diff options
author | wiz <wiz@pkgsrc.org> | 2003-02-09 14:59:12 +0000 |
---|---|---|
committer | wiz <wiz@pkgsrc.org> | 2003-02-09 14:59:12 +0000 |
commit | 620d99bab028512652b537e2eb559c27a3bfd6b5 (patch) | |
tree | b0a8d73b1155f5d80040b4a47622c69e5b40d118 | |
parent | 8d8efc29c878dd7d20f82e5b9efc8bf9c1ba2975 (diff) | |
download | pkgsrc-620d99bab028512652b537e2eb559c27a3bfd6b5.tar.gz |
Open/close HTML mark-up in the correct order. Noted by Kevin P. Neal.
-rw-r--r-- | mk/bsd.pkg.mk | 4 | ||||
-rwxr-xr-x | mk/scripts/genreadme.awk | 4 |
2 files changed, 4 insertions, 4 deletions
diff --git a/mk/bsd.pkg.mk b/mk/bsd.pkg.mk index 3d755733cc6..7cbb4e70e26 100644 --- a/mk/bsd.pkg.mk +++ b/mk/bsd.pkg.mk @@ -1,4 +1,4 @@ -# $NetBSD: bsd.pkg.mk,v 1.1137 2003/02/09 14:38:51 wiz Exp $ +# $NetBSD: bsd.pkg.mk,v 1.1138 2003/02/09 14:59:12 wiz Exp $ # # This file is in the public domain. # @@ -3626,7 +3626,7 @@ show-vulnerabilities-html: if [ -f ${DISTDIR}/vulnerabilities ]; then \ ${AWK} '/^${PKGBASE}[-<>=]+[0-9]/ { gsub("\<", "\\<", $$1); \ gsub("\>", "\\>", $$1); \ - printf("<STRONG><LI>%s has a %s exploit (see <a href=\"%s\">%s</a> for more details)</STRONG>\n", $$1, $$2, $$3, $$3) }' \ + printf("<LI><STRONG>%s has a %s exploit (see <a href=\"%s\">%s</a> for more details)</STRONG></LI>\n", $$1, $$2, $$3, $$3) }' \ ${DISTDIR}/vulnerabilities; \ fi diff --git a/mk/scripts/genreadme.awk b/mk/scripts/genreadme.awk index 519e0ceba1a..d194751044b 100755 --- a/mk/scripts/genreadme.awk +++ b/mk/scripts/genreadme.awk @@ -1,5 +1,5 @@ #!/usr/bin/awk -f -# $NetBSD: genreadme.awk,v 1.5 2003/02/08 06:47:52 yyamano Exp $ +# $NetBSD: genreadme.awk,v 1.6 2003/02/09 15:06:54 wiz Exp $ # # Copyright (c) 2002, 2003 The NetBSD Foundation, Inc. # All rights reserved. @@ -329,7 +329,7 @@ END { gsub(/</, "\\\\\\<", printurl); gsub(/>/, "\\\\\\>", printurl); if (vulpkg[i] ~ "^" pkgbase"[-<>=]+[0-9]") { - vul = sprintf("%s<STRONG><LI> %s has a %s exploit (see <a href=\"%s\">%s</a> for more details)</STRONG>\n", + vul = sprintf("%s<LI><STRONG> %s has a %s exploit (see <a href=\"%s\">%s</a> for more details)</STRONG></LI>\n", vul, nm, vultype[i], url, printurl); |