Problems found with existing distfiles:
distfiles/javascript-2.1b1.el
distfiles/yEd-3.14.2.zip
No changes made to the javascript-mode or yEd distinfo files.
Otherwise, existing SHA1 digests verified and found to be the same on
the machine holding the existing distfiles (morden). All existing
SHA1 digests retained for now as an audit trail.
Do it for all packages that
* mention perl, or
* have a directory name starting with p5-*, or
* depend on a package starting with p5-
like last time, for 5.18, where this didn't lead to complaints.
Let me know if you have any this time.
a) refer 'perl' in their Makefile, or
b) have a directory name of p5-*, or
c) have any dependency on any p5-* package
Like last time, where this caused no complaints.
DragonFly doesn't have CIRCLEQ_* macros anymore. They were replaced
with TAILQ_*. As a result, DragonFly needs the provided sys/queue.h
to define them. Also, like NetBSD, it doesn't support streams, so
disable pty.
2004/6/8
iso-2022 autodetection was broken. it is impossible to differentiate
between iso-2022-jp and jp3, we don't think about jp3 in autodetect.
found by Masamichi Takatsu.
* Pass settings to nvi with env NEXINIT instead of EXINIT, to avoid affect of env NEXINIT.
* Honor NEXINIT, EXINIT environment variable.
* Pass all setting in ~/.{n}exrc by using source command. Fixes PR 13677.
Bump PKGREVISION.
by ISIHARA Takanori.
Brief changes:
2004/4/1
publish a new diff as "cvs diff" (with old cvs) generated malformed
diff.
2002/5/22
support iso-2022-15 character encoding.
2001/10/24
plug a printf string vulnerability.
2000/4/7
support automatically recognize iso-2022-jp-3 character encoding.
common/multibyte.c
pkgsrc. Instead, a new variable PKGREVISION is invented that can get
bumped independent of DISTNAME and PKGNAME.
Example #1:
DISTNAME= foo-X.Y
PKGREVISION= Z
=> PKGNAME= foo-X.YnbZ
Example #2:
DISTNAME= barthing-X.Y
PKGNAME= bar-X.Y
PKGREVISION= Z
=> PKGNAME= bar=X.YnbZ (!)
On subsequent changes, only PKGREVISION needs to be bumped, no more risk
of getting DISTNAME changed accidentally.