non port: mail/rabl_server/Makefile |
Number of commits found: 12 |
Friday, 4 Jul 2014
|
09:12 bapt
Resetting maintainership on ports that have not been staged and without any
pending PR (related to stage)
With hat: portmgr
 |
Friday, 20 Sep 2013
|
19:59 bapt
Add NO_STAGE all over the place in preparation for the staging support (cat:
mail)
 |
Tuesday, 4 Jun 2013
|
10:32 bapt
Convert to new options framework
 |
Sunday, 5 Aug 2012
|
23:19 dougb
Move the rc.d scripts of the form *.sh.in to *.in
Where necessary add $FreeBSD$ to the file
No PORTREVISION bump necessary because this is a no-op
 |
Friday, 23 Sep 2011
|
22:26 amdmi3
- Add LDFLAGS to CONFIGURE_ENV and MAKE_ENV (as it was done with LDFLAGS)
- Fix all ports that add {CPP,LD}FLAGS to *_ENV to modify flags instead
PR: 157936
Submitted by: myself
Exp-runs by: pav
Approved by: pav
 |
Thursday, 21 Aug 2008
|
06:18 rafan
Update CONFIGURE_ARGS for how we pass CONFIGURE_TARGET to configure script.
Specifically, newer autoconf (> 2.13) has different semantic of the
configure target. In short, one should use --build=CONFIGURE_TARGET
instead of CONFIGURE_TARGET directly. Otherwise, you will get a warning
and the old semantic may be removed in later autoconf releases.
To workaround this issue, many ports hack the CONFIGURE_TARGET variable
so that it contains the ``--build='' prefix.
To solve this issue, under the fact that some ports still have
configure script generated by the old autoconf, we use runtime detection
in the do-configure target so that the proper argument can be used.
Changes to Mk/*:
- Add runtime detection magic in bsd.port.mk
- Remove CONFIGURE_TARGET hack in various bsd.*.mk
- USE_GNOME=gnometarget is now an no-op
Changes to individual ports, other than removing the CONFIGURE_TARGET hack:
= pkg-plist changed (due to the ugly CONFIGURE_TARGET prefix in * executables)
- comms/gnuradio
- science/abinit
- science/elmer-fem
- science/elmer-matc
- science/elmer-meshgen2d
- science/elmerfront
- science/elmerpost
= use x86_64 as ARCH
- devel/g-wrap
= other changes
- print/magicfilter
GNU_CONFIGURE -> HAS_CONFIGURE since it's not generated by autoconf
Total # of ports modified: 1,027
Total # of ports affected: ~7,000 (set GNU_CONFIGURE to yes)
PR: 126524 (obsoletes 52917)
Submitted by: rafan
Tested on: two pointyhat 7-amd64 exp runs (by pav)
Approved by: portmgr (pav)
 |
Thursday, 29 Jun 2006
|
13:51 itetcu
- s/INSTALL_SHLIB/USE_LDCONFIG/
- use my @FreeBSD.org address
- switch backup mirror on my other "for FreeBSD" server
 |
Wednesday, 10 May 2006
|
22:37 edwin
Remove USE_REINPLACE from ports starting with M
 |
Thursday, 23 Feb 2006
|
10:40 ade
Conversion to a single libtool environment.
Approved by: portmgr (kris)
 |
Sunday, 11 Dec 2005
|
23:58 lawrance
Tidy rc.d script and a few other no-op changes.
No need for PORTREVISION bump.
PR: ports/90161
Submitted by: Ion-Mihai "IOnut" Tetcu <itetcu@people.tecnik93.com>
(maintainer)
 |
Tuesday, 15 Nov 2005
|
06:52 ade
Mass-conversion to the USE_AUTOTOOLS New World Order. The code present
in bsd.autotools.mk essentially makes this a no-op given that all the
old variables set a USE_AUTOTOOLS_COMPAT variable, which is parsed in
exactly the same way as USE_AUTOTOOLS itself.
Moreover, USE_AUTOTOOLS has already been extensively tested by the GNOME
team -- all GNOME 2.12.x ports use it.
Preliminary documentation can be found at:
http://people.FreeBSD.org/~ade/autotools.txt
which is in the process of being SGMLized before introduction into the
Porters Handbook.
Light blue touch-paper. Run.
 |
Wednesday, 9 Nov 2005
|
17:38 pav
The RABL (pronounced "rabble") server is a statistical, machine-automated and
up-to-the-second blackhole list server designed to monitor global network
activity and make decisions based on network spread and infection rate -
that is, abuse from an address which has been reported by a number of
participating networks. This is in far contrast to how most other
blacklists function, where fallable humans (many with political agendas) must
process thousands of reports and make decisions - many times after the fact.
The RABL is fully reactive to new threats and can block addresses within
seconds of widespread infection - good to know in this world of drone PCs
and stolen accounts. The RABL server blacklists addresses until they have
cleared a minimum duration (an hour by default) without any additional
reporting, making the appeals process as simple as "fix your junk". The RABL
is designed to function via automated machine-learning spam filters, such as
Bayesian filters. Each participating network is granted write authentication
in the blackhole list, to prevent abuse. A client tool is also provided.
PR: ports/88446
Submitted by: Ion-Mihai "IOnut" Tetcu <itetcu@people.tecnik93.com>
 |
Number of commits found: 12 |