/usr/ports/sysutils/sysinfo/files # cat patch-modules_packages
--- modules/packages.orig 2009-05-21 17:13:53 UTC
+++ modules/packages
@@ -7,32 +7,28 @@ APPDIR=${APPDIR:-..}
sect "Packages information";
-NUMP=`pkg_info | wc -l | awk '{print $1}'`
-OUTD=`pkg_version -Iv | grep -c "needs updating"`
+NUMP=`pkg info | wc -l | awk '{print $1}'`
+OUTD=`pkg version -Iv | grep -c "needs updating"`
echo -e "There are $NUMP packages installed in the system and $OUTD of them needs updating."
echo -e "${C_BOLD_S}Note that this number may be inaccurate, as your ports tree may be outdated too.${C_BOLD_E}\n"
if is_verbose 1; then
- pkg_info
+ pkg info
echo
else
- info "Run pkg_info(1) to see a full list of installed packages."
+ info "Run pkg info(1) to see a full list of installed packages."
fi
-info "Use pkg_version(1) to inspect what packages are outdated."
-info "Use the portsnap(8) or csup(1) tool to update your ports tree."
+info "Use pkg version(1) to inspect what packages are outdated."
+info "Use the portsnap(8), svnlite(1) or csup(1) tool to update your ports tree."
echo
-if which -s portaudit; then
- subsect "Packages with known security vulnerabilities:"
- portaudit -a
- echo -e "\n${C_BOLD_S}Note that this information may be inaccurate, \
-as the portaudit(1) database may be outdated.${C_BOLD_E}\n"
-else
- warn "You should install the portaudit(1) tool in order to get information \
-about known security vulnerabilities in your packages."
-fi
+subsect "Packages with known security vulnerabilities:"
+pkg audit
+echo -e "\n${C_BOLD_S}Note that this information may be inaccurate, \
+as the database may be outdated. Run pkg audit -F to update the database before the audit.${C_BOLD_E}\n"
+warn "Jails are not checked."
exit 0