Date: Wed, 17 Nov 2004 02:15:02 +0100 From: Michael Nottebrock <michaelnottebrock@gmx.net> To: freebsd-ports@freebsd.org Cc: teo <rebonzo@libero.it> Subject: Re: portupgrade dependencies Message-ID: <200411170215.07473.michaelnottebrock@gmx.net> In-Reply-To: <I7A6UV$BCB0086CD391F2339D84B2380E04C90A@libero.it> References: <I7A6UV$BCB0086CD391F2339D84B2380E04C90A@libero.it>
next in thread | previous in thread | raw e-mail | index | archive | help
--nextPart34416231.QZkgpRBfHT Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Content-Disposition: inline On Tuesday, 16. November 2004 17:52, teo wrote: > Is the only solution waiting for ruby 1.8.2.p3? > Something smarter than deinstalling portaudit, installing portupgrade (th= us > no vulnerability check is done) and, at last, reinstalling portaudit? You can disable the the vulnerability check temporarily by doing 'make=20 DISABLE_VULNERABILITIES=3Dtrue' and 'make DISABLE_VULNERABILITIES=3Dtrue in= stall' =2D-=20 ,_, | Michael Nottebrock | lofi@freebsd.org (/^ ^\) | FreeBSD - The Power to Serve | http://www.freebsd.org \u/ | K Desktop Environment on FreeBSD | http://freebsd.kde.org --nextPart34416231.QZkgpRBfHT Content-Type: application/pgp-signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.6 (FreeBSD) iD8DBQBBmqYbXhc68WspdLARAjXIAJ0e+cZUXyFfuKi0u0vo77q9CgZARACgmfmu mTzoF4NkIaiZCFzCaLDQKs8= =l62R -----END PGP SIGNATURE----- --nextPart34416231.QZkgpRBfHT--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200411170215.07473.michaelnottebrock>