From 7b0d2fcf99cc910e504711e933dbb3e918a7a6f9 Mon Sep 17 00:00:00 2001 From: marcus Date: Sun, 14 Jan 2007 07:05:18 +0000 Subject: Allow nsprpub to be extracted from the distfile. This directory is needed for a script that wraps system headers for building with GCC 4.x. This does not mean the embedded nspr will be used in favor of the system nspr, but it should fix the build with GCC 4.x. --- www/mozilla/Makefile.common | 1 - 1 file changed, 1 deletion(-) (limited to 'www') diff --git a/www/mozilla/Makefile.common b/www/mozilla/Makefile.common index 7f691de36a54..1b8f230368bc 100644 --- a/www/mozilla/Makefile.common +++ b/www/mozilla/Makefile.common @@ -100,7 +100,6 @@ EXTRACT_AFTER_ARGS?= | ${TAR} -xf - --exclude */CVS/* \ --exclude .cvsignore \ --exclude makefile.win \ --exclude MANIFEST \ - --exclude */nsprpub/* \ --exclude mozilla/modules/libimg/png \ --exclude mozilla/jpeg \ --exclude mozilla/dbm \ -- cgit > cgit logo index : freebsd-ports-gnome
FreeBSD GNOME current development ports (https://github.com/freebsd/freebsd-ports-gnome)
aboutsummaryrefslogtreecommitdiffstats
path: root/security/gnutls-devel/Makefile
Commit message (Expand)AuthorAgeFilesLines
* Remove expired ports:rene2014-04-021-88/+0
* - Mark FORBIDDEN and deprecatebdrewery2014-03-051-0/+3
* Mark broken: Does not buildantoine2014-02-221-0/+2
* Remove trailing whitespaces from category securityehaupt2014-02-211-1/+1
* According to the Porter's Handbook (5.12.2.3.) default options must be added toehaupt2014-02-101-0/+3
* - Chase security/libtasn1 updatenovel2013-11-031-3/+3
* Add NO_STAGE all over the place in preparation for the staging support (cat: ...bapt2013-09-211-0/+1
* Eradicate USE_GNOME=pkgconfig from securitybapt2013-08-311-7/+3
* Finish converting security from WITHOUT_NLS to PORT_OPTIONS:MNLSbapt2013-05-061-6/+6
* - convert ports to USES= gettextjgh2013-04-301-3/+3
* - Convert USE_ICONV=yes to USES=iconvmva2013-04-281-1/+1
* - Add UPDATING entry for libtasn1 updatenovel2013-02-071-2/+3
* Un-set FORBIDDEN as the port is not actually vulnerable for a long time,novel2011-10-071-3/+0
* Mark FORBIDDEN the remaining ports that are vulnerable for more thandougb2011-09-261-0/+3
* - Add LDFLAGS to CONFIGURE_ENV and MAKE_ENV (as it was done with LDFLAGS)amdmi32011-09-241-1/+1
* Update to 2.99.4.novel2011-07-261-3/+4