<yar@FreeBSD.org>: host hub.freebsd.org[8.8.178.136] said: 550 5.1.1
<yar@FreeBSD.org>: Recipient address rejected: User unknown in local
<rud@cs.uni-magdeburg.de>: host mail.cs.uni-magdeburg.de[141.44.21.48] said:
550 5.1.1 <rud@cs.uni-magdeburg.de>... User unknown (in reply to RCPT TO
<stefan@fh-mainz.de>: host srv-eml-pmva-02.fh-mainz.de[143.93.114.189] said:
550 5.1.1 <stefan@fh-mainz.de>: Recipient address rejected: undeliverable
<ocaml-ounit-port@kotka.de>: host kotka.de[62.75.247.120] said: 550 5.1.1
<ocaml-ounit-port@kotka.de>: Recipient address rejected: User unknown in
<toru@tenchi.ne.jp>: host tuna.tenchi.ne.jp[49.212.63.105] said: 550 5.1.1
<toru@tenchi.ne.jp>... User unknown (in reply to RCPT TO command)
<nehe@cruzinternet.com>: host inbound.platinum.ca[69.31.192.27] said: 550
cuda_nsu User [nehe@cruzinternet.com] does not exist (in reply to RCPT TO
<ports@emorific.com>: Host or domain name not found. Name service error for
name=emorific.com type=AAAA: Host not found
<ubique@peterhost.ru>: host mx.mail.corp.hostcomm.ru[89.111.166.49] said: 550
Sorry, no mailbox here by that name (in reply to RCPT TO command)
<ports@brandon.dvalentine.com>: host ASPMX.L.GOOGLE.com[2607:f8b0:400c:c01::1a]
said: 550-5.1.1 The email account that you tried to reach does not exist.
With hat: portmgr
OPTIONS_DEFINE. This policy has been implemented only recently that's why we
have many ports violating this policy.
This patch adds the default options specified in the Porter's Handbook to
OPTIONS_DEFINE where they are being used. Ports maintained by
gnome@FreeBSD.org, kde@FreeBSD.org and x11@FreeBSD.org have been excluded.
Approved by: portmgr (bapt)
PR: ports/136065 ports/127469
Submitted by: N.J. Mann <njm@njm.me.uk> and Aldis Berjoza <killasmurf86@gmail.com>
- Early identify port CONFLICTS
PR: 137855
Submitted by: Piotr Smyrak <smyru@heron.pl>
- Add --no-same-permissions to the EXTRACT_AFTER_ARGS command.
Tijl Coosemans has been reported an issue that when root is extracting from the
tarball, and the tarball contains world writable files
(sysutils/policykit as an example), there is a chance that the files
gets changed by malicious third parties right after the extraction,
which makes it possible to inject code into the package thus compromise
the system.
Submitted by: Tijl Coosemans <tijl@coosemans.org> Xin LI (delphij@)
- Fix some whitespaces
Tested with: exp-run
modular xorg.
- supply corresponding USE_XORG for all imake-using ports that need it
- USE_IMAKE no longer implies USE_XLIB in absence of USE_XORG
- retire USE_X_PREFIX which is not really used anywhere after the
above change
- a few minor nits like whitespace and SF macro
Tested by: 2 tinderbox runs by pav
Approved by: portmgr (pav)