing 'make > DISABLE_VULNERABILITIES=true' and 'make DISABLE_VULNERABILITIES=true > install' One of the man portupgrade options is "-m". You can do what you suggested by just doing portupgrade -m '-DDISABLE_VULNERABILITIES' ruby Kent -- Kent Stewart Richland, WA http://users.owt.com/kstewart/index.html