From 5beb7e7589e6dd9014fc39a92862bba6697ad9fd Mon Sep 17 00:00:00 2001 From: Mike Frysinger Date: Tue, 26 Oct 2004 23:22:23 +0000 Subject: stack make.defaults --- profiles/uclibc/make.defaults | 38 ++++++++++++++++++++++++++++++++++++++ 1 file changed, 38 insertions(+) create mode 100644 profiles/uclibc/make.defaults (limited to 'profiles/uclibc/make.defaults') diff --git a/profiles/uclibc/make.defaults b/profiles/uclibc/make.defaults new file mode 100644 index 000000000000..5b3b068da89f --- /dev/null +++ b/profiles/uclibc/make.defaults @@ -0,0 +1,38 @@ +USE="berkdb ncurses readline zlib uclibc" +GRP_STAGE23_USE="berkdb ncurses readline zlib uclibc" +STAGE1_USE="uclibc" + +PORTAGE_LIBC="uClibc" + +# +# FEATURES are settings that affect the functionality of portage. Most of +# these settings are for developer use, but some are available to non- +# developers as well. +# +# 'nodoc' remove 'doc' in the preinstall phase. +# functionality equivalent to rm -rf usr/share/doc/ +# +# 'noinfo' remove 'info' pages in the preinstall phase. +# functionality equivalent to rm -rf usr/share/info/ +# +# 'noman' remove 'man' pages in the preinstall phase. +# functionality equivalent to rm -rf usr/share/man/ +# +# 'sandbox' enable sandbox-ing when running emerge and ebuild +# +# 'sfperms' feature for security minded people that causes portage to +# remove group+other readable bits on setuid files and +# remove the other readable bits on setgid files. +# +# 'strict' causes portage to react strongly to conditions that +# have the potential to be dangerous -- like missing or +# incorrect Manifest files. +# +# 'userpriv' allows portage to drop root privleges while it is compiling +# as a security measure, and as a side effect this can remove +# sandbox access violations for users. +# +# 'usersandbox' enables sandboxing while portage is running under userpriv. +# unpack -- for debugging purposes only. + +FEATURES="sandbox sfperms strict nodoc noinfo noman autoconfig" -- cgit v1.2.3-65-gdbad