diff options
-rwxr-xr-x | devel/git/DETAILS | 2 | ||||
-rwxr-xr-x | kde4-support/gluon/DETAILS | 2 | ||||
-rwxr-xr-x | shell-term-fm/bash/DETAILS | 1 | ||||
-rw-r--r-- | shell-term-fm/bash/HISTORY | 5 | ||||
-rwxr-xr-x | shell-term-fm/bash/PRE_BUILD | 7 | ||||
-rw-r--r-- | shell-term-fm/bash/patches/bash41-001 | 48 | ||||
-rw-r--r-- | shell-term-fm/bash/patches/bash41-002 | 65 | ||||
-rw-r--r-- | shell-term-fm/bash/patches/bash41-003 | 48 | ||||
-rw-r--r-- | shell-term-fm/bash/patches/bash41-004 | 47 | ||||
-rw-r--r-- | shell-term-fm/bash/patches/bash41-005 | 56 |
10 files changed, 279 insertions, 2 deletions
diff --git a/devel/git/DETAILS b/devel/git/DETAILS index 497170f64c..6ab756b582 100755 --- a/devel/git/DETAILS +++ b/devel/git/DETAILS @@ -17,7 +17,7 @@ if [[ $GIT_DOC == manpages || $GIT_DOC == both ]]; then SOURCE4_IGNORE=signature fi if [[ $GIT_DOC == htmldocs || $GIT_DOC == both ]]; then - SOURCE5=$SPELL-htmldocs-${VERSION//.1}.tar.bz2 + SOURCE5=$SPELL-htmldocs-$VERSION.tar.bz2 SOURCE6=$SOURCE5.sign SOURCE5_GPG=kernel.gpg:$SOURCE5.sign:UPSTREAM_KEY SOURCE5_URL=$KERNEL_URL/pub/software/scm/git/$SOURCE5 diff --git a/kde4-support/gluon/DETAILS b/kde4-support/gluon/DETAILS index cab1742621..9004a9dd7d 100755 --- a/kde4-support/gluon/DETAILS +++ b/kde4-support/gluon/DETAILS @@ -7,7 +7,7 @@ SOURCE_DIRECTORY=$BUILD_DIRECTORY/gluon-gluon SOURCE_URL=$WEB_SITE/sites/default/files/$SOURCE PATCHLEVEL=1 LICENSE[0]=LGPL - ENTERED=2009-11-24 + ENTERED=20091124 KEYWORDS="kde games library" SHORT="high-level game development library for KDE4" cat << EOF diff --git a/shell-term-fm/bash/DETAILS b/shell-term-fm/bash/DETAILS index df63376d89..fe46c7ec5f 100755 --- a/shell-term-fm/bash/DETAILS +++ b/shell-term-fm/bash/DETAILS @@ -15,6 +15,7 @@ SOURCE_DIRECTORY="$BUILD_DIRECTORY/$SPELL-$VERSION" SOURCE4_IGNORE=signature WEB_SITE=http://cnswww.cns.cwru.edu/~chet/bash/bashtop.html ENTERED=20010922 + PATCHLEVEL=1 LICENSE[0]=GPL2 KEYWORDS="console" SHORT="Bourne Again SHell for the GNU operating system" diff --git a/shell-term-fm/bash/HISTORY b/shell-term-fm/bash/HISTORY index 6b370738b7..bc92db41ca 100644 --- a/shell-term-fm/bash/HISTORY +++ b/shell-term-fm/bash/HISTORY @@ -1,3 +1,8 @@ +2010-04-24 George Sherwood <gsherwood@sourcemage.org> + * DETAILS: PATCHLEVEL++ + * PRE_BUILD: Added upstream patches + * patches/bash41-001 to 005: Added upstream patches. + 2010-01-02 George Sherwood <gsherwood@sourcemage.org> * DETAILS: Updated to version 4.1. Removed PATCHLEVEL * PRE_BUILD: Removed 4.0 patches diff --git a/shell-term-fm/bash/PRE_BUILD b/shell-term-fm/bash/PRE_BUILD index c88be2a16a..6167dfeabe 100755 --- a/shell-term-fm/bash/PRE_BUILD +++ b/shell-term-fm/bash/PRE_BUILD @@ -2,6 +2,13 @@ default_pre_build && cd "$SOURCE_DIRECTORY" && unpack_file 3 && +patch -p0 < $SCRIPT_DIRECTORY/patches/bash41-001 && +patch -p0 < $SCRIPT_DIRECTORY/patches/bash41-002 && +patch -p0 < $SCRIPT_DIRECTORY/patches/bash41-003 && +patch -p0 < $SCRIPT_DIRECTORY/patches/bash41-004 && +patch -p0 < $SCRIPT_DIRECTORY/patches/bash41-005 && + + if [[ "$BASH_NI_LOGIN" == y ]]; then message "${MESSAGE_COLOR}Defining NON_INTERACTIVE_LOGIN_SHELLS.$DEFAULT_COLOR" && sed -i 's/\/\* \(#define NON_INTERACTIVE_LOGIN_SHELLS\) \*\//\1/' config-top.h diff --git a/shell-term-fm/bash/patches/bash41-001 b/shell-term-fm/bash/patches/bash41-001 new file mode 100644 index 0000000000..758e1fa400 --- /dev/null +++ b/shell-term-fm/bash/patches/bash41-001 @@ -0,0 +1,48 @@ + BASH PATCH REPORT + ================= + +Bash-Release: 4.1 +Patch-ID: bash41-001 + +Bug-Reported-by: Yann Rouillard <yann@pleiades.fr.eu.org> +Bug-Reference-ID: <4B44A410.4070107@pleiades.fr.eu.org> +Bug-Reference-URL: http://lists.gnu.org/archive/html/bug-bash/2010-01/msg00018.html + +Bug-Description: + +A prototype for vsnprintf was incorrect, and caused compilation failures +on systems that did not have a suitable vsnprintf, but had a declaration in +one of the system header files. + +Patch (apply with `patch -p0'): + +*** ../bash-4.1-patched/builtins/printf.def 2009-11-20 15:31:23.000000000 -0500 +--- builtins/printf.def 2010-01-07 08:50:06.000000000 -0500 +*************** +*** 173,177 **** + + #if !HAVE_VSNPRINTF +! extern int vsnprintf __P((char *, size_t, const char *, ...)) __attribute__((__format__ (printf, 3, 4))); + #endif + +--- 173,177 ---- + + #if !HAVE_VSNPRINTF +! extern int vsnprintf __P((char *, size_t, const char *, va_list)) __attribute__((__format__ (printf, 3, 0))); + #endif + +*** ../bash-4.1-patched/patchlevel.h 2009-10-01 16:39:22.000000000 -0400 +--- patchlevel.h 2010-01-14 09:38:08.000000000 -0500 +*************** +*** 26,30 **** + looks for to find the patch level (for the sccs version string). */ + +! #define PATCHLEVEL 0 + + #endif /* _PATCHLEVEL_H_ */ +--- 26,30 ---- + looks for to find the patch level (for the sccs version string). */ + +! #define PATCHLEVEL 1 + + #endif /* _PATCHLEVEL_H_ */ diff --git a/shell-term-fm/bash/patches/bash41-002 b/shell-term-fm/bash/patches/bash41-002 new file mode 100644 index 0000000000..a1151985c8 --- /dev/null +++ b/shell-term-fm/bash/patches/bash41-002 @@ -0,0 +1,65 @@ + BASH PATCH REPORT + ================= + +Bash-Release: 4.1 +Patch-ID: bash41-002 + +Bug-Reported-by: guillaume.outters@free.fr +Bug-Reference-ID: <20100105230441.70D171AA7F52@asterix.local> +Bug-Reference-URL: http://lists.gnu.org/archive/html/bug-bash/2010-01/msg00017.html + +Bug-Description: + +Bash-4.1/Readline-6.1 introduced a hook function that allows applications +to rewrite or modify filenames read from the file system before comparing +them with a word to be completed. The converted filename, if it matches, +needs to be inserted into the line buffer, replacing the original contents. + +This fixes a completion bug on Mac OS X involving filenames containing +UTF-8 characters. + +Patch (apply with `patch -p0'): + +*** ../bash-4.1-patched/lib/readline/complete.c 2009-11-29 18:39:30.000000000 -0500 +--- lib/readline/complete.c 2010-01-06 08:30:23.000000000 -0500 +*************** +*** 2139,2143 **** + if (filename_len == 0) + { +! if (_rl_match_hidden_files == 0 && HIDDEN_FILE (entry->d_name)) + continue; + +--- 2139,2143 ---- + if (filename_len == 0) + { +! if (_rl_match_hidden_files == 0 && HIDDEN_FILE (convfn)) + continue; + +*************** +*** 2220,2224 **** + } + +! strcpy (temp + dirlen, entry->d_name); + } + else +--- 2220,2224 ---- + } + +! strcpy (temp + dirlen, convfn); + } + else +*** ../bash-4.1-patched/patchlevel.h 2009-10-01 16:39:22.000000000 -0400 +--- patchlevel.h 2010-01-14 09:38:08.000000000 -0500 +*************** +*** 26,30 **** + looks for to find the patch level (for the sccs version string). */ + +! #define PATCHLEVEL 1 + + #endif /* _PATCHLEVEL_H_ */ +--- 26,30 ---- + looks for to find the patch level (for the sccs version string). */ + +! #define PATCHLEVEL 2 + + #endif /* _PATCHLEVEL_H_ */ diff --git a/shell-term-fm/bash/patches/bash41-003 b/shell-term-fm/bash/patches/bash41-003 new file mode 100644 index 0000000000..479fdcd9df --- /dev/null +++ b/shell-term-fm/bash/patches/bash41-003 @@ -0,0 +1,48 @@ + BASH PATCH REPORT + ================= + +Bash-Release: 4.1 +Patch-ID: bash41-003 + +Bug-Reported-by: coyote@wariat.org.pl +Bug-Reference-ID: <4b64a1f8.06e2660a.60af.4bfb@mx.google.com> +Bug-Reference-URL: http://lists.gnu.org/archive/html/bug-bash/2010-01/msg00135.html + +Bug-Description: + +If command completion is attempted on a word with a quoted globbing +character (e.g., `*' or `?'), bash can reference a NULL pointer and +dump core. + +Patch (apply with `patch -p0'): + +*** ../bash-4.1-patched/bashline.c 2009-10-24 14:10:19.000000000 -0400 +--- bashline.c 2010-01-30 21:53:49.000000000 -0500 +*************** +*** 1681,1685 **** + characters in the common prefix are bad) will ever be returned on + regular completion. */ +! if (glob_pattern_p (hint)) + { + if (state == 0) +--- 1681,1685 ---- + characters in the common prefix are bad) will ever be returned on + regular completion. */ +! if (globpat) + { + if (state == 0) +*** ../bash-4.1-patched/patchlevel.h 2009-10-01 16:39:22.000000000 -0400 +--- patchlevel.h 2010-01-14 09:38:08.000000000 -0500 +*************** +*** 26,30 **** + looks for to find the patch level (for the sccs version string). */ + +! #define PATCHLEVEL 2 + + #endif /* _PATCHLEVEL_H_ */ +--- 26,30 ---- + looks for to find the patch level (for the sccs version string). */ + +! #define PATCHLEVEL 3 + + #endif /* _PATCHLEVEL_H_ */ diff --git a/shell-term-fm/bash/patches/bash41-004 b/shell-term-fm/bash/patches/bash41-004 new file mode 100644 index 0000000000..33f79bb7cd --- /dev/null +++ b/shell-term-fm/bash/patches/bash41-004 @@ -0,0 +1,47 @@ + BASH PATCH REPORT + ================= + +Bash-Release: 4.1 +Patch-ID: bash41-004 + +Bug-Reported-by: Crestez Dan Leonard <cdleonard@gmail.com> +Bug-Reference-ID: <1265592839.30682.21.camel@deskbox> +Bug-Reference-URL: http://lists.gnu.org/archive/html/bug-bash/2010-02/msg00034.html + +Bug-Description: + +When running in Posix mode and executing a shell function without local +variables, bash will not propagate a variable in a special builtin's temporary +environment to have global scope. + +Patch (apply with `patch -p0'): + +*** ../bash-4.1-patched/variables.c 2009-11-03 14:13:58.000000000 -0500 +--- variables.c 2010-02-08 17:36:18.000000000 -0500 +*************** +*** 3809,3812 **** +--- 3809,3817 ---- + if (tempvar_p (var) && (posixly_correct || (var->attributes & att_propagate))) + { ++ /* Make sure we have a hash table to store the variable in while it is ++ being propagated down to the global variables table. Create one if ++ we have to */ ++ if ((vc_isfuncenv (shell_variables) || vc_istempenv (shell_variables)) && shell_variables->table == 0) ++ shell_variables->table = hash_create (0); + /* XXX - should we set v->context here? */ + v = bind_variable_internal (var->name, value_cell (var), shell_variables->table, 0, 0); +*** ../bash-4.1-patched/patchlevel.h 2009-10-01 16:39:22.000000000 -0400 +--- patchlevel.h 2010-01-14 09:38:08.000000000 -0500 +*************** +*** 26,30 **** + looks for to find the patch level (for the sccs version string). */ + +! #define PATCHLEVEL 3 + + #endif /* _PATCHLEVEL_H_ */ +--- 26,30 ---- + looks for to find the patch level (for the sccs version string). */ + +! #define PATCHLEVEL 4 + + #endif /* _PATCHLEVEL_H_ */ diff --git a/shell-term-fm/bash/patches/bash41-005 b/shell-term-fm/bash/patches/bash41-005 new file mode 100644 index 0000000000..8a2fec8a37 --- /dev/null +++ b/shell-term-fm/bash/patches/bash41-005 @@ -0,0 +1,56 @@ + BASH PATCH REPORT + ================= + +Bash-Release: 4.1 +Patch-ID: bash41-005 + +Bug-Reported-by: werner@suse.de +Bug-Reference-ID: <201002251238.o1PCcYcg016893@boole.suse.de> +Bug-Reference-URL: http://lists.gnu.org/archive/html/bug-bash/2010-02/msg00132.html + +Bug-Description: + +When the `read' builtin times out after the timeout specified with -t is +exceeded, it does not reset the flags that tell signal handlers to process +signals immediately instead of deferring their handling. This can result +in unsafe functions being called from signal handlers, which can cause bash +to hang or dump core. + +Patch (apply with `patch -p0'): + +*** ../bash-4.1-patched/builtins/read.def 2009-10-08 11:35:46.000000000 -0400 +--- builtins/read.def 2010-03-17 17:35:39.000000000 -0400 +*************** +*** 616,621 **** + zsyncfd (fd); + +- interrupt_immediately--; +- terminate_immediately--; + discard_unwind_frame ("read_builtin"); + +--- 616,619 ---- +*************** +*** 624,627 **** +--- 622,628 ---- + assign_vars: + ++ interrupt_immediately--; ++ terminate_immediately--; ++ + #if defined (ARRAY_VARS) + /* If -a was given, take the string read, break it into a list of words, +*** ../bash-4.1-patched/patchlevel.h 2009-10-01 16:39:22.000000000 -0400 +--- patchlevel.h 2010-01-14 09:38:08.000000000 -0500 +*************** +*** 26,30 **** + looks for to find the patch level (for the sccs version string). */ + +! #define PATCHLEVEL 4 + + #endif /* _PATCHLEVEL_H_ */ +--- 26,30 ---- + looks for to find the patch level (for the sccs version string). */ + +! #define PATCHLEVEL 5 + + #endif /* _PATCHLEVEL_H_ */ |