diff options
author | nia <nia@pkgsrc.org> | 2021-06-05 14:17:05 +0000 |
---|---|---|
committer | nia <nia@pkgsrc.org> | 2021-06-05 14:17:05 +0000 |
commit | e9e8c967d4a15c4f01abffc59dc61149e333d464 (patch) | |
tree | a3cd7f0c789a6cd95b5b66cb6fc2f318f034d979 /pkgtools/pkg_install | |
parent | 436955cfb82f2562722ab16116d5523bf7f3a6e3 (diff) | |
download | pkgsrc-e9e8c967d4a15c4f01abffc59dc61149e333d464.tar.gz |
pkg_install: remove MESSAGE file
this completely fills the screen when it gets printed in the NetBSD
installer, and contains documentation that belongs (and is) elsewhere.
Diffstat (limited to 'pkgtools/pkg_install')
-rw-r--r-- | pkgtools/pkg_install/MESSAGE | 35 |
1 files changed, 0 insertions, 35 deletions
diff --git a/pkgtools/pkg_install/MESSAGE b/pkgtools/pkg_install/MESSAGE deleted file mode 100644 index 8ec7361f0a3..00000000000 --- a/pkgtools/pkg_install/MESSAGE +++ /dev/null @@ -1,35 +0,0 @@ -=========================================================================== -$NetBSD: MESSAGE,v 1.7 2017/01/09 07:01:33 sevan Exp $ - -You may wish to have the vulnerabilities file downloaded daily so that it -remains current. This may be done by adding an appropriate entry to the root -users crontab(5) entry. For example the entry - -# Download vulnerabilities file -0 3 * * * ${PREFIX}/sbin/pkg_admin fetch-pkg-vulnerabilities >/dev/null 2>&1 -# Audit the installed packages and email results to root -9 3 * * * ${PREFIX}/sbin/pkg_admin audit |mail -s "Installed package audit result" \ - root >/dev/null 2>&1 - -will update the vulnerability list every day at 3AM, followed by an audit at -3:09AM. The result of the audit are then emailed to root. On NetBSD this may be -accomplished instead by adding the following line to /etc/daily.conf: - -fetch_pkg_vulnerabilities=YES - -to fetch the vulnerability list from the daily security script. The system is -set to audit the packages by default but can be set explicitly, if desired (not -required), by adding the follwing line to /etc/security.conf: - -check_pkg_vulnerabilities=YES - -Both pkg_admin subcommands can be run as as an unprivileged user, -as long as the user chosen has permission to read the pkgdb and to write -the pkg-vulnerabilities to ${PKGVULNDIR}. - -The behavior of pkg_admin and pkg_add can be customised with -pkg_install.conf. Please see pkg_install.conf(5) for details. - -If you want to use GPG signature verification you will need to install -GnuPG and set the path for GPG appropriately in your pkg_install.conf. -=========================================================================== |