Changeset b1df1d7
- Timestamp:
- 04/22/2022 04:39:15 AM (2 years ago)
- Branches:
- xry111/clfs-ng
- Children:
- dd7a29e
- Parents:
- fcd909d (diff), 93db1e61 (diff)
Note: this is a merge changeset, the changes displayed below correspond to the merge itself.
Use the(diff)
links above to see all the changes relative to each parent. - Files:
-
- 13 edited
Legend:
- Unmodified
- Added
- Removed
-
chapter03/packages.xml
rfcd909d rb1df1d7 11 11 <title>All Packages</title> 12 12 13 <note> 14 <para>Read the <ulink url='&secadv;'>security advisories</ulink> 15 before downloading packages to figure out if a newer version of any 16 package should be used to avoid security vulnerabilities.</para> 17 18 <para>The upstreams may remove old releases, especially when these 19 releases contain a security vulnerability. If one URL below is not 20 reachable, you should read the security advisories first to figure out 21 if a newer version (with the vulnerability fixed) should be used. If 22 not, try to download the removed package from a mirror. Although it's 23 possible to download an old release from a mirror even if this release 24 has been removed because of a vulnerability, it's not recommended to 25 use a release known to be vulnerable for building your system.</para> 26 </note> 27 13 28 <para>Download or otherwise obtain the following packages:</para> 14 29 … … 174 189 <para>Download: <ulink url="&expat-url;"/></para> 175 190 <para>MD5 sum: <literal>&expat-md5;</literal></para> 176 <note>177 <para>The upstream may remove tarballs of the specific releases of178 <application>Expat</application> when these releases contain a179 security vulnerability. You should refer to180 <ulink url='&lfs-root;lfs/advisories/'>LFS security advisories</ulink>181 to figure out which version (with the vulnerability fixed) should182 be used. You may download the vulnerable version from a mirror,183 but it's not recommended.</para>184 </note>185 191 </listitem> 186 192 </varlistentry> -
chapter04/addinguser.xml
rfcd909d rb1df1d7 84 84 85 85 <note><para>In some host systems, the following command does not complete 86 properly and suspends the login to the lfs user to the background. If the87 prompt "lfs:~$" does not appear immediately, entering the86 properly and suspends the login to the &lfs-user; user to the background. 87 If the prompt "lfs:~$" does not appear immediately, entering the 88 88 <command>fg</command> command will fix the issue.</para></note> 89 89 -
chapter07/cleanup.xml
rfcd909d rb1df1d7 137 137 138 138 <warning><para>The following commands are extremely dangerous. If 139 you run <command>rm -rf ./*</command> as the rootuser and you139 you run <command>rm -rf ./*</command> as the &root; user and you 140 140 do not change to the <filename>lfs-target</filename> directory, 141 141 it will destroy your entire host system. -
chapter07/introduction.xml
rfcd909d rb1df1d7 33 33 that they are mounted by issuing <command>mount</command>.</para> 34 34 35 <para>All commands in this and following chapters are run as rooton the35 <para>All commands in this and following chapters are run as &root; on the 36 36 target system, fortunately without access to the host system. 37 37 Be careful anyway, as if the storage devices of your target system already -
chapter08/bash.xml
rfcd909d rb1df1d7 74 74 <screen><userinput remap="test">chown -Rv tester .</userinput></screen> 75 75 76 <para>The testsuite of the package is designed to be run as a non- root76 <para>The testsuite of the package is designed to be run as a non-&root; 77 77 user that owns the terminal connected to standard input. To satisfy the 78 78 requirement, spawn a new pseudo terminal using -
chapter08/coreutils.xml
rfcd909d rb1df1d7 130 130 <screen><userinput remap="test">echo "dummy:x:102:tester" >> /etc/group</userinput></screen> 131 131 132 <para>Fix some of the permissions so that the non- root user can compile and133 run the tests:</para>132 <para>Fix some of the permissions so that the non-&root; user can 133 compile and run the tests:</para> 134 134 135 135 <screen><userinput remap="test">chown -Rv tester . </userinput></screen> -
chapter08/python.xml
rfcd909d rb1df1d7 110 110 </userinput></screen> 111 111 112 <important> 113 <para> 114 In LFS and BLFS we normally build and install Python modules with the 115 <command>pip3</command> command. Please take care that the 116 <command>pip3 install</command> commands in both the books should be 117 run as the &root; user unless it's for a Python virtual environment. 118 Running a <command>pip3 install</command> as a non-&root; user may seem 119 to work fine, but it will cause the installed module to be inaccessible 120 by other users. 121 </para> 122 123 <para> 124 <command>pip3 install</command> will not reinstall an already installed 125 module by default. For using the <command>pip3 install</command> 126 command to upgrade a module (for example, from meson-0.61.3 to 127 meson-0.62.0), insert the option <parameter>--upgrade</parameter> into 128 the command line. If it's really necessary to downgrade a module or 129 reinstall the same version for some reason, insert 130 <parameter>--force-reinstall</parameter> into the command line. 131 </para> 132 </important> 112 133 113 134 <para>If desired, install the preformatted documentation:</para> -
chapter08/util-linux.xml
rfcd909d rb1df1d7 85 85 <screen><userinput remap="make">make</userinput></screen> 86 86 87 <para>If desired, run the test suite as a non- rootuser:</para>87 <para>If desired, run the test suite as a non-&root; user:</para> 88 88 89 89 <warning><para>Running the test suite as the -
chapter10/kernel.xml
rfcd909d rb1df1d7 250 250 the files copied below should go there. The easiest way to do that is 251 251 to mount <filename class="directory">/boot</filename> before 252 proceeding. As the rootuser:</para>252 proceeding. As the &root; user:</para> 253 253 254 254 <screen role="nodump"><userinput>mount /boot</userinput></screen> -
chapter11/reboot.xml
rfcd909d rb1df1d7 47 47 <listitem><para>Installing <ulink 48 48 url='&blfs-book;postlfs/sudo.html'>sudo</ulink> may be useful for 49 building packages as a non- root user and easily installing the resulting50 packages in your new system.</para></listitem>49 building packages as a non-&root; user and easily installing the 50 resulting packages in your new system.</para></listitem> 51 51 52 52 <listitem><para>If you want to access your new system from a remote system -
general.ent
rfcd909d rb1df1d7 113 113 <!ENTITY github "https://github.com"> 114 114 115 <!ENTITY root "<systemitem class='username'>root</systemitem>"> 116 <!ENTITY lfs-user "<systemitem class='username'>lfs</systemitem>"> 117 115 118 <!ENTITY % packages-entities SYSTEM "packages.ent"> 116 119 %packages-entities; -
lfs-latest-git.php
rfcd909d rb1df1d7 71 71 { 72 72 if ( ! preg_match( "/sourceforge/", $url ) && 73 ! preg_match( "/mpfr/", $url ) && 73 74 ! preg_match( "/psmisc/", $url ) ) 74 75 { 75 76 exec( "curl --location --silent --max-time 30 $url", $dir ); 76 77 78 $s = implode( "\n", $dir ); 79 $dir = strip_tags( $s ); 80 return explode( "\n", $dir ); 81 } 82 else if ( preg_match( "/mpfr/", $url ) ) 83 { 84 # There seems to be a problem with the mpfs certificate 85 exec( "curl --location --silent --insecure --max-time 30 $url", $dir ); 77 86 $s = implode( "\n", $dir ); 78 87 $dir = strip_tags( $s ); … … 138 147 if ( $package == "util-linux" ) $dirpath = max_parent( $dirpath, "v." ); 139 148 if ( $package == "vim" ) $dirpath = "https://github.com/vim/vim/tags"; 149 if ( $package == "wheel" ) $dirpath = "https://pypi.org/project/wheel/#files"; 140 150 if ( $package == "zstd" ) $dirpath = "https://github.com/facebook/zstd/releases"; 141 151 -
packages.ent
rfcd909d rb1df1d7 515 515 <!ENTITY mpfr-version "4.1.0"> 516 516 <!ENTITY mpfr-size "1,490 KB"> 517 <!ENTITY mpfr-url "https:// www.mpfr.org/mpfr-&mpfr-version;/mpfr-&mpfr-version;.tar.xz">517 <!ENTITY mpfr-url "https://ftp.gnu.org/gnu/mpfr/mpfr-&mpfr-version;.tar.xz"> 518 518 <!ENTITY mpfr-md5 "bdd3d5efba9c17da8d83a35ec552baef"> 519 519 <!ENTITY mpfr-home "https://www.mpfr.org/">
Note:
See TracChangeset
for help on using the changeset viewer.