notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)
All times are UTC
non port: mail/rabl_client/Makefile

Number of commits found: 10

Friday, 4 Jul 2014
09:12 bapt search for other commits by this committer
Resetting maintainership on ports that have not been staged and without any
pending PR (related to stage)

With hat:	portmgr
Original commitRevision:360579 
Friday, 20 Sep 2013
19:59 bapt search for other commits by this committer
Add NO_STAGE all over the place in preparation for the staging support (cat:
Original commitRevision:327742 
Tuesday, 4 Jun 2013
10:32 bapt search for other commits by this committer
Convert to new options framework
Original commitRevision:319851 
Friday, 23 Sep 2011
22:26 amdmi3 search for other commits by this committer
- Add LDFLAGS to CONFIGURE_ENV and MAKE_ENV (as it was done with LDFLAGS)
- Fix all ports that add {CPP,LD}FLAGS to *_ENV to modify flags instead

PR:             157936
Submitted by:   myself
Exp-runs by:    pav
Approved by:    pav
Original commit
Thursday, 21 Aug 2008
06:18 rafan search for other commits by this committer
Update CONFIGURE_ARGS for how we pass CONFIGURE_TARGET to configure script.
Specifically, newer autoconf (> 2.13) has different semantic of the
configure target. In short, one should use --build=CONFIGURE_TARGET
instead of CONFIGURE_TARGET directly. Otherwise, you will get a warning
and the old semantic may be removed in later autoconf releases.

To workaround this issue, many ports hack the CONFIGURE_TARGET variable
so that it contains the ``--build='' prefix.

To solve this issue, under the fact that some ports still have
configure script generated by the old autoconf, we use runtime detection
in the do-configure target so that the proper argument can be used.

Changes to Mk/*:
 - Add runtime detection magic in
 - Remove CONFIGURE_TARGET hack in various bsd.*.mk
 - USE_GNOME=gnometarget is now an no-op

Changes to individual ports, other than removing the CONFIGURE_TARGET hack:

= pkg-plist changed (due to the ugly CONFIGURE_TARGET prefix in * executables)
  - comms/gnuradio
  - science/abinit
  - science/elmer-fem
  - science/elmer-matc
  - science/elmer-meshgen2d
  - science/elmerfront
  - science/elmerpost

= use x86_64 as ARCH
  - devel/g-wrap

= other changes
  - print/magicfilter
    GNU_CONFIGURE -> HAS_CONFIGURE since it's not generated by autoconf

Total # of ports modified:  1,027
Total # of ports affected: ~7,000 (set GNU_CONFIGURE to yes)

PR:             126524 (obsoletes 52917)
Submitted by:   rafan
Tested on:      two pointyhat 7-amd64 exp runs (by pav)
Approved by:    portmgr (pav)
Original commit
Thursday, 29 Jun 2006
13:48 itetcu search for other commits by this committer
Switch backup mirror on my other server
Original commit
13:46 itetcu search for other commits by this committer
- use my address
Original commit
Thursday, 23 Feb 2006
10:40 ade search for other commits by this committer
Conversion to a single libtool environment.

Approved by:    portmgr (kris)
Original commit
Tuesday, 15 Nov 2005
06:52 ade search for other commits by this committer
Mass-conversion to the USE_AUTOTOOLS New World Order.  The code present
in essentially makes this a no-op given that all the
old variables set a USE_AUTOTOOLS_COMPAT variable, which is parsed in
exactly the same way as USE_AUTOTOOLS itself.

Moreover, USE_AUTOTOOLS has already been extensively tested by the GNOME
team -- all GNOME 2.12.x ports use it.

Preliminary documentation can be found at:

which is in the process of being SGMLized before introduction into the
Porters Handbook.

Light blue touch-paper.  Run.
Original commit
Saturday, 8 Oct 2005
04:57 mnag search for other commits by this committer
The RABL (pronounced "rabble") server is a statistical, machine-automated and
up-to-the-second blackhole list server designed to monitor global network
activity and make decisions based on network spread and infection rate -
that is, abuse from an address which has been reported by a number of
participating networks. This is in far contrast to how most other
blacklists function, where fallable humans (many with political agendas) must
process thousands of reports and make decisions - many times after the fact.
The RABL is fully reactive to new threats and can block addresses within
seconds of widespread infection - good to know in this world of drone PCs
and stolen accounts. The RABL server blacklists addresses until they have
cleared a minimum duration (an hour by default) without any additional
reporting, making the appeals process as simple as "fix your junk". The RABL
is designed to function via automated machine-learning spam filters, such as
Bayesian filters. Each participating network is granted write authentication
in the blackhole list, to prevent abuse. A client tool is also provided.

The RABL client is the lookup and reporting component of the RABL. It is
necessary for performing streaming connection lookups and writing to the RABL
(assuming you have an account).

PR:             87096
Submitted by:   Ion-Mihai "IOnut" Tetcu <>
Original commit

Number of commits found: 10