From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from pigeon.gentoo.org ([208.92.234.80] helo=lists.gentoo.org) by finch.gentoo.org with esmtp (Exim 4.60) (envelope-from ) id 1SOvuB-0007Aw-3l for garchives@archives.gentoo.org; Mon, 30 Apr 2012 19:05:04 +0000 Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id E30A3E0C84; Mon, 30 Apr 2012 19:04:28 +0000 (UTC) Received: from mail2.viabit.com (mail2.viabit.com [65.246.80.16]) by pigeon.gentoo.org (Postfix) with ESMTP id 0894BE0C33 for ; Mon, 30 Apr 2012 19:01:28 +0000 (UTC) Received: from [10.1.1.204] (unknown [65.213.236.244]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail2.viabit.com (Postfix) with ESMTPSA id 4436937B31 for ; Mon, 30 Apr 2012 15:01:28 -0400 (EDT) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=orlitzky.com; s=mail2; t=1335812488; bh=m6oOKqqtedGY9rizyvL7a9HDC3bG8+1uZg82HJBZl5k=; h=Message-ID:Date:From:MIME-Version:To:Subject:References: In-Reply-To:Content-Type:Content-Transfer-Encoding; b=D/kEb+w0QJP5YK/z1Cjc6KyC+/pfFRNjcBRsm3iWgEMGgRhkGgc8SbSJK7XxYA58k 4kmYMNL93VAeIkwgpKGD8SZV+7ruwTcYHnTUKbrGWDFsEghu1Ji83ka5PbsGSFkWMY aADvrKPJ8QgrTBLbIf+5m0BL2txj4cdD6sy0zzqI= Message-ID: <4F9EE188.9030601@orlitzky.com> Date: Mon, 30 Apr 2012 15:01:28 -0400 From: Michael Orlitzky User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:10.0.3) Gecko/20120423 Thunderbird/10.0.3 Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-user@lists.gentoo.org Reply-to: gentoo-user@lists.gentoo.org MIME-Version: 1.0 To: gentoo-user@lists.gentoo.org Subject: Re: [gentoo-user] fetch restriction bypass References: <4F9EDBCE.3020808@orlitzky.com> In-Reply-To: Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Archives-Salt: 6f6f06e9-cf63-432a-8f0b-bffccea4dfb5 X-Archives-Hash: 522d1356e205f95fb1f9ce6195bfd8ec On 04/30/12 14:44, Michael Mol wrote: > > Does the ebuild for portage support user-supplied patches? > It doesn't look like it, but you can always hack it with, post_src_unpack() { cd "${S}" epatch_user } in your ~/.bashrc.