minor impact in scanlogd), and cutting down the license a bit further,
see http://www.openwall.com/lists/announce/2013/10/21/1 for more.
While there, drop USE_GROFF and rearrange port into Makefile.template order.
MODGNUSTEP_NEEDS_BASE set to yes, to add it to link
depends, even if it not directly links against -base,
gnustep libraries/frameworks assume that applications
link against -base when using those libs/frameworks.
build problems pointed out by rpe@
The picocom.8 patch is from schwarze@; it fixes the man page to show
content that was completely lost during formatting due to badly broken
syntax.
Tested by Kyle on amd64 and sgi, and myself on i386.
feedback bcallah@ brad@ schwarze@
OK abieber@
Manuals are relatively clean hand-written man(7) code, render identically
with groff and mandoc, and now that we parse and ignore .hw, do not throw
mandoc errors any longer.
Candidate for USE_GROFF removal found by naddy@ in a bulk build.
* share/apps => share/apps.kde3
* share/doc/HTML => share/doc/HTML.kde3
This is a part of KDE3/4 deconflicting work.
Build tested in a bulk by landry@, also sat over a week on ports@.
Run-time tested with some KDE3 apps, including KMail, taxipilot, yakuake...
"do it" landry@
is broken on !amd64 64-bit arch which invalidates assumptions in the code.
Workaround by taking a diff from clamav upstream. This fixes a problem reported
by Markus Lude where freshclam signature checks fail - researched by him and
port diff from him (I just added a bit of commentary to the patch file).
Key notes:
* OpenCV now has separate "opencv_nonfree" module, which contains all of
the patented algorithms. It was decided on ports@ to not create "nonfree"
FLAVOR but just set PERMIT_PACKAGE_CDROM=No, while allowing FTP
distribution.
* OpenCV now have its own Java bindings. You could avoid building them by
using the "no_java" PSEUDO_FLAVOR.
* Documentation placement was cleaned up, too.
Input from sthen@ and naddy@. Tested on i386 and amd64 with Digikam from WIP.
Okay sthen@ and Rafael Sadowski (MAINTAINER)
"We just published new releases which fix a recently reported
vulnerability that allows an attacker to overwrite configuration
settings using user preferences. This can result in random file
access, manipulated SQL queries and even code execution. The latter
one only affects versions 0.8.6 and older."