summaryrefslogtreecommitdiff
path: root/mk
diff options
context:
space:
mode:
authorwiz <wiz>2003-02-09 14:59:12 +0000
committerwiz <wiz>2003-02-09 14:59:12 +0000
commit0e018b00ffbd3a07462f3818cd04544237e06a00 (patch)
treeb0a8d73b1155f5d80040b4a47622c69e5b40d118 /mk
parentc7029991ce4ac84286c534bc8c652b2b5a1dca1e (diff)
downloadpkgsrc-0e018b00ffbd3a07462f3818cd04544237e06a00.tar.gz
Open/close HTML mark-up in the correct order. Noted by Kevin P. Neal.
Diffstat (limited to 'mk')
-rw-r--r--mk/bsd.pkg.mk4
-rwxr-xr-xmk/scripts/genreadme.awk4
2 files changed, 4 insertions, 4 deletions
diff --git a/mk/bsd.pkg.mk b/mk/bsd.pkg.mk
index 3d755733cc6..7cbb4e70e26 100644
--- a/mk/bsd.pkg.mk
+++ b/mk/bsd.pkg.mk
@@ -1,4 +1,4 @@
-# $NetBSD: bsd.pkg.mk,v 1.1137 2003/02/09 14:38:51 wiz Exp $
+# $NetBSD: bsd.pkg.mk,v 1.1138 2003/02/09 14:59:12 wiz Exp $
#
# This file is in the public domain.
#
@@ -3626,7 +3626,7 @@ show-vulnerabilities-html:
if [ -f ${DISTDIR}/vulnerabilities ]; then \
${AWK} '/^${PKGBASE}[-<>=]+[0-9]/ { gsub("\<", "\\&lt;", $$1); \
gsub("\>", "\\&gt;", $$1); \
- printf("<STRONG><LI>%s has a %s exploit (see <a href=\"%s\">%s</a> for more details)</STRONG>\n", $$1, $$2, $$3, $$3) }' \
+ printf("<LI><STRONG>%s has a %s exploit (see <a href=\"%s\">%s</a> for more details)</STRONG></LI>\n", $$1, $$2, $$3, $$3) }' \
${DISTDIR}/vulnerabilities; \
fi
diff --git a/mk/scripts/genreadme.awk b/mk/scripts/genreadme.awk
index 519e0ceba1a..d194751044b 100755
--- a/mk/scripts/genreadme.awk
+++ b/mk/scripts/genreadme.awk
@@ -1,5 +1,5 @@
#!/usr/bin/awk -f
-# $NetBSD: genreadme.awk,v 1.5 2003/02/08 06:47:52 yyamano Exp $
+# $NetBSD: genreadme.awk,v 1.6 2003/02/09 15:06:54 wiz Exp $
#
# Copyright (c) 2002, 2003 The NetBSD Foundation, Inc.
# All rights reserved.
@@ -329,7 +329,7 @@ END {
gsub(/</, "\\\\\\&lt;", printurl);
gsub(/>/, "\\\\\\&gt;", printurl);
if (vulpkg[i] ~ "^" pkgbase"[-<>=]+[0-9]") {
- vul = sprintf("%s<STRONG><LI> %s has a %s exploit (see <a href=\"%s\">%s</a> for more details)</STRONG>\n",
+ vul = sprintf("%s<LI><STRONG> %s has a %s exploit (see <a href=\"%s\">%s</a> for more details)</STRONG></LI>\n",
vul, nm,
vultype[i],
url, printurl);