Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 17 Nov 2004 02:15:02 +0100
From:      Michael Nottebrock <michaelnottebrock@gmx.net>
To:        freebsd-ports@freebsd.org
Cc:        teo <rebonzo@libero.it>
Subject:   Re: portupgrade dependencies
Message-ID:  <200411170215.07473.michaelnottebrock@gmx.net>
In-Reply-To: <I7A6UV$BCB0086CD391F2339D84B2380E04C90A@libero.it>
References:  <I7A6UV$BCB0086CD391F2339D84B2380E04C90A@libero.it>

next in thread | previous in thread | raw e-mail | index | archive | help
--nextPart34416231.QZkgpRBfHT
Content-Type: text/plain;
  charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline

On Tuesday, 16. November 2004 17:52, teo wrote:

> Is the only solution waiting for ruby 1.8.2.p3?
> Something smarter than deinstalling portaudit, installing portupgrade (th=
us
> no vulnerability check is done) and, at last, reinstalling portaudit?

You can disable the the vulnerability check temporarily by doing 'make=20
DISABLE_VULNERABILITIES=3Dtrue' and 'make DISABLE_VULNERABILITIES=3Dtrue in=
stall'

=2D-=20
   ,_,   | Michael Nottebrock               | lofi@freebsd.org
 (/^ ^\) | FreeBSD - The Power to Serve     | http://www.freebsd.org
   \u/   | K Desktop Environment on FreeBSD | http://freebsd.kde.org

--nextPart34416231.QZkgpRBfHT
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (FreeBSD)

iD8DBQBBmqYbXhc68WspdLARAjXIAJ0e+cZUXyFfuKi0u0vo77q9CgZARACgmfmu
mTzoF4NkIaiZCFzCaLDQKs8=
=l62R
-----END PGP SIGNATURE-----

--nextPart34416231.QZkgpRBfHT--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200411170215.07473.michaelnottebrock>