Changeset b1df1d7


Ignore:
Timestamp:
04/22/2022 04:39:15 AM (2 years ago)
Author:
Xi Ruoyao <xry111@…>
Branches:
xry111/clfs-ng
Children:
dd7a29e
Parents:
fcd909d (diff), 93db1e61 (diff)
Note: this is a merge changeset, the changes displayed below correspond to the merge itself.
Use the (diff) links above to see all the changes relative to each parent.
Message:

Merge branch 'trunk' into xry111/clfs-ng

Files:
13 edited

Legend:

Unmodified
Added
Removed
  • chapter03/packages.xml

    rfcd909d rb1df1d7  
    1111  <title>All Packages</title>
    1212
     13  <note>
     14    <para>Read the <ulink url='&secadv;'>security advisories</ulink>
     15    before downloading packages to figure out if a newer version of any
     16    package should be used to avoid security vulnerabilities.</para>
     17
     18    <para>The upstreams may remove old releases, especially when these
     19    releases contain a security vulnerability.  If one URL below is not
     20    reachable, you should read the security advisories first to figure out
     21    if a newer version (with the vulnerability fixed) should be used.  If
     22    not, try to download the removed package from a mirror.  Although it's
     23        possible to download an old release from a mirror even if this release
     24        has been removed because of a vulnerability, it's not recommended to
     25        use a release known to be vulnerable for building your system.</para>
     26  </note>
     27
    1328  <para>Download or otherwise obtain the following packages:</para>
    1429
     
    174189        <para>Download: <ulink url="&expat-url;"/></para>
    175190        <para>MD5 sum: <literal>&expat-md5;</literal></para>
    176         <note>
    177           <para>The upstream may remove tarballs of the specific releases of
    178           <application>Expat</application> when these releases contain a
    179           security vulnerability.  You should refer to
    180           <ulink url='&lfs-root;lfs/advisories/'>LFS security advisories</ulink>
    181           to figure out which version (with the vulnerability fixed) should
    182           be used.  You may download the vulnerable version from a mirror,
    183           but it's not recommended.</para>
    184         </note>
    185191      </listitem>
    186192    </varlistentry>
  • chapter04/addinguser.xml

    rfcd909d rb1df1d7  
    8484
    8585  <note><para>In some host systems, the following command does not complete
    86   properly and suspends the login to the lfs user to the background.  If the
    87   prompt "lfs:~$" does not appear immediately, entering the
     86  properly and suspends the login to the &lfs-user; user to the background.
     87  If the prompt "lfs:~$" does not appear immediately, entering the
    8888  <command>fg</command> command will fix the issue.</para></note>
    8989
  • chapter07/cleanup.xml

    rfcd909d rb1df1d7  
    137137
    138138    <warning><para>The following commands are extremely dangerous.  If
    139     you run <command>rm -rf ./*</command> as the root user and you
     139    you run <command>rm -rf ./*</command> as the &root; user and you
    140140    do not change to the <filename>lfs-target</filename> directory,
    141141    it will destroy your entire host system.
  • chapter07/introduction.xml

    rfcd909d rb1df1d7  
    3333  that they are mounted by issuing <command>mount</command>.</para>
    3434
    35   <para>All commands in this and following chapters are run as root on the
     35  <para>All commands in this and following chapters are run as &root; on the
    3636  target system, fortunately without access to the host system.
    3737  Be careful anyway, as if the storage devices of your target system already
  • chapter08/bash.xml

    rfcd909d rb1df1d7  
    7474<screen><userinput remap="test">chown -Rv tester .</userinput></screen>
    7575
    76     <para>The testsuite of the package is designed to be run as a non-root
     76    <para>The testsuite of the package is designed to be run as a non-&root;
    7777    user that owns the terminal connected to standard input.  To satisfy the
    7878    requirement, spawn a new pseudo terminal using
  • chapter08/coreutils.xml

    rfcd909d rb1df1d7  
    130130<screen><userinput remap="test">echo "dummy:x:102:tester" &gt;&gt; /etc/group</userinput></screen>
    131131
    132     <para>Fix some of the permissions so that the non-root user can compile and
    133     run the tests:</para>
     132    <para>Fix some of the permissions so that the non-&root; user can
     133    compile and run the tests:</para>
    134134
    135135<screen><userinput remap="test">chown -Rv tester . </userinput></screen>
  • chapter08/python.xml

    rfcd909d rb1df1d7  
    110110</userinput></screen>
    111111
     112    <important>
     113      <para>
     114        In LFS and BLFS we normally build and install Python modules with the
     115        <command>pip3</command> command.  Please take care that the
     116        <command>pip3 install</command> commands in both the books should be
     117        run as the &root; user unless it's for a Python virtual environment.
     118        Running a <command>pip3 install</command> as a non-&root; user may seem
     119        to work fine, but it will cause the installed module to be inaccessible
     120        by other users.
     121      </para>
     122
     123      <para>
     124        <command>pip3 install</command> will not reinstall an already installed
     125        module by default.  For using the <command>pip3 install</command>
     126        command to upgrade a module (for example, from meson-0.61.3 to
     127        meson-0.62.0), insert the option <parameter>--upgrade</parameter> into
     128        the command line.  If it's really necessary to downgrade a module or
     129        reinstall the same version for some reason, insert
     130        <parameter>--force-reinstall</parameter> into the command line.
     131      </para>
     132    </important>
    112133
    113134    <para>If desired, install the preformatted documentation:</para>
  • chapter08/util-linux.xml

    rfcd909d rb1df1d7  
    8585<screen><userinput remap="make">make</userinput></screen>
    8686
    87     <para>If desired, run the test suite as a non-root user:</para>
     87    <para>If desired, run the test suite as a non-&root; user:</para>
    8888
    8989    <warning><para>Running the test suite as the
  • chapter10/kernel.xml

    rfcd909d rb1df1d7  
    250250      the files copied below should go there. The easiest way to do that is
    251251      to mount <filename class="directory">/boot</filename> before
    252       proceeding.  As the root user:</para>
     252      proceeding.  As the &root; user:</para>
    253253
    254254<screen role="nodump"><userinput>mount /boot</userinput></screen>
  • chapter11/reboot.xml

    rfcd909d rb1df1d7  
    4747    <listitem><para>Installing <ulink
    4848    url='&blfs-book;postlfs/sudo.html'>sudo</ulink> may be useful for
    49     building packages as a non-root user and easily installing the resulting
    50     packages in your new system.</para></listitem>
     49    building packages as a non-&root; user and easily installing the
     50    resulting packages in your new system.</para></listitem>
    5151
    5252    <listitem><para>If you want to access your new system from a remote system
  • general.ent

    rfcd909d rb1df1d7  
    113113<!ENTITY github          "https://github.com">
    114114
     115<!ENTITY root            "<systemitem class='username'>root</systemitem>">
     116<!ENTITY lfs-user        "<systemitem class='username'>lfs</systemitem>">
     117
    115118<!ENTITY % packages-entities SYSTEM "packages.ent">
    116119%packages-entities;
  • lfs-latest-git.php

    rfcd909d rb1df1d7  
    7171{
    7272  if ( ! preg_match( "/sourceforge/", $url ) &&
     73       ! preg_match( "/mpfr/",        $url ) &&
    7374       ! preg_match( "/psmisc/",      $url ) )
    7475  {
    7576    exec( "curl --location --silent --max-time 30 $url", $dir );
    7677
     78    $s   = implode( "\n", $dir );
     79    $dir = strip_tags( $s );
     80    return explode( "\n", $dir );
     81  }
     82  else if ( preg_match( "/mpfr/", $url ) )
     83  {
     84    # There seems to be a problem with the mpfs certificate
     85    exec( "curl --location --silent --insecure --max-time 30 $url", $dir );
    7786    $s   = implode( "\n", $dir );
    7887    $dir = strip_tags( $s );
     
    138147if ( $package == "util-linux" ) $dirpath = max_parent( $dirpath, "v." );
    139148if ( $package == "vim"        ) $dirpath = "https://github.com/vim/vim/tags";
     149if ( $package == "wheel"      ) $dirpath = "https://pypi.org/project/wheel/#files";
    140150if ( $package == "zstd"       ) $dirpath = "https://github.com/facebook/zstd/releases";
    141151
  • packages.ent

    rfcd909d rb1df1d7  
    515515<!ENTITY mpfr-version "4.1.0">
    516516<!ENTITY mpfr-size "1,490 KB">
    517 <!ENTITY mpfr-url "https://www.mpfr.org/mpfr-&mpfr-version;/mpfr-&mpfr-version;.tar.xz">
     517<!ENTITY mpfr-url "https://ftp.gnu.org/gnu/mpfr/mpfr-&mpfr-version;.tar.xz">
    518518<!ENTITY mpfr-md5 "bdd3d5efba9c17da8d83a35ec552baef">
    519519<!ENTITY mpfr-home "https://www.mpfr.org/">
Note: See TracChangeset for help on using the changeset viewer.