Forcing a portupgrade?

Kent Stewart kstewart at owt.com
Wed Feb 14 05:12:41 UTC 2007


On Tuesday 13 February 2007 21:00, Warren Block wrote:
> On Tue, 13 Feb 2007, Bob wrote:
> > On Tue, 13 Feb 2007 16:41:29 -0600
> >
> > Paul Schmehl <pauls at utdallas.edu> wrote:
> >> Yikes!  That's a bit drastic.  What's wrong with make
> >> DISABLE_VULNERABILITIES install?
> >
> > Where would I find the documentation on all the possible
> > command-line options to make? IE, where is DISABLE_VULNERABILITIES
> > documented?
>
> man ports
>
> ISTR using it with portupgrade with the -M option.
>

Here is what I use. I gave it an alias and called it portforce
portupgrade -puf -m -DDISABLE_VULNERABILITIES

Kent

> A probably-better way to fix the vulnerabilities of Mozilla is to
> switch to the newest version, which is now called Seamonkey.
>
> > I am sure I would have occasion to use others if I knew what and
> > where they were.
>
> Also in the ports man page.  Other targets also avoid brute-force
> removal of files, like rmconfig.
>
> -Warren Block * Rapid City, South Dakota USA
> _______________________________________________
> freebsd-questions at freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> To unsubscribe, send any mail to
> "freebsd-questions-unsubscribe at freebsd.org"

-- 
Kent Stewart
Richland, WA

http://www.soyandina.com/ "I am Andean project".
http://users.owt.com/kstewart/index.html


More information about the freebsd-questions mailing list