From 33fc6cffab40959eb1e43bb01a9b0c4dcb46d3ff Mon Sep 17 00:00:00 2001 From: Petr Šabata Date: Oct 14 2020 20:12:16 +0000 Subject: RHEL 9.0.0 Alpha bootstrap The content of this branch was automatically imported from Fedora ELN with the following as its source: https://src.fedoraproject.org/rpms/bash#a6e6d286e4a319b6ca72fd4b4457f11f806f25c1 --- diff --git a/.gitignore b/.gitignore index e69de29..72362fe 100644 --- a/.gitignore +++ b/.gitignore @@ -0,0 +1,6 @@ +bash-4.1.tar.gz +/bash-4.2-rc2.tar.gz +/bash-4.2.tar.gz +/bash-4.3.tar.gz +/bash-4.4.tar.gz +/bash-5.0.tar.gz diff --git a/STAGE1-bash b/STAGE1-bash new file mode 100644 index 0000000..c9ed3a9 --- /dev/null +++ b/STAGE1-bash @@ -0,0 +1,16 @@ +srpm bash +mcd $BUILDDIR/bash +cat < config.cache +bash_cv_func_ctype_nonascii=yes +bash_cv_opendir_not_robust=no +bash_cv_ulimit_maxfds=yes +bash_cv_func_sigsetjmp=present +bash_cv_printf_a_format=yes +bash_cv_job_control_missing=present +bash_cv_sys_named_pipes=present +bash_cv_unusable_rtsigs=no +EOF +$SRC/bash-*/configure --prefix=/ --cache-file=config.cache --build=$BUILD --host=$TARGET +make $J +make $J install DESTDIR=${ROOTFS} +(cd $ROOTFS/bin; ln -sf bash sh) diff --git a/bash-2.03-paths.patch b/bash-2.03-paths.patch new file mode 100644 index 0000000..24ec5cc --- /dev/null +++ b/bash-2.03-paths.patch @@ -0,0 +1,11 @@ +--- bash-3.0/config-top.h.paths 2003-08-05 15:36:12.000000000 +0100 ++++ bash-3.0/config-top.h 2004-07-28 09:36:27.117205637 +0100 +@@ -66,7 +66,7 @@ + the Posix.2 confstr () function, or CS_PATH define are not present. */ + #ifndef STANDARD_UTILS_PATH + #define STANDARD_UTILS_PATH \ +- "/bin:/usr/bin:/sbin:/usr/sbin:/etc:/usr/etc" ++ "/bin:/usr/bin:/usr/sbin:/sbin" + #endif + + /* Default primary and secondary prompt strings. */ diff --git a/bash-2.03-profile.patch b/bash-2.03-profile.patch new file mode 100644 index 0000000..ba3344b --- /dev/null +++ b/bash-2.03-profile.patch @@ -0,0 +1,12 @@ +diff -up bash-3.2/config-top.h.profile bash-3.2/config-top.h +--- bash-3.2/config-top.h.profile 2008-07-17 13:35:39.000000000 +0200 ++++ bash-3.2/config-top.h 2008-07-17 13:42:18.000000000 +0200 +@@ -26,6 +26,8 @@ + what POSIX.2 specifies. */ + #define CONTINUE_AFTER_KILL_ERROR + ++#define NON_INTERACTIVE_LOGIN_SHELLS ++ + /* Define BREAK_COMPLAINS if you want the non-standard, but useful + error messages about `break' and `continue' out of context. */ + #define BREAK_COMPLAINS diff --git a/bash-2.05a-interpreter.patch b/bash-2.05a-interpreter.patch new file mode 100644 index 0000000..110e44d --- /dev/null +++ b/bash-2.05a-interpreter.patch @@ -0,0 +1,218 @@ +diff --git a/config.h.in b/config.h.in +index 0adc903..366e639 100644 +--- a/config.h.in ++++ b/config.h.in +@@ -758,6 +758,9 @@ + /* Define if you have the pselect function. */ + #undef HAVE_PSELECT + ++/* Define if you have the pread function. */ ++#undef HAVE_PREAD ++ + /* Define if you have the putenv function. */ + #undef HAVE_PUTENV + +@@ -956,6 +959,9 @@ + /* Define if you have the header file. */ + #undef HAVE_DLFCN_H + ++/* Define if you have the header file. */ ++#undef HAVE_ELF_H ++ + /* Define if you have the header file. */ + #undef HAVE_GRP_H + +diff --git a/configure.ac b/configure.ac +index 2c74f13..4e9c3a4 100644 +--- a/configure.ac ++++ b/configure.ac +@@ -782,7 +782,7 @@ dnl checks for system calls + AC_CHECK_FUNCS(dup2 eaccess fcntl getdtablesize getgroups gethostname \ + getpagesize getpeername getrlimit getrusage gettimeofday \ + kill killpg lstat pselect readlink select setdtablesize \ +- setitimer tcgetpgrp uname ulimit waitpid) ++ setitimer tcgetpgrp uname ulimit waitpid pread) + AC_REPLACE_FUNCS(rename) + + dnl checks for c library functions +diff --git a/execute_cmd.c b/execute_cmd.c +index 4eae19c..0af6f8f 100644 +--- a/execute_cmd.c ++++ b/execute_cmd.c +@@ -41,6 +41,10 @@ + # include + #endif + ++#ifdef HAVE_ELF_H ++# include ++#endif ++ + #include "posixtime.h" + + #if defined (HAVE_SYS_RESOURCE_H) && !defined (RLIMTYPE) +@@ -5706,6 +5710,14 @@ shell_execve (command, args, env) + { + /* The file has the execute bits set, but the kernel refuses to + run it for some reason. See why. */ ++#if defined (HAVE_HASH_BANG_EXEC) || defined (HAVE_ELF_H) ++ int fd = open (command, O_RDONLY); ++ ++ if (fd >= 0) ++ sample_len = read (fd, sample, sizeof (sample)); ++ else ++ sample_len = -1; ++#endif + #if defined (HAVE_HASH_BANG_EXEC) + READ_SAMPLE_BUF (command, sample, sample_len); + if (sample_len > 0) +@@ -5715,6 +5727,7 @@ shell_execve (command, args, env) + char *interp; + int ilen; + ++ close (fd); + interp = getinterp (sample, sample_len, (int *)NULL); + ilen = strlen (interp); + errno = i; +@@ -5730,7 +5743,138 @@ shell_execve (command, args, env) + return (EX_NOEXEC); + } + #endif +- errno = i; ++#if defined (HAVE_ELF_H) ++ if (i == ENOENT ++ && sample_len > EI_NIDENT ++ && memcmp (sample, ELFMAG, SELFMAG) == 0) ++ { ++ off_t offset = -1; ++ ++ /* It is an ELF file. Now determine whether it is dynamically ++ linked and if yes, get the offset of the interpreter ++ string. */ ++ if (sample[EI_CLASS] == ELFCLASS32 ++ && sample_len > sizeof (Elf32_Ehdr)) ++ { ++ Elf32_Ehdr ehdr; ++ Elf32_Phdr *phdr; ++ int nphdr; ++ ++ /* We have to copy the data since the sample buffer ++ might not be aligned correctly to be accessed as ++ an Elf32_Ehdr struct. */ ++ memcpy (&ehdr, sample, sizeof (Elf32_Ehdr)); ++ ++ nphdr = ehdr.e_phnum; ++ phdr = (Elf32_Phdr *) malloc (nphdr * ehdr.e_phentsize); ++ if (phdr != NULL) ++ { ++#ifdef HAVE_PREAD ++ sample_len = pread (fd, phdr, nphdr * ehdr.e_phentsize, ++ ehdr.e_phoff); ++#else ++ if (lseek (fd, ehdr.e_phoff, SEEK_SET) != -1) ++ sample_len = read (fd, phdr, ++ nphdr * ehdr.e_phentsize); ++ else ++ sample_len = -1; ++#endif ++ if (sample_len == nphdr * ehdr.e_phentsize) ++ while (nphdr-- > 0) ++ if (phdr[nphdr].p_type == PT_INTERP) ++ { ++ offset = phdr[nphdr].p_offset; ++ break; ++ } ++ free (phdr); ++ } ++ } ++ else if (sample[EI_CLASS] == ELFCLASS64 ++ && sample_len > sizeof (Elf64_Ehdr)) ++ { ++ Elf64_Ehdr ehdr; ++ Elf64_Phdr *phdr; ++ int nphdr; ++ ++ /* We have to copy the data since the sample buffer ++ might not be aligned correctly to be accessed as ++ an Elf64_Ehdr struct. */ ++ memcpy (&ehdr, sample, sizeof (Elf64_Ehdr)); ++ ++ nphdr = ehdr.e_phnum; ++ phdr = (Elf64_Phdr *) malloc (nphdr * ehdr.e_phentsize); ++ if (phdr != NULL) ++ { ++#ifdef HAVE_PREAD ++ sample_len = pread (fd, phdr, nphdr * ehdr.e_phentsize, ++ ehdr.e_phoff); ++#else ++ if (lseek (fd, ehdr.e_phoff, SEEK_SET) != -1) ++ sample_len = read (fd, phdr, ++ nphdr * ehdr.e_phentsize); ++ else ++ sample_len = -1; ++#endif ++ if (sample_len == nphdr * ehdr.e_phentsize) ++ while (nphdr-- > 0) ++ if (phdr[nphdr].p_type == PT_INTERP) ++ { ++ offset = phdr[nphdr].p_offset; ++ break; ++ } ++ free (phdr); ++ } ++ } ++ ++ if (offset != -1) ++ { ++ size_t maxlen = 0; ++ size_t actlen = 0; ++ char *interp = NULL; ++ ++ do ++ { ++ if (actlen == maxlen) ++ { ++ char *newinterp = realloc (interp, maxlen += 200); ++ if (newinterp == NULL) ++ { ++ actlen = 0; ++ break; ++ } ++ interp = newinterp; ++ ++#ifdef HAVE_PREAD ++ actlen = pread (fd, interp, maxlen, offset); ++#else ++ if (lseek (fd, offset, SEEK_SET) != -1) ++ actlen = read (fd, interp, maxlen); ++ else ++ actlen = -1; ++#endif ++ } ++ } ++ while (actlen > 0 && memchr (interp, '\0', actlen) == NULL); ++ ++ if (actlen > 0) ++ { ++ close (fd); ++ errno = i; ++ sys_error ("%s: %s: bad ELF interpreter", command, ++ interp); ++ free (interp); ++ return (EX_NOEXEC); ++ } ++ ++ free (interp); ++ } ++ } ++#endif ++#if defined (HAVE_HASH_BANG_EXEC) || defined (HAVE_ELF_H) ++ close (fd); ++#endif ++ ++ errno = i; + file_error (command); + } + return (last_command_exit_value); +-- +2.17.2 + diff --git a/bash-2.05b-debuginfo.patch b/bash-2.05b-debuginfo.patch new file mode 100644 index 0000000..3278cab --- /dev/null +++ b/bash-2.05b-debuginfo.patch @@ -0,0 +1,10 @@ +--- bash-2.05b/builtins/Makefile.in.debuginfo 2003-03-25 17:25:21.000000000 +0000 ++++ bash-2.05b/builtins/Makefile.in 2003-03-25 17:25:49.000000000 +0000 +@@ -93,7 +93,6 @@ + $(RM) $@ + ./$(MKBUILTINS) $(DIRECTDEFINE) $< + $(CC) -c $(CCFLAGS) $*.c || ( $(RM) $*.c ; exit 1 ) +- $(RM) $*.c + + # How to make a .c file from a .def file. + .def.c: diff --git a/bash-2.05b-pgrp_sync.patch b/bash-2.05b-pgrp_sync.patch new file mode 100644 index 0000000..bd7ded6 --- /dev/null +++ b/bash-2.05b-pgrp_sync.patch @@ -0,0 +1,11 @@ +--- bash-2.05b/aclocal.m4.pgrp_sync 2002-06-25 14:45:43.000000000 +0100 ++++ bash-2.05b/aclocal.m4 2003-01-15 18:17:35.000000000 +0000 +@@ -1255,7 +1255,7 @@ + wait(&status); + exit(ok ? 0 : 5); + } +-], bash_cv_pgrp_pipe=no,bash_cv_pgrp_pipe=yes, ++], bash_cv_pgrp_pipe=yes,bash_cv_pgrp_pipe=yes, + [AC_MSG_WARN(cannot check pgrp synchronization if cross compiling -- defaulting to no) + bash_cv_pgrp_pipe=no]) + ]) diff --git a/bash-3.2-audit.patch b/bash-3.2-audit.patch new file mode 100644 index 0000000..48a1751 --- /dev/null +++ b/bash-3.2-audit.patch @@ -0,0 +1,96 @@ +diff -up bash-4.2/config.h.in.audit bash-4.2/config.h.in +--- bash-4.2/config.h.in.audit 2013-01-31 16:26:16.857698992 +0100 ++++ bash-4.2/config.h.in 2013-01-31 16:26:16.876699255 +0100 +@@ -1131,6 +1131,14 @@ + + /* End additions for lib/intl */ + ++ ++/* Additions for lib/readline */ ++ ++/* Define if you have and it defines AUDIT_USER_TTY */ ++#undef HAVE_DECL_AUDIT_USER_TTY ++ ++/* End additions for lib/readline */ ++ + #include "config-bot.h" + + #endif /* _CONFIG_H_ */ +diff -up bash-4.2/configure.in.audit bash-4.2/configure.in +--- bash-4.2/configure.in.audit 2013-01-31 16:26:16.858699005 +0100 ++++ bash-4.2/configure.ac 2013-01-31 16:26:16.877699269 +0100 +@@ -888,6 +888,8 @@ BASH_FUNC_DUP2_CLOEXEC_CHECK + BASH_SYS_PGRP_SYNC + BASH_SYS_SIGNAL_VINTAGE + ++AC_CHECK_DECLS([AUDIT_USER_TTY],,, [[#include ]]) ++ + dnl checking for the presence of certain library symbols + BASH_SYS_ERRLIST + BASH_SYS_SIGLIST +diff -up bash-4.2/lib/readline/readline.c.audit bash-4.2/lib/readline/readline.c +--- bash-4.2/lib/readline/readline.c.audit 2013-01-31 16:26:16.871699185 +0100 ++++ bash-4.2/lib/readline/readline.c 2013-01-31 17:24:23.902744860 +0100 +@@ -55,6 +55,12 @@ + extern int errno; + #endif /* !errno */ + ++#if defined (HAVE_DECL_AUDIT_USER_TTY) ++# include ++# include ++# include ++#endif ++ + /* System-specific feature definitions and include files. */ + #include "rldefs.h" + #include "rlmbutil.h" +@@ -301,7 +307,48 @@ rl_set_prompt (prompt) + rl_visible_prompt_length = rl_expand_prompt (rl_prompt); + return 0; + } +- ++ ++#if defined (HAVE_DECL_AUDIT_USER_TTY) ++/* Report STRING to the audit system. */ ++static void ++audit_tty (char *string) ++{ ++ struct sockaddr_nl addr; ++ struct msghdr msg; ++ struct nlmsghdr nlm; ++ struct iovec iov[2]; ++ size_t size; ++ int fd; ++ ++ size = strlen (string) + 1; ++ fd = socket (AF_NETLINK, SOCK_RAW, NETLINK_AUDIT); ++ if (fd < 0) ++ return; ++ nlm.nlmsg_len = NLMSG_LENGTH (size); ++ nlm.nlmsg_type = AUDIT_USER_TTY; ++ nlm.nlmsg_flags = NLM_F_REQUEST; ++ nlm.nlmsg_seq = 0; ++ nlm.nlmsg_pid = 0; ++ iov[0].iov_base = &nlm; ++ iov[0].iov_len = sizeof (nlm); ++ iov[1].iov_base = string; ++ iov[1].iov_len = size; ++ addr.nl_family = AF_NETLINK; ++ addr.nl_pad = 0; ++ addr.nl_pid = 0; ++ addr.nl_groups = 0; ++ msg.msg_name = &addr; ++ msg.msg_namelen = sizeof (addr); ++ msg.msg_iov = iov; ++ msg.msg_iovlen = 2; ++ msg.msg_control = NULL; ++ msg.msg_controllen = 0; ++ msg.msg_flags = 0; ++ (void)sendmsg (fd, &msg, 0); ++ close (fd); ++} ++#endif ++ + /* Read a line of input. Prompt with PROMPT. An empty PROMPT means + none. A return value of NULL means that EOF was encountered. */ + char * diff --git a/bash-3.2-ssh_source_bash.patch b/bash-3.2-ssh_source_bash.patch new file mode 100644 index 0000000..5bd19ce --- /dev/null +++ b/bash-3.2-ssh_source_bash.patch @@ -0,0 +1,12 @@ +diff -up bash-4.0/config-top.h.ssh_source_bash bash-4.0/config-top.h +--- bash-4.0/config-top.h.ssh_source_bash 2009-01-21 15:20:06.000000000 +0100 ++++ bash-4.0/config-top.h 2009-01-21 15:25:46.000000000 +0100 +@@ -90,7 +90,7 @@ + sshd and source the .bashrc if so (like the rshd behavior). This checks + for the presence of SSH_CLIENT or SSH2_CLIENT in the initial environment, + which can be fooled under certain not-uncommon circumstances. */ +-/* #define SSH_SOURCE_BASHRC */ ++#define SSH_SOURCE_BASHRC + + /* Define if you want the case-capitalizing operators (~[~]) and the + `capcase' variable attribute (declare -c). */ diff --git a/bash-4.0-nobits.patch b/bash-4.0-nobits.patch new file mode 100644 index 0000000..0e77fda --- /dev/null +++ b/bash-4.0-nobits.patch @@ -0,0 +1,154 @@ +diff -up bash-4.0/execute_cmd.c.nobits bash-4.0/execute_cmd.c +--- bash-4.0/execute_cmd.c.nobits 2009-08-11 11:53:38.000000000 +0200 ++++ bash-4.0/execute_cmd.c 2009-08-14 16:18:18.000000000 +0200 +@@ -4747,6 +4747,7 @@ shell_execve (command, args, env) + && memcmp (sample, ELFMAG, SELFMAG) == 0) + { + off_t offset = -1; ++ int dynamic_nobits = 0; + + /* It is an ELF file. Now determine whether it is dynamically + linked and if yes, get the offset of the interpreter +@@ -4756,13 +4757,61 @@ shell_execve (command, args, env) + { + Elf32_Ehdr ehdr; + Elf32_Phdr *phdr; +- int nphdr; ++ Elf32_Shdr *shdr; ++ int nphdr, nshdr; + + /* We have to copy the data since the sample buffer + might not be aligned correctly to be accessed as + an Elf32_Ehdr struct. */ + memcpy (&ehdr, sample, sizeof (Elf32_Ehdr)); + ++ nshdr = ehdr.e_shnum; ++ shdr = (Elf32_Shdr *) malloc (nshdr * ehdr.e_shentsize); ++ ++ if (shdr != NULL) ++ { ++#ifdef HAVE_PREAD ++ sample_len = pread (fd, shdr, nshdr * ehdr.e_shentsize, ++ ehdr.e_shoff); ++#else ++ if (lseek (fd, ehdr.e_shoff, SEEK_SET) != -1) ++ sample_len = read (fd, shdr, ++ nshdr * ehdr.e_shentsize); ++ else ++ sample_len = -1; ++#endif ++ if (sample_len == nshdr * ehdr.e_shentsize) ++ { ++ char *strings = (char *) malloc (shdr[ehdr.e_shstrndx].sh_size); ++ if (strings != NULL) ++ { ++#ifdef HAVE_PREAD ++ sample_len = pread (fd, strings, ++ shdr[ehdr.e_shstrndx].sh_size, ++ shdr[ehdr.e_shstrndx].sh_offset); ++#else ++ if (lseek (fd, shdr[ehdr.e_shstrndx].sh_offset, ++ SEEK_SET) != -1) ++ sample_len = read (fd, strings, ++ shdr[ehdr.e_shstrndx].sh_size); ++ else ++ sample_len = -1; ++#endif ++ if (sample_len == shdr[ehdr.e_shstrndx].sh_size) ++ while (nshdr-- > 0) ++ if (strcmp (strings + shdr[nshdr].sh_name, ++ ".interp") == 0 && ++ shdr[nshdr].sh_type == SHT_NOBITS) ++ { ++ dynamic_nobits++; ++ break; ++ } ++ free (strings); ++ } ++ } ++ free (shdr); ++ } ++ + nphdr = ehdr.e_phnum; + phdr = (Elf32_Phdr *) malloc (nphdr * ehdr.e_phentsize); + if (phdr != NULL) +@@ -4792,13 +4841,60 @@ shell_execve (command, args, env) + { + Elf64_Ehdr ehdr; + Elf64_Phdr *phdr; +- int nphdr; ++ Elf64_Shdr *shdr; ++ int nphdr, nshdr; + + /* We have to copy the data since the sample buffer + might not be aligned correctly to be accessed as + an Elf64_Ehdr struct. */ + memcpy (&ehdr, sample, sizeof (Elf64_Ehdr)); + ++ nshdr = ehdr.e_shnum; ++ shdr = (Elf64_Shdr *) malloc (nshdr * ehdr.e_shentsize); ++ if (shdr != NULL) ++ { ++#ifdef HAVE_PREAD ++ sample_len = pread (fd, shdr, nshdr * ehdr.e_shentsize, ++ ehdr.e_shoff); ++#else ++ if (lseek (fd, ehdr.e_shoff, SEEK_SET) != -1) ++ sample_len = read (fd, shdr, ++ nshdr * ehdr.e_shentsize); ++ else ++ sample_len = -1; ++#endif ++ if (sample_len == nshdr * ehdr.e_shentsize) ++ { ++ char *strings = (char *) malloc (shdr[ehdr.e_shstrndx].sh_size); ++ if (strings != NULL) ++ { ++#ifdef HAVE_PREAD ++ sample_len = pread (fd, strings, ++ shdr[ehdr.e_shstrndx].sh_size, ++ shdr[ehdr.e_shstrndx].sh_offset); ++#else ++ if (lseek (fd, shdr[ehdr.e_shstrndx].sh_offset, ++ SEEK_SET) != -1) ++ sample_len = read (fd, strings, ++ shdr[ehdr.e_shstrndx].sh_size); ++ else ++ sample_len = -1; ++#endif ++ if (sample_len == shdr[ehdr.e_shstrndx].sh_size) ++ while (nshdr-- > 0) ++ if (strcmp (strings + shdr[nshdr].sh_name, ++ ".interp") == 0 && ++ shdr[nshdr].sh_type == SHT_NOBITS) ++ { ++ dynamic_nobits++; ++ break; ++ } ++ free (strings); ++ } ++ } ++ free (shdr); ++ } ++ + nphdr = ehdr.e_phnum; + phdr = (Elf64_Phdr *) malloc (nphdr * ehdr.e_phentsize); + if (phdr != NULL) +@@ -4858,8 +4954,15 @@ shell_execve (command, args, env) + { + close (fd); + errno = i; +- sys_error ("%s: %s: bad ELF interpreter", command, +- interp); ++ if (dynamic_nobits > 0) ++ { ++ sys_error ("%s: bad ELF interpreter", command); ++ } ++ else ++ { ++ sys_error ("%s: %s: bad ELF interpreter", command, ++ interp); ++ } + free (interp); + return (EX_NOEXEC); + } diff --git a/bash-4.1-broken_pipe.patch b/bash-4.1-broken_pipe.patch new file mode 100644 index 0000000..e083374 --- /dev/null +++ b/bash-4.1-broken_pipe.patch @@ -0,0 +1,12 @@ +diff -up bash-4.1/config-top.h.broken_pipe bash-4.1/config-top.h +--- bash-4.1/config-top.h.broken_pipe 2011-01-06 18:01:30.000000000 +0100 ++++ bash-4.1/config-top.h 2011-01-06 18:02:14.000000000 +0100 +@@ -51,7 +51,7 @@ + /* Define DONT_REPORT_BROKEN_PIPE_WRITE_ERRORS if you don't want builtins + like `echo' and `printf' to report errors when output does not succeed + due to EPIPE. */ +-/* #define DONT_REPORT_BROKEN_PIPE_WRITE_ERRORS */ ++#define DONT_REPORT_BROKEN_PIPE_WRITE_ERRORS + + /* The default value of the PATH variable. */ + #ifndef DEFAULT_PATH_VALUE diff --git a/bash-4.1-examples.patch b/bash-4.1-examples.patch new file mode 100644 index 0000000..19159e7 --- /dev/null +++ b/bash-4.1-examples.patch @@ -0,0 +1,24 @@ +diff -up bash-4.1/examples/loadables/Makefile.in.examples bash-4.1/examples/loadables/Makefile.in +--- bash-4.1/examples/loadables/Makefile.in.examples 2010-06-22 16:20:02.000000000 +0200 ++++ bash-4.1/examples/loadables/Makefile.in 2010-06-22 16:20:41.000000000 +0200 +@@ -43,7 +43,7 @@ host_os = @host_os@ + host_cpu = @host_cpu@ + host_vendor = @host_vendor@ + +-CFLAGS = @CFLAGS@ ++CFLAGS = -O2 -g + LOCAL_CFLAGS = @LOCAL_CFLAGS@ + DEFS = @DEFS@ + LOCAL_DEFS = @LOCAL_DEFS@ +diff -up bash-4.1/examples/loadables/perl/Makefile.in.examples bash-4.1/examples/loadables/perl/Makefile.in +--- bash-4.1/examples/loadables/perl/Makefile.in.examples 2010-06-22 16:20:46.000000000 +0200 ++++ bash-4.1/examples/loadables/perl/Makefile.in 2010-06-22 16:21:04.000000000 +0200 +@@ -42,7 +42,7 @@ SHELL = @MAKE_SHELL@ + + PERL5 = perl5 + +-CFLAGS = @CFLAGS@ ++CFLAGS = -O2 -g + + # + # These values are generated for configure by ${topdir}/support/shobj-conf. diff --git a/bash-4.2-coverity.patch b/bash-4.2-coverity.patch new file mode 100644 index 0000000..dc52e52 --- /dev/null +++ b/bash-4.2-coverity.patch @@ -0,0 +1,103 @@ +diff --git a/execute_cmd.c b/execute_cmd.c +index a988400..412128c 100644 +--- a/execute_cmd.c ++++ b/execute_cmd.c +@@ -5760,7 +5760,7 @@ shell_execve (command, args, env) + Elf32_Ehdr ehdr; + Elf32_Phdr *phdr; + Elf32_Shdr *shdr; +- int nphdr, nshdr; ++ Elf32_Half nphdr, nshdr; + + /* We have to copy the data since the sample buffer + might not be aligned correctly to be accessed as +@@ -5768,12 +5768,12 @@ shell_execve (command, args, env) + memcpy (&ehdr, sample, sizeof (Elf32_Ehdr)); + + nshdr = ehdr.e_shnum; +- shdr = (Elf32_Shdr *) malloc (nshdr * ehdr.e_shentsize); ++ shdr = (Elf32_Shdr *) malloc ((size_t)nshdr * (size_t)ehdr.e_shentsize); + + if (shdr != NULL) + { + #ifdef HAVE_PREAD +- sample_len = pread (fd, shdr, nshdr * ehdr.e_shentsize, ++ sample_len = pread (fd, shdr, (size_t)nshdr * (size_t)ehdr.e_shentsize, + ehdr.e_shoff); + #else + if (lseek (fd, ehdr.e_shoff, SEEK_SET) != -1) +@@ -5815,11 +5815,11 @@ shell_execve (command, args, env) + } + + nphdr = ehdr.e_phnum; +- phdr = (Elf32_Phdr *) malloc (nphdr * ehdr.e_phentsize); ++ phdr = (Elf32_Phdr *) malloc ((size_t)nphdr * (size_t)ehdr.e_phentsize); + if (phdr != NULL) + { + #ifdef HAVE_PREAD +- sample_len = pread (fd, phdr, nphdr * ehdr.e_phentsize, ++ sample_len = pread (fd, phdr, (size_t)nphdr * (size_t)ehdr.e_phentsize, + ehdr.e_phoff); + #else + if (lseek (fd, ehdr.e_phoff, SEEK_SET) != -1) +@@ -5844,7 +5844,7 @@ shell_execve (command, args, env) + Elf64_Ehdr ehdr; + Elf64_Phdr *phdr; + Elf64_Shdr *shdr; +- int nphdr, nshdr; ++ Elf32_Half nphdr, nshdr; + + /* We have to copy the data since the sample buffer + might not be aligned correctly to be accessed as +@@ -5852,11 +5852,11 @@ shell_execve (command, args, env) + memcpy (&ehdr, sample, sizeof (Elf64_Ehdr)); + + nshdr = ehdr.e_shnum; +- shdr = (Elf64_Shdr *) malloc (nshdr * ehdr.e_shentsize); ++ shdr = (Elf64_Shdr *) malloc ((size_t)nshdr * (size_t)ehdr.e_shentsize); + if (shdr != NULL) + { + #ifdef HAVE_PREAD +- sample_len = pread (fd, shdr, nshdr * ehdr.e_shentsize, ++ sample_len = pread (fd, shdr, (size_t)nshdr * (size_t)ehdr.e_shentsize, + ehdr.e_shoff); + #else + if (lseek (fd, ehdr.e_shoff, SEEK_SET) != -1) +@@ -5898,11 +5898,11 @@ shell_execve (command, args, env) + } + + nphdr = ehdr.e_phnum; +- phdr = (Elf64_Phdr *) malloc (nphdr * ehdr.e_phentsize); ++ phdr = (Elf64_Phdr *) malloc ((size_t)nphdr * (size_t)ehdr.e_phentsize); + if (phdr != NULL) + { + #ifdef HAVE_PREAD +- sample_len = pread (fd, phdr, nphdr * ehdr.e_phentsize, ++ sample_len = pread (fd, phdr, (size_t)nphdr * (size_t)ehdr.e_phentsize, + ehdr.e_phoff); + #else + if (lseek (fd, ehdr.e_phoff, SEEK_SET) != -1) +@@ -5924,8 +5924,8 @@ shell_execve (command, args, env) + + if (offset != -1) + { +- size_t maxlen = 0; +- size_t actlen = 0; ++ ssize_t maxlen = 0; ++ ssize_t actlen = 0; + char *interp = NULL; + + do +@@ -5974,7 +5974,8 @@ shell_execve (command, args, env) + } + #endif + #if defined (HAVE_HASH_BANG_EXEC) || defined (HAVE_ELF_H) +- close (fd); ++ if (fd >= 0) ++ close (fd); + #endif + + errno = i; +-- +2.17.2 + diff --git a/bash-4.2-manpage_trap.patch b/bash-4.2-manpage_trap.patch new file mode 100644 index 0000000..e81882f --- /dev/null +++ b/bash-4.2-manpage_trap.patch @@ -0,0 +1,12 @@ +diff -up bash-4.1/doc/bash.1.manpage_trap bash-4.1/doc/bash.1 +--- bash-4.1/doc/bash.1.manpage_trap 2012-08-28 10:06:00.561999092 +0200 ++++ bash-4.1/doc/bash.1 2012-08-28 10:06:24.225304505 +0200 +@@ -9251,7 +9251,7 @@ being inverted via + These are the same conditions obeyed by the \fBerrexit\fP (\fB\-e\fP) option. + .if t .sp 0.5 + .if n .sp 1 +-Signals ignored upon entry to the shell cannot be trapped or reset. ++Signals ignored upon entry to the shell cannot be trapped, reset or listed. + Trapped signals that are not being ignored are reset to their original + values in a subshell or subshell environment when one is created. + The return status is false if any diff --git a/bash-4.2-rc2-logout.patch b/bash-4.2-rc2-logout.patch new file mode 100644 index 0000000..f63c8b6 --- /dev/null +++ b/bash-4.2-rc2-logout.patch @@ -0,0 +1,41 @@ +diff --git a/config-top.h b/config-top.h +index 026d4a4..cb0e002 100644 +--- a/config-top.h ++++ b/config-top.h +@@ -92,7 +92,7 @@ + /* #define SYS_BASHRC "/etc/bash.bashrc" */ + + /* System-wide .bash_logout for login shells. */ +-/* #define SYS_BASH_LOGOUT "/etc/bash.bash_logout" */ ++#define SYS_BASH_LOGOUT "/etc/bash.bash_logout" + + /* Define this to make non-interactive shells begun with argv[0][0] == '-' + run the startup files when not in posix mode. */ +diff --git a/doc/bash.1 b/doc/bash.1 +index 04ce845..bfde55e 100644 +--- a/doc/bash.1 ++++ b/doc/bash.1 +@@ -335,8 +335,8 @@ option may be used when the shell is started to inhibit this behavior. + When an interactive login shell exits, + or a non-interactive login shell executes the \fBexit\fP builtin command, + .B bash +-reads and executes commands from the file \fI~/.bash_logout\fP, if it +-exists. ++reads and executes commands from the files \fI~/.bash_logout\fP ++and \fI/etc/bash.bash_logout\fP, if the files exists. + .PP + When an interactive shell that is not a login shell is started, + .B bash +@@ -10558,6 +10558,9 @@ The \fBbash\fP executable + .FN /etc/profile + The systemwide initialization file, executed for login shells + .TP ++.FN /etc/bash.bash_logout ++The systemwide login shell cleanup file, executed when a login shell exits ++.TP + .FN ~/.bash_profile + The personal initialization file, executed for login shells + .TP +-- +2.9.3 + diff --git a/bash-4.2-size_type.patch b/bash-4.2-size_type.patch new file mode 100644 index 0000000..ab56677 --- /dev/null +++ b/bash-4.2-size_type.patch @@ -0,0 +1,14 @@ +diff -up bash-4.2/variables.h.size_type bash-4.2/variables.h +--- bash-4.2/variables.h.size_type 2012-11-29 10:33:25.109036844 +0100 ++++ bash-4.2/variables.h 2012-11-29 10:46:12.718530162 +0100 +@@ -95,8 +95,8 @@ typedef struct variable { + + typedef struct _vlist { + SHELL_VAR **list; +- int list_size; /* allocated size */ +- int list_len; /* current number of entries */ ++ size_t list_size; /* allocated size */ ++ size_t list_len; /* current number of entries */ + } VARLIST; + + /* The various attributes that a given variable can have. */ diff --git a/bash-4.3-man-ulimit.patch b/bash-4.3-man-ulimit.patch new file mode 100644 index 0000000..0c3fa0a --- /dev/null +++ b/bash-4.3-man-ulimit.patch @@ -0,0 +1,15 @@ +diff --git a/doc/bash.1 b/doc/bash.1 +index 6e8aebb..e846e68 100644 +--- a/doc/bash.1 ++++ b/doc/bash.1 +@@ -10333,6 +10333,7 @@ and + which are in 512-byte increments. + The return status is 0 unless an invalid option or argument is supplied, + or an error occurs while setting a new limit. ++In POSIX Mode 512-byte blocks are used for the `-c' and `-f' options. + .RE + .TP + \fBumask\fP [\fB\-p\fP] [\fB\-S\fP] [\fImode\fP] +-- +2.9.3 + diff --git a/bash-4.3-memleak-lc_all.patch b/bash-4.3-memleak-lc_all.patch new file mode 100644 index 0000000..77e86de --- /dev/null +++ b/bash-4.3-memleak-lc_all.patch @@ -0,0 +1,12 @@ +diff -up bash-4.3/locale.c.old bash-4.3/locale.c +--- bash-4.3/locale.c.old 2015-07-15 11:55:00.002857301 +0200 ++++ bash-4.3/locale.c 2015-07-15 11:48:36.698086257 +0200 +@@ -77,8 +77,6 @@ set_default_locale () + { + #if defined (HAVE_SETLOCALE) + default_locale = setlocale (LC_ALL, ""); +- if (default_locale) +- default_locale = savestring (default_locale); + #endif /* HAVE_SETLOCALE */ + bindtextdomain (PACKAGE, LOCALEDIR); + textdomain (PACKAGE); diff --git a/bash-4.3-noecho.patch b/bash-4.3-noecho.patch new file mode 100644 index 0000000..8adf36d --- /dev/null +++ b/bash-4.3-noecho.patch @@ -0,0 +1,46 @@ +diff --git a/parse.y b/parse.y +index 07e6e3e..4cd373f 100644 +--- a/parse.y ++++ b/parse.y +@@ -4410,6 +4410,8 @@ xparse_dolparen (base, string, indp, flags) + save_parser_state (&ps); + save_input_line_state (&ls); + orig_eof_token = shell_eof_token; ++ /* avoid echoing every substitution again */ ++ echo_input_at_read = 0; + #if defined (ALIAS) || defined (DPAREN_ARITHMETIC) + saved_pushed_strings = pushed_string_list; /* separate parsing context */ + pushed_string_list = (STRING_SAVER *)NULL; +diff --git a/subst.c b/subst.c +index 9559187..0c2caa6 100644 +--- a/subst.c ++++ b/subst.c +@@ -9145,6 +9145,7 @@ param_expand (string, sindex, quoted, expanded_something, + WORD_LIST *list; + WORD_DESC *tdesc, *ret; + int tflag; ++ int old_echo_input; + + /*itrace("param_expand: `%s' pflags = %d", string+*sindex, pflags);*/ + zindex = *sindex; +@@ -9514,6 +9515,9 @@ arithsub: + } + + comsub: ++ old_echo_input = echo_input_at_read; ++ /* avoid echoing every substitution again */ ++ echo_input_at_read = 0; + if (pflags & PF_NOCOMSUB) + /* we need zindex+1 because string[zindex] == RPAREN */ + temp1 = substring (string, *sindex, zindex+1); +@@ -9526,6 +9530,7 @@ comsub: + } + FREE (temp); + temp = temp1; ++ echo_input_at_read = old_echo_input; + break; + + /* Do POSIX.2d9-style arithmetic substitution. This will probably go +-- +2.17.2 + diff --git a/bash-4.4-no-loadable-builtins.patch b/bash-4.4-no-loadable-builtins.patch new file mode 100644 index 0000000..b03459d --- /dev/null +++ b/bash-4.4-no-loadable-builtins.patch @@ -0,0 +1,15 @@ +diff --git a/Makefile.in b/Makefile.in +index a1f9483..24c646a 100644 +--- a/Makefile.in ++++ b/Makefile.in +@@ -800,7 +800,6 @@ install: .made installdirs + infodir=$(infodir) htmldir=$(htmldir) DESTDIR=$(DESTDIR) $@ ) + -( cd $(DEFDIR) ; $(MAKE) $(MFLAGS) DESTDIR=$(DESTDIR) $@ ) + -( cd $(PO_DIR) ; $(MAKE) $(MFLAGS) DESTDIR=$(DESTDIR) $@ ) +- -( cd $(LOADABLES_DIR) && $(MAKE) $(MFLAGS) DESTDIR=$(DESTDIR) $@ ) + + install-strip: + $(MAKE) $(MFLAGS) INSTALL_PROGRAM='$(INSTALL_PROGRAM) -s' \ +-- +2.9.3 + diff --git a/bash-5.0-patch-1.patch b/bash-5.0-patch-1.patch new file mode 100644 index 0000000..254fd9e --- /dev/null +++ b/bash-5.0-patch-1.patch @@ -0,0 +1,150 @@ +From 4d2e315490b778707b3a3afdfc514d5083a97a11 Mon Sep 17 00:00:00 2001 +From: Chet Ramey +Date: Fri, 18 Jan 2019 15:12:37 -0500 +Subject: [PATCH] Bash-5.0 patch 1: fix pathname expansion of directory names + containing backslashes + +--- + bashline.c | 62 +++++++++++++++++++++++++++++++++++++++++--- + lib/glob/glob_loop.c | 6 ----- + patchlevel.h | 2 +- + 3 files changed, 60 insertions(+), 10 deletions(-) + +diff --git a/bashline.c b/bashline.c +index 2846aabf..75e79f1a 100644 +--- a/bashline.c ++++ b/bashline.c +@@ -231,6 +231,7 @@ static int bash_possible_variable_completions __P((int, int)); + static int bash_complete_command __P((int, int)); + static int bash_possible_command_completions __P((int, int)); + ++static int completion_glob_pattern __P((char *)); + static char *glob_complete_word __P((const char *, int)); + static int bash_glob_completion_internal __P((int)); + static int bash_glob_complete_word __P((int, int)); +@@ -1741,7 +1742,7 @@ bash_default_completion (text, start, end, qc, compflags) + + /* This could be a globbing pattern, so try to expand it using pathname + expansion. */ +- if (!matches && glob_pattern_p (text)) ++ if (!matches && completion_glob_pattern ((char *)text)) + { + matches = rl_completion_matches (text, glob_complete_word); + /* A glob expression that matches more than one filename is problematic. +@@ -1850,7 +1851,7 @@ command_word_completion_function (hint_text, state) + glob_matches = (char **)NULL; + } + +- globpat = glob_pattern_p (hint_text); ++ globpat = completion_glob_pattern ((char *)hint_text); + + /* If this is an absolute program name, do not check it against + aliases, reserved words, functions or builtins. We must check +@@ -3713,6 +3714,61 @@ bash_complete_command_internal (what_to_do) + return bash_specific_completion (what_to_do, command_word_completion_function); + } + ++static int ++completion_glob_pattern (string) ++ char *string; ++{ ++ register int c; ++ char *send; ++ int open; ++ ++ DECLARE_MBSTATE; ++ ++ open = 0; ++ send = string + strlen (string); ++ ++ while (c = *string++) ++ { ++ switch (c) ++ { ++ case '?': ++ case '*': ++ return (1); ++ ++ case '[': ++ open++; ++ continue; ++ ++ case ']': ++ if (open) ++ return (1); ++ continue; ++ ++ case '+': ++ case '@': ++ case '!': ++ if (*string == '(') /*)*/ ++ return (1); ++ continue; ++ ++ case '\\': ++ if (*string == 0) ++ return (0); ++ } ++ ++ /* Advance one fewer byte than an entire multibyte character to ++ account for the auto-increment in the loop above. */ ++#ifdef HANDLE_MULTIBYTE ++ string--; ++ ADVANCE_CHAR_P (string, send - string); ++ string++; ++#else ++ ADVANCE_CHAR_P (string, send - string); ++#endif ++ } ++ return (0); ++} ++ + static char *globtext; + static char *globorig; + +@@ -3877,7 +3933,7 @@ bash_vi_complete (count, key) + t = substring (rl_line_buffer, p, rl_point); + } + +- if (t && glob_pattern_p (t) == 0) ++ if (t && completion_glob_pattern (t) == 0) + rl_explicit_arg = 1; /* XXX - force glob_complete_word to append `*' */ + FREE (t); + +diff --git a/lib/glob/glob_loop.c b/lib/glob/glob_loop.c +index 5f319cc2..7d6ae211 100644 +--- a/lib/glob/glob_loop.c ++++ b/lib/glob/glob_loop.c +@@ -54,17 +54,11 @@ INTERNAL_GLOB_PATTERN_P (pattern) + continue; + + case L('\\'): +-#if 0 + /* Don't let the pattern end in a backslash (GMATCH returns no match + if the pattern ends in a backslash anyway), but otherwise return 1, + since the matching engine uses backslash as an escape character + and it can be removed. */ + return (*p != L('\0')); +-#else +- /* The pattern may not end with a backslash. */ +- if (*p++ == L('\0')) +- return 0; +-#endif + } + + return 0; +diff --git a/patchlevel.h b/patchlevel.h +index 1cd7c96c..40db1a32 100644 +--- a/patchlevel.h ++++ b/patchlevel.h +@@ -25,6 +25,6 @@ + regexp `^#define[ ]*PATCHLEVEL', since that's what support/mkversion.sh + looks for to find the patch level (for the sccs version string). */ + +-#define PATCHLEVEL 0 ++#define PATCHLEVEL 1 + + #endif /* _PATCHLEVEL_H_ */ +-- +2.17.2 + diff --git a/bash-5.0-patch-10.patch b/bash-5.0-patch-10.patch new file mode 100644 index 0000000..b9b916e --- /dev/null +++ b/bash-5.0-patch-10.patch @@ -0,0 +1,116 @@ +From 6a3116f58c876ca58a786f0ddff578ecf126588e Mon Sep 17 00:00:00 2001 +From: Chet Ramey +Date: Thu, 29 Aug 2019 11:20:15 -0400 +Subject: [PATCH] Bash-5.0 patch 10: changes to posix-mode assignment + statements preceding functions and special builtins + +--- + patchlevel.h | 2 +- + tests/varenv.right | 6 +++--- + variables.c | 38 ++++++++++++++++++++++++++------------ + 3 files changed, 30 insertions(+), 16 deletions(-) + +diff --git a/patchlevel.h b/patchlevel.h +index 02f1d606..8002af70 100644 +--- a/patchlevel.h ++++ b/patchlevel.h +@@ -25,6 +25,6 @@ + regexp `^#define[ ]*PATCHLEVEL', since that's what support/mkversion.sh + looks for to find the patch level (for the sccs version string). */ + +-#define PATCHLEVEL 9 ++#define PATCHLEVEL 10 + + #endif /* _PATCHLEVEL_H_ */ +diff --git a/tests/varenv.right b/tests/varenv.right +index 159a8773..ca7d4cf1 100644 +--- a/tests/varenv.right ++++ b/tests/varenv.right +@@ -146,9 +146,9 @@ declare -x foo="abc" + inside: declare -x var="value" + outside: declare -- var="one" + inside: declare -x var="value" +-outside: declare -x var="value" +-inside: declare -- var="local" +-outside: declare -x var="global" ++outside: declare -- var="outside" ++inside: declare -x var="global" ++outside: declare -- var="outside" + foo= environment foo= + foo=foo environment foo=foo + foo=foo environment foo=foo +diff --git a/variables.c b/variables.c +index 610629ab..af3fd04a 100644 +--- a/variables.c ++++ b/variables.c +@@ -4460,9 +4460,9 @@ char **tempvar_list; + int tvlist_ind; + + /* Take a variable from an assignment statement preceding a posix special +- builtin (including `return') and create a global variable from it. This +- is called from merge_temporary_env, which is only called when in posix +- mode. */ ++ builtin (including `return') and create a variable from it as if a ++ standalone assignment statement had been performed. This is called from ++ merge_temporary_env, which is only called when in posix mode. */ + static void + push_posix_temp_var (data) + PTR_T data; +@@ -4472,16 +4472,27 @@ push_posix_temp_var (data) + + var = (SHELL_VAR *)data; + +- binding_table = global_variables->table; +- if (binding_table == 0) +- binding_table = global_variables->table = hash_create (VARIABLES_HASH_BUCKETS); ++ /* Just like do_assignment_internal(). This makes assignments preceding ++ special builtins act like standalone assignment statements when in ++ posix mode, satisfying the posix requirement that this affect the ++ "current execution environment." */ ++ v = bind_variable (var->name, value_cell (var), ASS_FORCE|ASS_NOLONGJMP); + +- v = bind_variable_internal (var->name, value_cell (var), binding_table, 0, ASS_FORCE|ASS_NOLONGJMP); ++ /* If this modifies an existing local variable, v->context will be non-zero. ++ If it comes back with v->context == 0, we bound at the global context. ++ Set binding_table appropriately. It doesn't matter whether it's correct ++ if the variable is local, only that it's not global_variables->table */ ++ binding_table = v->context ? shell_variables->table : global_variables->table; + + /* global variables are no longer temporary and don't need propagating. */ +- var->attributes &= ~(att_tempvar|att_propagate); ++ if (binding_table == global_variables->table) ++ var->attributes &= ~(att_tempvar|att_propagate); ++ + if (v) +- v->attributes |= var->attributes; ++ { ++ v->attributes |= var->attributes; ++ v->attributes &= ~att_tempvar; /* not a temp var now */ ++ } + + if (find_special_var (var->name) >= 0) + tempvar_list[tvlist_ind++] = savestring (var->name); +@@ -4575,14 +4586,17 @@ dispose_temporary_env (pushf) + sh_free_func_t *pushf; + { + int i; ++ HASH_TABLE *disposer; + + tempvar_list = strvec_create (HASH_ENTRIES (temporary_env) + 1); + tempvar_list[tvlist_ind = 0] = 0; +- +- hash_flush (temporary_env, pushf); +- hash_dispose (temporary_env); ++ ++ disposer = temporary_env; + temporary_env = (HASH_TABLE *)NULL; + ++ hash_flush (disposer, pushf); ++ hash_dispose (disposer); ++ + tempvar_list[tvlist_ind] = 0; + + array_needs_making = 1; +-- +2.21.0 + diff --git a/bash-5.0-patch-11.patch b/bash-5.0-patch-11.patch new file mode 100644 index 0000000..3a4172e --- /dev/null +++ b/bash-5.0-patch-11.patch @@ -0,0 +1,50 @@ +From d894cfd104086ddf68c286e67a5fb2e02eb43b7b Mon Sep 17 00:00:00 2001 +From: Chet Ramey +Date: Thu, 29 Aug 2019 11:21:20 -0400 +Subject: [PATCH] Bash-5.0 patch 11: fix quoted null character removal in + operands of conditional ([[) commands + +--- + patchlevel.h | 2 +- + subst.c | 6 +++++- + 2 files changed, 6 insertions(+), 2 deletions(-) + +diff --git a/patchlevel.h b/patchlevel.h +index 8002af70..772676c8 100644 +--- a/patchlevel.h ++++ b/patchlevel.h +@@ -25,6 +25,6 @@ + regexp `^#define[ ]*PATCHLEVEL', since that's what support/mkversion.sh + looks for to find the patch level (for the sccs version string). */ + +-#define PATCHLEVEL 10 ++#define PATCHLEVEL 11 + + #endif /* _PATCHLEVEL_H_ */ +diff --git a/subst.c b/subst.c +index 95591878..fd6db240 100644 +--- a/subst.c ++++ b/subst.c +@@ -3625,7 +3625,9 @@ remove_backslashes (string) + this case, we quote the string specially for the globbing code. If + SPECIAL is 2, this is an rhs argument for the =~ operator, and should + be quoted appropriately for regcomp/regexec. The caller is responsible +- for removing the backslashes if the unquoted word is needed later. */ ++ for removing the backslashes if the unquoted word is needed later. In ++ any case, since we don't perform word splitting, we need to do quoted ++ null character removal. */ + char * + cond_expand_word (w, special) + WORD_DESC *w; +@@ -3646,6 +3648,8 @@ cond_expand_word (w, special) + { + if (special == 0) /* LHS */ + { ++ if (l->word) ++ word_list_remove_quoted_nulls (l); + dequote_list (l); + r = string_list (l); + } +-- +2.21.0 + diff --git a/bash-5.0-patch-12.patch b/bash-5.0-patch-12.patch new file mode 100644 index 0000000..3b383b1 --- /dev/null +++ b/bash-5.0-patch-12.patch @@ -0,0 +1,56 @@ +From b0852fb54efbcee630847fcfdc435133f82043b9 Mon Sep 17 00:00:00 2001 +From: Chet Ramey +Date: Fri, 7 Feb 2020 15:16:28 -0500 +Subject: [PATCH] Bash-5.0 patch 12: fix problems moving back beyond start of + history + +--- + lib/readline/misc.c | 5 ++++- + patchlevel.h | 2 +- + 2 files changed, 5 insertions(+), 2 deletions(-) + +diff --git a/lib/readline/misc.c b/lib/readline/misc.c +index 64b1457d..42005b0c 100644 +--- a/lib/readline/misc.c ++++ b/lib/readline/misc.c +@@ -576,6 +576,7 @@ int + rl_get_previous_history (int count, int key) + { + HIST_ENTRY *old_temp, *temp; ++ int had_saved_line; + + if (count < 0) + return (rl_get_next_history (-count, key)); +@@ -588,6 +589,7 @@ rl_get_previous_history (int count, int key) + _rl_history_saved_point = (rl_point == rl_end) ? -1 : rl_point; + + /* If we don't have a line saved, then save this one. */ ++ had_saved_line = _rl_saved_line_for_history != 0; + rl_maybe_save_line (); + + /* If the current line has changed, save the changes. */ +@@ -611,7 +613,8 @@ rl_get_previous_history (int count, int key) + + if (temp == 0) + { +- rl_maybe_unsave_line (); ++ if (had_saved_line == 0) ++ _rl_free_saved_history_line (); + rl_ding (); + } + else +diff --git a/patchlevel.h b/patchlevel.h +index 772676c8..93dbe0db 100644 +--- a/patchlevel.h ++++ b/patchlevel.h +@@ -25,6 +25,6 @@ + regexp `^#define[ ]*PATCHLEVEL', since that's what support/mkversion.sh + looks for to find the patch level (for the sccs version string). */ + +-#define PATCHLEVEL 11 ++#define PATCHLEVEL 12 + + #endif /* _PATCHLEVEL_H_ */ +-- +2.25.1 + diff --git a/bash-5.0-patch-13.patch b/bash-5.0-patch-13.patch new file mode 100644 index 0000000..f9060ae --- /dev/null +++ b/bash-5.0-patch-13.patch @@ -0,0 +1,62 @@ +From f747f9ff4c8aed2d51fa54db3cb10e8118034753 Mon Sep 17 00:00:00 2001 +From: Chet Ramey +Date: Fri, 7 Feb 2020 15:17:29 -0500 +Subject: [PATCH] Bash-5.0 patch 13: reading history entries with timestamps + can result in joined entries + +--- + lib/readline/histfile.c | 15 ++++++++++++++- + patchlevel.h | 2 +- + 2 files changed, 15 insertions(+), 2 deletions(-) + +diff --git a/lib/readline/histfile.c b/lib/readline/histfile.c +index a8a92aa3..6c3adc9b 100644 +--- a/lib/readline/histfile.c ++++ b/lib/readline/histfile.c +@@ -369,9 +369,11 @@ read_history_range (const char *filename, int from, int to) + } + + has_timestamps = HIST_TIMESTAMP_START (buffer); +- history_multiline_entries += has_timestamps && history_write_timestamps; ++ history_multiline_entries += has_timestamps && history_write_timestamps; + + /* Skip lines until we are at FROM. */ ++ if (has_timestamps) ++ last_ts = buffer; + for (line_start = line_end = buffer; line_end < bufend && current_line < from; line_end++) + if (*line_end == '\n') + { +@@ -380,7 +382,18 @@ read_history_range (const char *filename, int from, int to) + line. We should check more extensively here... */ + if (HIST_TIMESTAMP_START(p) == 0) + current_line++; ++ else ++ last_ts = p; + line_start = p; ++ /* If we are at the last line (current_line == from) but we have ++ timestamps (has_timestamps), then line_start points to the ++ text of the last command, and we need to skip to its end. */ ++ if (current_line >= from && has_timestamps) ++ { ++ for (line_end = p; line_end < bufend && *line_end != '\n'; line_end++) ++ ; ++ line_start = (*line_end == '\n') ? line_end + 1 : line_end; ++ } + } + + /* If there are lines left to gobble, then gobble them now. */ +diff --git a/patchlevel.h b/patchlevel.h +index 93dbe0db..779671cd 100644 +--- a/patchlevel.h ++++ b/patchlevel.h +@@ -25,6 +25,6 @@ + regexp `^#define[ ]*PATCHLEVEL', since that's what support/mkversion.sh + looks for to find the patch level (for the sccs version string). */ + +-#define PATCHLEVEL 12 ++#define PATCHLEVEL 13 + + #endif /* _PATCHLEVEL_H_ */ +-- +2.25.1 + diff --git a/bash-5.0-patch-14.patch b/bash-5.0-patch-14.patch new file mode 100644 index 0000000..efc0ee5 --- /dev/null +++ b/bash-5.0-patch-14.patch @@ -0,0 +1,44 @@ +From 8b6524c482573ea12eb20be756cdb8ca31d945f3 Mon Sep 17 00:00:00 2001 +From: Chet Ramey +Date: Fri, 7 Feb 2020 15:18:41 -0500 +Subject: [PATCH] Bash-5.0 patch 14: edit-and-execute-command does not handle + empty command lines + +--- + bashline.c | 7 ++----- + patchlevel.h | 2 +- + 2 files changed, 3 insertions(+), 6 deletions(-) + +diff --git a/bashline.c b/bashline.c +index 824ea9d9..97adaa0f 100644 +--- a/bashline.c ++++ b/bashline.c +@@ -961,11 +961,8 @@ edit_and_execute_command (count, c, editing_mode, edit_command) + /* This breaks down when using command-oriented history and are not + finished with the command, so we should not ignore the last command */ + using_history (); +- if (rl_line_buffer[0]) +- { +- current_command_line_count++; /* for rl_newline above */ +- bash_add_history (rl_line_buffer); +- } ++ current_command_line_count++; /* for rl_newline above */ ++ bash_add_history (rl_line_buffer); + current_command_line_count = 0; /* for dummy history entry */ + bash_add_history (""); + history_lines_this_session++; +diff --git a/patchlevel.h b/patchlevel.h +index 779671cd..09a3cc84 100644 +--- a/patchlevel.h ++++ b/patchlevel.h +@@ -25,6 +25,6 @@ + regexp `^#define[ ]*PATCHLEVEL', since that's what support/mkversion.sh + looks for to find the patch level (for the sccs version string). */ + +-#define PATCHLEVEL 13 ++#define PATCHLEVEL 14 + + #endif /* _PATCHLEVEL_H_ */ +-- +2.25.1 + diff --git a/bash-5.0-patch-15.patch b/bash-5.0-patch-15.patch new file mode 100644 index 0000000..ce5e72f --- /dev/null +++ b/bash-5.0-patch-15.patch @@ -0,0 +1,64 @@ +From ad1b3e68229273b4983b607c5eeb56551536c583 Mon Sep 17 00:00:00 2001 +From: Chet Ramey +Date: Fri, 7 Feb 2020 15:19:53 -0500 +Subject: [PATCH] Bash-5.0 patch 15: aliases and -c commands can cause + premature termination + +--- + builtins/evalstring.c | 6 ++++-- + patchlevel.h | 2 +- + 2 files changed, 5 insertions(+), 3 deletions(-) + +diff --git a/builtins/evalstring.c b/builtins/evalstring.c +index cadc9bc0..2f13a66a 100644 +--- a/builtins/evalstring.c ++++ b/builtins/evalstring.c +@@ -91,6 +91,7 @@ should_suppress_fork (command) + return (startup_state == 2 && parse_and_execute_level == 1 && + running_trap == 0 && + *bash_input.location.string == '\0' && ++ parser_expanding_alias () == 0 && + command->type == cm_simple && + signal_is_trapped (EXIT_TRAP) == 0 && + signal_is_trapped (ERROR_TRAP) == 0 && +@@ -105,6 +106,7 @@ can_optimize_connection (command) + COMMAND *command; + { + return (*bash_input.location.string == '\0' && ++ parser_expanding_alias () == 0 && + (command->value.Connection->connector == AND_AND || command->value.Connection->connector == OR_OR || command->value.Connection->connector == ';') && + command->value.Connection->second->type == cm_simple); + } +@@ -290,7 +292,7 @@ parse_and_execute (string, from_file, flags) + + with_input_from_string (string, from_file); + clear_shell_input_line (); +- while (*(bash_input.location.string)) ++ while (*(bash_input.location.string) || parser_expanding_alias ()) + { + command = (COMMAND *)NULL; + +@@ -545,7 +547,7 @@ parse_string (string, from_file, flags, endp) + ostring = string; + + with_input_from_string (string, from_file); +- while (*(bash_input.location.string)) ++ while (*(bash_input.location.string)) /* XXX - parser_expanding_alias () ? */ + { + command = (COMMAND *)NULL; + +diff --git a/patchlevel.h b/patchlevel.h +index 09a3cc84..6e9ed3fc 100644 +--- a/patchlevel.h ++++ b/patchlevel.h +@@ -25,6 +25,6 @@ + regexp `^#define[ ]*PATCHLEVEL', since that's what support/mkversion.sh + looks for to find the patch level (for the sccs version string). */ + +-#define PATCHLEVEL 14 ++#define PATCHLEVEL 15 + + #endif /* _PATCHLEVEL_H_ */ +-- +2.25.1 + diff --git a/bash-5.0-patch-16.patch b/bash-5.0-patch-16.patch new file mode 100644 index 0000000..a5e710d --- /dev/null +++ b/bash-5.0-patch-16.patch @@ -0,0 +1,53 @@ +From 6c6454cb18d7cd30b3b26d5ba6479431e599f3ed Mon Sep 17 00:00:00 2001 +From: Chet Ramey +Date: Fri, 7 Feb 2020 15:20:38 -0500 +Subject: [PATCH] Bash-5.0 patch 16: bash waits too long to reap /dev/fd + process substitutions with loops and group commands + +--- + execute_cmd.c | 16 ++++++++++++++++ + patchlevel.h | 2 +- + 2 files changed, 17 insertions(+), 1 deletion(-) + +diff --git a/execute_cmd.c b/execute_cmd.c +index f1d74bfe..3864986d 100644 +--- a/execute_cmd.c ++++ b/execute_cmd.c +@@ -1103,6 +1103,22 @@ execute_command_internal (command, asynchronous, pipe_in, pipe_out, + free ((void *)ofifo_list); + discard_unwind_frame ("internal_fifos"); + } ++# if defined (HAVE_DEV_FD) ++ /* Reap process substitutions at the end of loops */ ++ switch (command->type) ++ { ++ case cm_while: ++ case cm_until: ++ case cm_for: ++ case cm_group: ++# if defined (ARITH_FOR_COMMAND) ++ case cm_arith_for: ++# endif ++ reap_procsubs (); ++ default: ++ break; ++ } ++# endif /* HAVE_DEV_FD */ + #endif + + /* Invert the return value if we have to */ +diff --git a/patchlevel.h b/patchlevel.h +index 6e9ed3fc..9074f4dd 100644 +--- a/patchlevel.h ++++ b/patchlevel.h +@@ -25,6 +25,6 @@ + regexp `^#define[ ]*PATCHLEVEL', since that's what support/mkversion.sh + looks for to find the patch level (for the sccs version string). */ + +-#define PATCHLEVEL 15 ++#define PATCHLEVEL 16 + + #endif /* _PATCHLEVEL_H_ */ +-- +2.25.1 + diff --git a/bash-5.0-patch-17.patch b/bash-5.0-patch-17.patch new file mode 100644 index 0000000..bca2d4d --- /dev/null +++ b/bash-5.0-patch-17.patch @@ -0,0 +1,213 @@ +From 9e49d343e3cd7e20dad1b86ebfb764e8027596a7 Mon Sep 17 00:00:00 2001 +From: Chet Ramey +Date: Fri, 24 Apr 2020 11:05:06 -0400 +Subject: [PATCH] Bash-5.0 patch 17: better fix for reaping process + substitution file descriptors + +--- + execute_cmd.c | 26 ++++++-------------------- + patchlevel.h | 2 +- + subst.c | 35 +++++++++++++++++++++-------------- + subst.h | 5 ++--- + 4 files changed, 30 insertions(+), 38 deletions(-) + +diff --git a/execute_cmd.c b/execute_cmd.c +index 3864986d..4a05758d 100644 +--- a/execute_cmd.c ++++ b/execute_cmd.c +@@ -564,7 +564,7 @@ execute_command_internal (command, asynchronous, pipe_in, pipe_out, + volatile int save_line_number; + #if defined (PROCESS_SUBSTITUTION) + volatile int ofifo, nfifo, osize, saved_fifo; +- volatile char *ofifo_list; ++ volatile void *ofifo_list; + #endif + + if (breaking || continuing) +@@ -750,12 +750,14 @@ execute_command_internal (command, asynchronous, pipe_in, pipe_out, + reap_procsubs (); + # endif + +- if (variable_context != 0) /* XXX - also if sourcelevel != 0? */ ++ /* XXX - also if sourcelevel != 0? */ ++ if (variable_context != 0) + { + ofifo = num_fifos (); + ofifo_list = copy_fifo_list ((int *)&osize); + begin_unwind_frame ("internal_fifos"); +- add_unwind_protect (xfree, ofifo_list); ++ if (ofifo_list) ++ add_unwind_protect (xfree, ofifo_list); + saved_fifo = 1; + } + else +@@ -1099,26 +1101,10 @@ execute_command_internal (command, asynchronous, pipe_in, pipe_out, + { + nfifo = num_fifos (); + if (nfifo > ofifo) +- close_new_fifos ((char *)ofifo_list, osize); ++ close_new_fifos ((void *)ofifo_list, osize); + free ((void *)ofifo_list); + discard_unwind_frame ("internal_fifos"); + } +-# if defined (HAVE_DEV_FD) +- /* Reap process substitutions at the end of loops */ +- switch (command->type) +- { +- case cm_while: +- case cm_until: +- case cm_for: +- case cm_group: +-# if defined (ARITH_FOR_COMMAND) +- case cm_arith_for: +-# endif +- reap_procsubs (); +- default: +- break; +- } +-# endif /* HAVE_DEV_FD */ + #endif + + /* Invert the return value if we have to */ +diff --git a/patchlevel.h b/patchlevel.h +index 9074f4dd..98e714da 100644 +--- a/patchlevel.h ++++ b/patchlevel.h +@@ -25,6 +25,6 @@ + regexp `^#define[ ]*PATCHLEVEL', since that's what support/mkversion.sh + looks for to find the patch level (for the sccs version string). */ + +-#define PATCHLEVEL 16 ++#define PATCHLEVEL 17 + + #endif /* _PATCHLEVEL_H_ */ +diff --git a/subst.c b/subst.c +index fd6db240..8884b487 100644 +--- a/subst.c ++++ b/subst.c +@@ -5336,13 +5336,13 @@ clear_fifo_list () + { + } + +-char * ++void * + copy_fifo_list (sizep) + int *sizep; + { + if (sizep) + *sizep = 0; +- return (char *)NULL; ++ return (void *)NULL; + } + + static void +@@ -5408,8 +5408,13 @@ unlink_fifo_list () + for (i = j = 0; i < nfifo; i++) + if (fifo_list[i].file) + { +- fifo_list[j].file = fifo_list[i].file; +- fifo_list[j].proc = fifo_list[i].proc; ++ if (i != j) ++ { ++ fifo_list[j].file = fifo_list[i].file; ++ fifo_list[j].proc = fifo_list[i].proc; ++ fifo_list[i].file = (char *)NULL; ++ fifo_list[i].proc = 0; ++ } + j++; + } + nfifo = j; +@@ -5425,10 +5430,11 @@ unlink_fifo_list () + case it's larger than fifo_list_size (size of fifo_list). */ + void + close_new_fifos (list, lsize) +- char *list; ++ void *list; + int lsize; + { + int i; ++ char *plist; + + if (list == 0) + { +@@ -5436,8 +5442,8 @@ close_new_fifos (list, lsize) + return; + } + +- for (i = 0; i < lsize; i++) +- if (list[i] == 0 && i < fifo_list_size && fifo_list[i].proc != -1) ++ for (plist = (char *)list, i = 0; i < lsize; i++) ++ if (plist[i] == 0 && i < fifo_list_size && fifo_list[i].proc != -1) + unlink_fifo (i); + + for (i = lsize; i < fifo_list_size; i++) +@@ -5559,22 +5565,22 @@ clear_fifo_list () + nfds = 0; + } + +-char * ++void * + copy_fifo_list (sizep) + int *sizep; + { +- char *ret; ++ void *ret; + + if (nfds == 0 || totfds == 0) + { + if (sizep) + *sizep = 0; +- return (char *)NULL; ++ return (void *)NULL; + } + + if (sizep) + *sizep = totfds; +- ret = (char *)xmalloc (totfds * sizeof (pid_t)); ++ ret = xmalloc (totfds * sizeof (pid_t)); + return (memcpy (ret, dev_fd_list, totfds * sizeof (pid_t))); + } + +@@ -5647,10 +5653,11 @@ unlink_fifo_list () + totfds (size of dev_fd_list). */ + void + close_new_fifos (list, lsize) +- char *list; ++ void *list; + int lsize; + { + int i; ++ pid_t *plist; + + if (list == 0) + { +@@ -5658,8 +5665,8 @@ close_new_fifos (list, lsize) + return; + } + +- for (i = 0; i < lsize; i++) +- if (list[i] == 0 && i < totfds && dev_fd_list[i]) ++ for (plist = (pid_t *)list, i = 0; i < lsize; i++) ++ if (plist[i] == 0 && i < totfds && dev_fd_list[i]) + unlink_fifo (i); + + for (i = lsize; i < totfds; i++) +diff --git a/subst.h b/subst.h +index 34763222..faf831bd 100644 +--- a/subst.h ++++ b/subst.h +@@ -273,9 +273,8 @@ extern int num_fifos __P((void)); + extern void unlink_fifo_list __P((void)); + extern void unlink_fifo __P((int)); + +-extern char *copy_fifo_list __P((int *)); +-extern void unlink_new_fifos __P((char *, int)); +-extern void close_new_fifos __P((char *, int)); ++extern void *copy_fifo_list __P((int *)); ++extern void close_new_fifos __P((void *, int)); + + extern void clear_fifo_list __P((void)); + +-- +2.25.1 + diff --git a/bash-5.0-patch-2.patch b/bash-5.0-patch-2.patch new file mode 100644 index 0000000..b9858ae --- /dev/null +++ b/bash-5.0-patch-2.patch @@ -0,0 +1,96 @@ +From ddf3f643cb9b9a2ca8e6d996c605e4332204874c Mon Sep 17 00:00:00 2001 +From: Chet Ramey +Date: Fri, 18 Jan 2019 15:13:57 -0500 +Subject: [PATCH] Bash-5.0 patch 2: fix expansion of aliases whose value ends + with an unquoted tab + +--- + parse.y | 5 ++++- + parser.h | 1 + + patchlevel.h | 2 +- + y.tab.c | 5 ++++- + 4 files changed, 10 insertions(+), 3 deletions(-) + +diff --git a/parse.y b/parse.y +index 3ff87bcc..07e6e3e4 100644 +--- a/parse.y ++++ b/parse.y +@@ -2557,12 +2557,14 @@ next_alias_char: + if (uc == 0 && pushed_string_list && pushed_string_list->flags != PSH_SOURCE && + pushed_string_list->flags != PSH_DPAREN && + (parser_state & PST_COMMENT) == 0 && ++ (parser_state & PST_ENDALIAS) == 0 && /* only once */ + shell_input_line_index > 0 && +- shell_input_line[shell_input_line_index-1] != ' ' && ++ shellblank (shell_input_line[shell_input_line_index-1]) == 0 && + shell_input_line[shell_input_line_index-1] != '\n' && + shellmeta (shell_input_line[shell_input_line_index-1]) == 0 && + (current_delimiter (dstack) != '\'' && current_delimiter (dstack) != '"')) + { ++ parser_state |= PST_ENDALIAS; + return ' '; /* END_ALIAS */ + } + #endif +@@ -2571,6 +2573,7 @@ pop_alias: + /* This case works for PSH_DPAREN as well */ + if (uc == 0 && pushed_string_list && pushed_string_list->flags != PSH_SOURCE) + { ++ parser_state &= ~PST_ENDALIAS; + pop_string (); + uc = shell_input_line[shell_input_line_index]; + if (uc) +diff --git a/parser.h b/parser.h +index 54dd2c88..6d08915d 100644 +--- a/parser.h ++++ b/parser.h +@@ -47,6 +47,7 @@ + #define PST_REPARSE 0x040000 /* re-parsing in parse_string_to_word_list */ + #define PST_REDIRLIST 0x080000 /* parsing a list of redirections preceding a simple command name */ + #define PST_COMMENT 0x100000 /* parsing a shell comment; used by aliases */ ++#define PST_ENDALIAS 0x200000 /* just finished expanding and consuming an alias */ + + /* Definition of the delimiter stack. Needed by parse.y and bashhist.c. */ + struct dstack { +diff --git a/patchlevel.h b/patchlevel.h +index 40db1a32..a988d852 100644 +--- a/patchlevel.h ++++ b/patchlevel.h +@@ -25,6 +25,6 @@ + regexp `^#define[ ]*PATCHLEVEL', since that's what support/mkversion.sh + looks for to find the patch level (for the sccs version string). */ + +-#define PATCHLEVEL 1 ++#define PATCHLEVEL 2 + + #endif /* _PATCHLEVEL_H_ */ +diff --git a/y.tab.c b/y.tab.c +index 1abe2c50..7efce3c8 100644 +--- a/y.tab.c ++++ b/y.tab.c +@@ -4873,12 +4873,14 @@ next_alias_char: + if (uc == 0 && pushed_string_list && pushed_string_list->flags != PSH_SOURCE && + pushed_string_list->flags != PSH_DPAREN && + (parser_state & PST_COMMENT) == 0 && ++ (parser_state & PST_ENDALIAS) == 0 && /* only once */ + shell_input_line_index > 0 && +- shell_input_line[shell_input_line_index-1] != ' ' && ++ shellblank (shell_input_line[shell_input_line_index-1]) == 0 && + shell_input_line[shell_input_line_index-1] != '\n' && + shellmeta (shell_input_line[shell_input_line_index-1]) == 0 && + (current_delimiter (dstack) != '\'' && current_delimiter (dstack) != '"')) + { ++ parser_state |= PST_ENDALIAS; + return ' '; /* END_ALIAS */ + } + #endif +@@ -4887,6 +4889,7 @@ pop_alias: + /* This case works for PSH_DPAREN as well */ + if (uc == 0 && pushed_string_list && pushed_string_list->flags != PSH_SOURCE) + { ++ parser_state &= ~PST_ENDALIAS; + pop_string (); + uc = shell_input_line[shell_input_line_index]; + if (uc) +-- +2.17.2 + diff --git a/bash-5.0-patch-3.patch b/bash-5.0-patch-3.patch new file mode 100644 index 0000000..509f52e --- /dev/null +++ b/bash-5.0-patch-3.patch @@ -0,0 +1,202 @@ +From fcf6ae7d069a64741e9484cf219d7fe95de9e796 Mon Sep 17 00:00:00 2001 +From: Chet Ramey +Date: Tue, 19 Mar 2019 10:05:39 -0400 +Subject: [PATCH] Bash-5.0 patch 3: improvements when globbing directory names + containing backslashes + +--- + bashline.c | 2 +- + lib/glob/glob.c | 25 +++++++++++++++++++++---- + lib/glob/glob.h | 1 + + lib/glob/glob_loop.c | 23 ++++++++++++++++------- + patchlevel.h | 2 +- + pathexp.c | 16 ++++++++++++---- + 6 files changed, 52 insertions(+), 17 deletions(-) + +diff --git a/bashline.c b/bashline.c +index 75e79f1a..824ea9d9 100644 +--- a/bashline.c ++++ b/bashline.c +@@ -3752,7 +3752,7 @@ completion_glob_pattern (string) + continue; + + case '\\': +- if (*string == 0) ++ if (*string++ == 0) + return (0); + } + +diff --git a/lib/glob/glob.c b/lib/glob/glob.c +index 22d90a5c..398253b5 100644 +--- a/lib/glob/glob.c ++++ b/lib/glob/glob.c +@@ -1061,7 +1061,7 @@ glob_filename (pathname, flags) + char *directory_name, *filename, *dname, *fn; + unsigned int directory_len; + int free_dirname; /* flag */ +- int dflags; ++ int dflags, hasglob; + + result = (char **) malloc (sizeof (char *)); + result_size = 1; +@@ -1110,9 +1110,12 @@ glob_filename (pathname, flags) + free_dirname = 1; + } + ++ hasglob = 0; + /* If directory_name contains globbing characters, then we +- have to expand the previous levels. Just recurse. */ +- if (directory_len > 0 && glob_pattern_p (directory_name)) ++ have to expand the previous levels. Just recurse. ++ If glob_pattern_p returns != [0,1] we have a pattern that has backslash ++ quotes but no unquoted glob pattern characters. We dequote it below. */ ++ if (directory_len > 0 && (hasglob = glob_pattern_p (directory_name)) == 1) + { + char **directories, *d, *p; + register unsigned int i; +@@ -1175,7 +1178,7 @@ glob_filename (pathname, flags) + if (d[directory_len - 1] == '/') + d[directory_len - 1] = '\0'; + +- directories = glob_filename (d, dflags); ++ directories = glob_filename (d, dflags|GX_RECURSE); + + if (free_dirname) + { +@@ -1332,6 +1335,20 @@ only_filename: + free (directory_name); + return (NULL); + } ++ /* If we have a directory name with quoted characters, and we are ++ being called recursively to glob the directory portion of a pathname, ++ we need to dequote the directory name before returning it so the ++ caller can read the directory */ ++ if (directory_len > 0 && hasglob == 2 && (flags & GX_RECURSE) != 0) ++ { ++ dequote_pathname (directory_name); ++ directory_len = strlen (directory_name); ++ } ++ ++ /* We could check whether or not the dequoted directory_name is a ++ directory and return it here, returning the original directory_name ++ if not, but we don't do that yet. I'm not sure it matters. */ ++ + /* Handle GX_MARKDIRS here. */ + result[0] = (char *) malloc (directory_len + 1); + if (result[0] == NULL) +diff --git a/lib/glob/glob.h b/lib/glob/glob.h +index b9462333..56ac08ba 100644 +--- a/lib/glob/glob.h ++++ b/lib/glob/glob.h +@@ -30,6 +30,7 @@ + #define GX_NULLDIR 0x100 /* internal -- no directory preceding pattern */ + #define GX_ADDCURDIR 0x200 /* internal -- add passed directory name */ + #define GX_GLOBSTAR 0x400 /* turn on special handling of ** */ ++#define GX_RECURSE 0x800 /* internal -- glob_filename called recursively */ + + extern int glob_pattern_p __P((const char *)); + extern char **glob_vector __P((char *, char *, int)); +diff --git a/lib/glob/glob_loop.c b/lib/glob/glob_loop.c +index 7d6ae211..3a4f4f1e 100644 +--- a/lib/glob/glob_loop.c ++++ b/lib/glob/glob_loop.c +@@ -26,10 +26,10 @@ INTERNAL_GLOB_PATTERN_P (pattern) + { + register const GCHAR *p; + register GCHAR c; +- int bopen; ++ int bopen, bsquote; + + p = pattern; +- bopen = 0; ++ bopen = bsquote = 0; + + while ((c = *p++) != L('\0')) + switch (c) +@@ -55,13 +55,22 @@ INTERNAL_GLOB_PATTERN_P (pattern) + + case L('\\'): + /* Don't let the pattern end in a backslash (GMATCH returns no match +- if the pattern ends in a backslash anyway), but otherwise return 1, +- since the matching engine uses backslash as an escape character +- and it can be removed. */ +- return (*p != L('\0')); ++ if the pattern ends in a backslash anyway), but otherwise note that ++ we have seen this, since the matching engine uses backslash as an ++ escape character and it can be removed. We return 2 later if we ++ have seen only backslash-escaped characters, so interested callers ++ know they can shortcut and just dequote the pathname. */ ++ if (*p != L('\0')) ++ { ++ p++; ++ bsquote = 1; ++ continue; ++ } ++ else /* (*p == L('\0')) */ ++ return 0; + } + +- return 0; ++ return bsquote ? 2 : 0; + } + + #undef INTERNAL_GLOB_PATTERN_P +diff --git a/patchlevel.h b/patchlevel.h +index a988d852..e7e960c1 100644 +--- a/patchlevel.h ++++ b/patchlevel.h +@@ -25,6 +25,6 @@ + regexp `^#define[ ]*PATCHLEVEL', since that's what support/mkversion.sh + looks for to find the patch level (for the sccs version string). */ + +-#define PATCHLEVEL 2 ++#define PATCHLEVEL 3 + + #endif /* _PATCHLEVEL_H_ */ +diff --git a/pathexp.c b/pathexp.c +index b51729a7..c1bf2d89 100644 +--- a/pathexp.c ++++ b/pathexp.c +@@ -65,11 +65,11 @@ unquoted_glob_pattern_p (string) + { + register int c; + char *send; +- int open; ++ int open, bsquote; + + DECLARE_MBSTATE; + +- open = 0; ++ open = bsquote = 0; + send = string + strlen (string); + + while (c = *string++) +@@ -100,7 +100,14 @@ unquoted_glob_pattern_p (string) + can be removed by the matching engine, so we have to run it through + globbing. */ + case '\\': +- return (*string != 0); ++ if (*string != '\0' && *string != '/') ++ { ++ bsquote = 1; ++ string++; ++ continue; ++ } ++ else if (*string == 0) ++ return (0); + + case CTLESC: + if (*string++ == '\0') +@@ -117,7 +124,8 @@ unquoted_glob_pattern_p (string) + ADVANCE_CHAR_P (string, send - string); + #endif + } +- return (0); ++ ++ return (bsquote ? 2 : 0); + } + + /* Return 1 if C is a character that is `special' in a POSIX ERE and needs to +-- +2.17.2 + diff --git a/bash-5.0-patch-4.patch b/bash-5.0-patch-4.patch new file mode 100644 index 0000000..8993833 --- /dev/null +++ b/bash-5.0-patch-4.patch @@ -0,0 +1,42 @@ +From 16c907aa3bb427618733e5a6f2f4e2fc5a3488d3 Mon Sep 17 00:00:00 2001 +From: Chet Ramey +Date: Sat, 20 Apr 2019 14:24:28 -0400 +Subject: [PATCH] Bash-5.0 patch 4: the wait builtin without arguments only + waits for known children the shell started + +--- + jobs.c | 4 +--- + patchlevel.h | 2 +- + 2 files changed, 2 insertions(+), 4 deletions(-) + +diff --git a/jobs.c b/jobs.c +index ce2bdf24..ae3c54c6 100644 +--- a/jobs.c ++++ b/jobs.c +@@ -2488,10 +2488,8 @@ wait_for_background_pids () + r = wait_for (last_procsub_child->pid); + wait_procsubs (); + reap_procsubs (); +-#if 1 ++#if 0 + /* We don't want to wait indefinitely if we have stopped children. */ +- /* XXX - should add a loop that goes through the list of process +- substitutions and waits for each proc in turn before this code. */ + if (any_stopped == 0) + { + /* Check whether or not we have any unreaped children. */ +diff --git a/patchlevel.h b/patchlevel.h +index e7e960c1..c059f0bd 100644 +--- a/patchlevel.h ++++ b/patchlevel.h +@@ -25,6 +25,6 @@ + regexp `^#define[ ]*PATCHLEVEL', since that's what support/mkversion.sh + looks for to find the patch level (for the sccs version string). */ + +-#define PATCHLEVEL 3 ++#define PATCHLEVEL 4 + + #endif /* _PATCHLEVEL_H_ */ +-- +2.17.2 + diff --git a/bash-5.0-patch-5.patch b/bash-5.0-patch-5.patch new file mode 100644 index 0000000..1fb4faf --- /dev/null +++ b/bash-5.0-patch-5.patch @@ -0,0 +1,102 @@ +From 41f5420db7a911fb0833be693205f4db41f05434 Mon Sep 17 00:00:00 2001 +From: Chet Ramey +Date: Sat, 20 Apr 2019 14:25:52 -0400 +Subject: [PATCH] Bash-5.0 patch 5: prevent optimizing forks away too + aggressively + +--- + builtins/evalstring.c | 26 +++++++++++++++++++++++--- + command.h | 1 + + execute_cmd.c | 2 ++ + patchlevel.h | 2 +- + 4 files changed, 27 insertions(+), 4 deletions(-) + +diff --git a/builtins/evalstring.c b/builtins/evalstring.c +index 1496eeec..cadc9bc0 100644 +--- a/builtins/evalstring.c ++++ b/builtins/evalstring.c +@@ -100,12 +100,22 @@ should_suppress_fork (command) + ((command->flags & CMD_INVERT_RETURN) == 0)); + } + ++int ++can_optimize_connection (command) ++ COMMAND *command; ++{ ++ return (*bash_input.location.string == '\0' && ++ (command->value.Connection->connector == AND_AND || command->value.Connection->connector == OR_OR || command->value.Connection->connector == ';') && ++ command->value.Connection->second->type == cm_simple); ++} ++ + void + optimize_fork (command) + COMMAND *command; + { + if (command->type == cm_connection && +- (command->value.Connection->connector == AND_AND || command->value.Connection->connector == OR_OR) && ++ (command->value.Connection->connector == AND_AND || command->value.Connection->connector == OR_OR || command->value.Connection->connector == ';') && ++ (command->value.Connection->second->flags & CMD_TRY_OPTIMIZING) && + should_suppress_fork (command->value.Connection->second)) + { + command->value.Connection->second->flags |= CMD_NO_FORK; +@@ -412,8 +422,18 @@ parse_and_execute (string, from_file, flags) + command->flags |= CMD_NO_FORK; + command->value.Simple->flags |= CMD_NO_FORK; + } +- else if (command->type == cm_connection) +- optimize_fork (command); ++ ++ /* Can't optimize forks out here execept for simple commands. ++ This knows that the parser sets up commands as left-side heavy ++ (&& and || are left-associative) and after the single parse, ++ if we are at the end of the command string, the last in a ++ series of connection commands is ++ command->value.Connection->second. */ ++ else if (command->type == cm_connection && can_optimize_connection (command)) ++ { ++ command->value.Connection->second->flags |= CMD_TRY_OPTIMIZING; ++ command->value.Connection->second->value.Simple->flags |= CMD_TRY_OPTIMIZING; ++ } + #endif /* ONESHOT */ + + /* See if this is a candidate for $( value.Connection->connector == OR_OR) && + (exec_result != EXECUTION_SUCCESS))) + { ++ optimize_fork (command); ++ + second = command->value.Connection->second; + if (ignore_return && second) + second->flags |= CMD_IGNORE_RETURN; +diff --git a/patchlevel.h b/patchlevel.h +index c059f0bd..1bc098b8 100644 +--- a/patchlevel.h ++++ b/patchlevel.h +@@ -25,6 +25,6 @@ + regexp `^#define[ ]*PATCHLEVEL', since that's what support/mkversion.sh + looks for to find the patch level (for the sccs version string). */ + +-#define PATCHLEVEL 4 ++#define PATCHLEVEL 5 + + #endif /* _PATCHLEVEL_H_ */ +-- +2.17.2 + diff --git a/bash-5.0-patch-6.patch b/bash-5.0-patch-6.patch new file mode 100644 index 0000000..bfd8460 --- /dev/null +++ b/bash-5.0-patch-6.patch @@ -0,0 +1,39 @@ +From dfd2cc6ac5558e252af0a7cb829a9629bf782e17 Mon Sep 17 00:00:00 2001 +From: Chet Ramey +Date: Sat, 20 Apr 2019 14:27:00 -0400 +Subject: [PATCH] Bash-5.0 patch 6: allow building with SYSLOG_HISTORY defined + without defining SYSLOG_SHOPT + +--- + builtins/shopt.def | 2 +- + patchlevel.h | 2 +- + 2 files changed, 2 insertions(+), 2 deletions(-) + +diff --git a/builtins/shopt.def b/builtins/shopt.def +index f6dc6f97..1c485361 100644 +--- a/builtins/shopt.def ++++ b/builtins/shopt.def +@@ -122,7 +122,7 @@ extern int assoc_expand_once; + extern int array_expand_once; + #endif + +-#if defined (SYSLOG_HISTORY) && defined (SYSLOG_SHOPT) ++#if defined (SYSLOG_HISTORY) + extern int syslog_history; + #endif + +diff --git a/patchlevel.h b/patchlevel.h +index 1bc098b8..14bff9fc 100644 +--- a/patchlevel.h ++++ b/patchlevel.h +@@ -25,6 +25,6 @@ + regexp `^#define[ ]*PATCHLEVEL', since that's what support/mkversion.sh + looks for to find the patch level (for the sccs version string). */ + +-#define PATCHLEVEL 5 ++#define PATCHLEVEL 6 + + #endif /* _PATCHLEVEL_H_ */ +-- +2.17.2 + diff --git a/bash-5.0-patch-7.patch b/bash-5.0-patch-7.patch new file mode 100644 index 0000000..2a4315e --- /dev/null +++ b/bash-5.0-patch-7.patch @@ -0,0 +1,51 @@ +From 3ba697465bc74fab513a26dea700cc82e9f4724e Mon Sep 17 00:00:00 2001 +From: Chet Ramey +Date: Sat, 20 Apr 2019 14:27:56 -0400 +Subject: [PATCH] Bash-5.0 patch 7: fix exec builtin leaving the terminal in + the wrong process group + +--- + jobs.c | 12 +++++------- + patchlevel.h | 2 +- + 2 files changed, 6 insertions(+), 8 deletions(-) + +diff --git a/jobs.c b/jobs.c +index ae3c54c6..6bc31dca 100644 +--- a/jobs.c ++++ b/jobs.c +@@ -4837,15 +4837,13 @@ void + end_job_control () + { + if (job_control) +- { +- terminate_stopped_jobs (); ++ terminate_stopped_jobs (); + +- if (original_pgrp >= 0) +- give_terminal_to (original_pgrp, 1); +- } ++ if (original_pgrp >= 0 && terminal_pgrp != original_pgrp) ++ give_terminal_to (original_pgrp, 1); + +- if (original_pgrp >= 0) +- setpgid (0, original_pgrp); ++ if (original_pgrp >= 0 && setpgid (0, original_pgrp) == 0) ++ shell_pgrp = original_pgrp; + } + + /* Restart job control by closing shell tty and reinitializing. This is +diff --git a/patchlevel.h b/patchlevel.h +index 14bff9fc..deb9c5b7 100644 +--- a/patchlevel.h ++++ b/patchlevel.h +@@ -25,6 +25,6 @@ + regexp `^#define[ ]*PATCHLEVEL', since that's what support/mkversion.sh + looks for to find the patch level (for the sccs version string). */ + +-#define PATCHLEVEL 6 ++#define PATCHLEVEL 7 + + #endif /* _PATCHLEVEL_H_ */ +-- +2.17.2 + diff --git a/bash-5.0-patch-8.patch b/bash-5.0-patch-8.patch new file mode 100644 index 0000000..cb23681 --- /dev/null +++ b/bash-5.0-patch-8.patch @@ -0,0 +1,50 @@ +From 01323582f773ef4d08fa26a90e9a21285a8405f5 Mon Sep 17 00:00:00 2001 +From: Chet Ramey +Date: Wed, 14 Aug 2019 14:57:48 -0400 +Subject: [PATCH] Bash-5.0 patch 8: fix history offset when HISTSIZE == 0 that + can lead to crashes + +--- + bashhist.c | 5 ++++- + patchlevel.h | 2 +- + 2 files changed, 5 insertions(+), 2 deletions(-) + +diff --git a/bashhist.c b/bashhist.c +index 7912cce3..d2155dce 100644 +--- a/bashhist.c ++++ b/bashhist.c +@@ -560,15 +560,18 @@ pre_process_line (line, print_changes, addit) + add that line to the history if ADDIT is non-zero. */ + if (!history_expansion_inhibited && history_expansion && history_expansion_p (line)) + { ++ int old_len; ++ + /* If we are expanding the second or later line of a multi-line + command, decrease history_length so references to history expansions + in these lines refer to the previous history entry and not the + current command. */ ++ old_len = history_length; + if (history_length > 0 && command_oriented_history && current_command_first_line_saved && current_command_line_count > 1) + history_length--; + expanded = history_expand (line, &history_value); + if (history_length >= 0 && command_oriented_history && current_command_first_line_saved && current_command_line_count > 1) +- history_length++; ++ history_length = old_len; + + if (expanded) + { +diff --git a/patchlevel.h b/patchlevel.h +index deb9c5b7..16c87404 100644 +--- a/patchlevel.h ++++ b/patchlevel.h +@@ -25,6 +25,6 @@ + regexp `^#define[ ]*PATCHLEVEL', since that's what support/mkversion.sh + looks for to find the patch level (for the sccs version string). */ + +-#define PATCHLEVEL 7 ++#define PATCHLEVEL 8 + + #endif /* _PATCHLEVEL_H_ */ +-- +2.21.0 + diff --git a/bash-5.0-patch-9.patch b/bash-5.0-patch-9.patch new file mode 100644 index 0000000..be8a347 --- /dev/null +++ b/bash-5.0-patch-9.patch @@ -0,0 +1,38 @@ +From 9f597fd10993313262cab400bf3c46ffb3f6fd1e Mon Sep 17 00:00:00 2001 +From: Chet Ramey +Date: Wed, 14 Aug 2019 14:58:44 -0400 +Subject: [PATCH] Bash-5.0 patch 9: fix file descriptor leak with zero-length + history file + +--- + lib/readline/histfile.c | 1 + + patchlevel.h | 2 +- + 2 files changed, 2 insertions(+), 1 deletion(-) + +diff --git a/lib/readline/histfile.c b/lib/readline/histfile.c +index dc64bde1..a8a92aa3 100644 +--- a/lib/readline/histfile.c ++++ b/lib/readline/histfile.c +@@ -305,6 +305,7 @@ read_history_range (const char *filename, int from, int to) + if (file_size == 0) + { + free (input); ++ close (file); + return 0; /* don't waste time if we don't have to */ + } + +diff --git a/patchlevel.h b/patchlevel.h +index 16c87404..02f1d606 100644 +--- a/patchlevel.h ++++ b/patchlevel.h +@@ -25,6 +25,6 @@ + regexp `^#define[ ]*PATCHLEVEL', since that's what support/mkversion.sh + looks for to find the patch level (for the sccs version string). */ + +-#define PATCHLEVEL 8 ++#define PATCHLEVEL 9 + + #endif /* _PATCHLEVEL_H_ */ +-- +2.21.0 + diff --git a/bash-infotags.patch b/bash-infotags.patch new file mode 100644 index 0000000..fe39609 --- /dev/null +++ b/bash-infotags.patch @@ -0,0 +1,26 @@ +diff --git a/doc/Makefile.in b/doc/Makefile.in +index 5f0756c..a5fa5a0 100644 +--- a/doc/Makefile.in ++++ b/doc/Makefile.in +@@ -74,7 +74,6 @@ TEXI2DVI = ${SUPPORT_SRCDIR}/texi2dvi + TEXI2HTML = ${SUPPORT_SRCDIR}/texi2html + MAN2HTML = ${BUILD_DIR}/support/man2html + HTMLPOST = ${srcdir}/htmlpost.sh +-INFOPOST = ${srcdir}/infopost.sh + QUIETPS = #set this to -q to shut up dvips + PAPERSIZE = letter # change to a4 for A4-size paper + PSDPI = 600 # could be 300 if you like +@@ -188,8 +187,8 @@ bashref.pdf: $(BASHREF_FILES) $(HSUSER) $(RLUSER) + bashref.html: $(BASHREF_FILES) $(HSUSER) $(RLUSER) + $(MAKEINFO) --html --no-split -I$(TEXINPUTDIR) $(srcdir)/bashref.texi + +-bash.info: bashref.info +- ${SHELL} ${INFOPOST} < $(srcdir)/bashref.info > $@ ; \ ++bash.info: $(BASHREF_FILES) $(HSUSER) $(RLUSER) ++ $(MAKEINFO) --no-split -I$(TEXINPUTDIR) $(srcdir)/bashref.texi -o $@ + + bash.txt: bash.1 + bash.ps: bash.1 +-- +2.9.3 + diff --git a/bash-requires.patch b/bash-requires.patch new file mode 100644 index 0000000..6167af1 --- /dev/null +++ b/bash-requires.patch @@ -0,0 +1,312 @@ +diff --git a/builtins.h b/builtins.h +index dac95fd..5b7e811 100644 +--- a/builtins.h ++++ b/builtins.h +@@ -45,6 +45,7 @@ + #define ASSIGNMENT_BUILTIN 0x10 /* This builtin takes assignment statements. */ + #define POSIX_BUILTIN 0x20 /* This builtins is special in the Posix command search order. */ + #define LOCALVAR_BUILTIN 0x40 /* This builtin creates local variables */ ++#define REQUIRES_BUILTIN 0x80 /* This builtin requires other files. */ + + #define BASE_INDENT 4 + +diff --git a/builtins/mkbuiltins.c b/builtins/mkbuiltins.c +index 4f51201..91c25db 100644 +--- a/builtins/mkbuiltins.c ++++ b/builtins/mkbuiltins.c +@@ -69,10 +69,15 @@ extern char *strcpy (); + #define whitespace(c) (((c) == ' ') || ((c) == '\t')) + + /* Flag values that builtins can have. */ ++/* These flags are for the C code generator, ++ the C which is produced (./builtin.c) ++ includes the flags definitions found ++ in ../builtins.h */ + #define BUILTIN_FLAG_SPECIAL 0x01 + #define BUILTIN_FLAG_ASSIGNMENT 0x02 + #define BUILTIN_FLAG_LOCALVAR 0x04 + #define BUILTIN_FLAG_POSIX_BUILTIN 0x08 ++#define BUILTIN_FLAG_REQUIRES 0x10 + + #define BASE_INDENT 4 + +@@ -173,11 +178,19 @@ char *posix_builtins[] = + (char *)NULL + }; + ++/* The builtin commands that cause requirements on other files. */ ++static char *requires_builtins[] = ++{ ++ ".", "command", "exec", "source", "inlib", ++ (char *)NULL ++}; ++ + /* Forward declarations. */ + static int is_special_builtin (); + static int is_assignment_builtin (); + static int is_localvar_builtin (); + static int is_posix_builtin (); ++static int is_requires_builtin (); + + #if !defined (HAVE_RENAME) + static int rename (); +@@ -831,6 +844,8 @@ builtin_handler (self, defs, arg) + new->flags |= BUILTIN_FLAG_LOCALVAR; + if (is_posix_builtin (name)) + new->flags |= BUILTIN_FLAG_POSIX_BUILTIN; ++ if (is_requires_builtin (name)) ++ new->flags |= BUILTIN_FLAG_REQUIRES; + + array_add ((char *)new, defs->builtins); + building_builtin = 1; +@@ -1250,12 +1265,13 @@ write_builtins (defs, structfile, externfile) + else + fprintf (structfile, "(sh_builtin_func_t *)0x0, "); + +- fprintf (structfile, "%s%s%s%s%s, %s_doc,\n", ++ fprintf (structfile, "%s%s%s%s%s%s, %s_doc,\n", + "BUILTIN_ENABLED | STATIC_BUILTIN", + (builtin->flags & BUILTIN_FLAG_SPECIAL) ? " | SPECIAL_BUILTIN" : "", + (builtin->flags & BUILTIN_FLAG_ASSIGNMENT) ? " | ASSIGNMENT_BUILTIN" : "", + (builtin->flags & BUILTIN_FLAG_LOCALVAR) ? " | LOCALVAR_BUILTIN" : "", + (builtin->flags & BUILTIN_FLAG_POSIX_BUILTIN) ? " | POSIX_BUILTIN" : "", ++ (builtin->flags & BUILTIN_FLAG_REQUIRES) ? " | REQUIRES_BUILTIN" : "", + document_name (builtin)); + + /* Don't translate short document summaries that are identical +@@ -1645,6 +1661,13 @@ is_posix_builtin (name) + return (_find_in_table (name, posix_builtins)); + } + ++static int ++is_requires_builtin (name) ++ char *name; ++{ ++ return (_find_in_table (name, requires_builtins)); ++} ++ + #if !defined (HAVE_RENAME) + static int + rename (from, to) +diff --git a/doc/bash.1 b/doc/bash.1 +index d91f1fd..111a66d 100644 +--- a/doc/bash.1 ++++ b/doc/bash.1 +@@ -239,6 +239,14 @@ The shell becomes restricted (see + .B "RESTRICTED SHELL" + below). + .TP ++.B \-\-rpm-requires ++Produce the list of files that are required for the ++shell script to run. This implies '-n' and is subject ++to the same limitations as compile time error checking checking; ++Command substitutions, Conditional expressions and ++.BR eval ++builtin are not parsed so some dependencies may be missed. ++.TP + .B \-\-verbose + Equivalent to \fB\-v\fP. + .TP +diff --git a/doc/bashref.texi b/doc/bashref.texi +index d33cd57..6fc4d18 100644 +--- a/doc/bashref.texi ++++ b/doc/bashref.texi +@@ -6453,6 +6453,13 @@ standard. @xref{Bash POSIX Mode}, for a description of the Bash + @item --restricted + Make the shell a restricted shell (@pxref{The Restricted Shell}). + ++@item --rpm-requires ++Produce the list of files that are required for the ++shell script to run. This implies '-n' and is subject ++to the same limitations as compile time error checking checking; ++Command substitutions, Conditional expressions and @command{eval} ++are not parsed so some dependencies may be missed. ++ + @item --verbose + Equivalent to @option{-v}. Print shell input lines as they're read. + +diff --git a/eval.c b/eval.c +index f02d6e4..76c1e8d 100644 +--- a/eval.c ++++ b/eval.c +@@ -142,7 +142,8 @@ reader_loop () + + if (read_command () == 0) + { +- if (interactive_shell == 0 && read_but_dont_execute) ++ ++ if (interactive_shell == 0 && (read_but_dont_execute && !rpm_requires)) + { + last_command_exit_value = EXECUTION_SUCCESS; + dispose_command (global_command); +diff --git a/execute_cmd.c b/execute_cmd.c +index 8b3c83a..4eae19c 100644 +--- a/execute_cmd.c ++++ b/execute_cmd.c +@@ -542,6 +542,8 @@ async_redirect_stdin () + + #define DESCRIBE_PID(pid) do { if (interactive) describe_pid (pid); } while (0) + ++extern int rpm_requires; ++ + /* Execute the command passed in COMMAND, perhaps doing it asynchronously. + COMMAND is exactly what read_command () places into GLOBAL_COMMAND. + ASYNCHROUNOUS, if non-zero, says to do this command in the background. +@@ -573,7 +575,13 @@ execute_command_internal (command, asynchronous, pipe_in, pipe_out, + + if (breaking || continuing) + return (last_command_exit_value); +- if (command == 0 || read_but_dont_execute) ++ if (command == 0 || (read_but_dont_execute && !rpm_requires)) ++ return (EXECUTION_SUCCESS); ++ if (rpm_requires && command->type == cm_function_def) ++ return last_command_exit_value = ++ execute_intern_function (command->value.Function_def->name, ++ command->value.Function_def); ++ if (read_but_dont_execute) + return (EXECUTION_SUCCESS); + + QUIT; +@@ -2819,7 +2827,7 @@ execute_for_command (for_command) + save_line_number = line_number; + if (check_identifier (for_command->name, 1) == 0) + { +- if (posixly_correct && interactive_shell == 0) ++ if (posixly_correct && interactive_shell == 0 && rpm_requires == 0) + { + last_command_exit_value = EX_BADUSAGE; + jump_to_top_level (ERREXIT); +diff --git a/execute_cmd.h b/execute_cmd.h +index dc2f15e..506fff4 100644 +--- a/execute_cmd.h ++++ b/execute_cmd.h +@@ -22,6 +22,9 @@ + #define _EXECUTE_CMD_H_ + + #include "stdc.h" ++#include "variables.h" ++#include "command.h" ++ + + #if defined (ARRAY_VARS) + struct func_array_state +diff --git a/make_cmd.c b/make_cmd.c +index ecbbfd6..3d8bfa4 100644 +--- a/make_cmd.c ++++ b/make_cmd.c +@@ -35,6 +35,8 @@ + #include "bashintl.h" + + #include "shell.h" ++#include "builtins.h" ++#include "builtins/common.h" + #include "execute_cmd.h" + #include "parser.h" + #include "flags.h" +@@ -828,6 +830,30 @@ make_coproc_command (name, command) + return (make_command (cm_coproc, (SIMPLE_COM *)temp)); + } + ++static void ++output_requirement (deptype, filename) ++const char *deptype; ++char *filename; ++{ ++ static char *alphabet_set = "abcdefghijklmnopqrstuvwxyz" ++ "ABCDEFGHIJKLMNOPQRSTUVWXYZ"; ++ ++ if (strchr(filename, '$') || (filename[0] != '/' && strchr(filename, '/'))) ++ return; ++ ++ /* ++ if the executable is called via variable substitution we can ++ not dermine what it is at compile time. ++ ++ if the executable consists only of characters not in the ++ alphabet we do not consider it a dependency just an artifact ++ of shell parsing (ex "exec < ${infile}"). ++ */ ++ ++ if (strpbrk(filename, alphabet_set)) ++ printf ("%s(%s)\n", deptype, filename); ++} ++ + /* Reverse the word list and redirection list in the simple command + has just been parsed. It seems simpler to do this here the one + time then by any other method that I can think of. */ +@@ -845,6 +871,28 @@ clean_simple_command (command) + REVERSE_LIST (command->value.Simple->redirects, REDIRECT *); + } + ++ if (rpm_requires && command->value.Simple->words) ++ { ++ char *cmd0; ++ char *cmd1; ++ struct builtin *b; ++ ++ cmd0 = command->value.Simple->words->word->word; ++ b = builtin_address_internal (cmd0, 0); ++ cmd1 = 0; ++ if (command->value.Simple->words->next) ++ cmd1 = command->value.Simple->words->next->word->word; ++ ++ if (b) { ++ if ( (b->flags & REQUIRES_BUILTIN) && cmd1) ++ output_requirement ("executable", cmd1); ++ } else { ++ if (!assignment(cmd0, 0)) ++ output_requirement (find_function(cmd0) ? "function" : "executable", cmd0); ++ } ++ } /*rpm_requires*/ ++ ++ + parser_state &= ~PST_REDIRLIST; + return (command); + } +diff --git a/shell.c b/shell.c +index a2b2a55..c5d99b3 100644 +--- a/shell.c ++++ b/shell.c +@@ -193,6 +193,9 @@ int have_devfd = 0; + /* The name of the .(shell)rc file. */ + static char *bashrc_file = DEFAULT_BASHRC; + ++/* Non-zero if we are finding the scripts requirements. */ ++int rpm_requires; ++ + /* Non-zero means to act more like the Bourne shell on startup. */ + static int act_like_sh; + +@@ -259,6 +262,7 @@ static const struct { + { "protected", Int, &protected_mode, (char **)0x0 }, + #endif + { "rcfile", Charp, (int *)0x0, &bashrc_file }, ++ { "rpm-requires", Int, &rpm_requires, (char **)0x0 }, + #if defined (RESTRICTED_SHELL) + { "restricted", Int, &restricted, (char **)0x0 }, + #endif +@@ -496,6 +500,12 @@ main (argc, argv, env) + if (dump_translatable_strings) + read_but_dont_execute = 1; + ++ if (rpm_requires) ++ { ++ read_but_dont_execute = 1; ++ initialize_shell_builtins (); ++ } ++ + if (running_setuid && privileged_mode == 0) + disable_priv_mode (); + +diff --git a/shell.h b/shell.h +index 8072605..6c4149d 100644 +--- a/shell.h ++++ b/shell.h +@@ -99,6 +99,7 @@ extern int interactive, interactive_shell; + extern int startup_state; + extern int reading_shell_script; + extern int shell_initialized; ++extern int rpm_requires; + extern int bash_argv_initialized; + extern int subshell_environment; + extern int current_command_number; diff --git a/bash-setlocale.patch b/bash-setlocale.patch new file mode 100644 index 0000000..f068ec7 --- /dev/null +++ b/bash-setlocale.patch @@ -0,0 +1,10 @@ +--- bash-3.0/builtins/setattr.def.setlocale 2005-08-08 12:22:42.000000000 +0100 ++++ bash-3.0/builtins/setattr.def 2005-08-08 12:25:16.000000000 +0100 +@@ -423,4 +423,7 @@ + + if (var && (exported_p (var) || (attribute & att_exported))) + array_needs_making++; /* XXX */ ++ ++ if (var) ++ stupidly_hack_special_variables (name); + } diff --git a/bash-tty-tests.patch b/bash-tty-tests.patch new file mode 100644 index 0000000..f9b6532 --- /dev/null +++ b/bash-tty-tests.patch @@ -0,0 +1,61 @@ +diff --git a/tests/exec.right b/tests/exec.right +index 6075cc8..0b3f02c 100644 +--- a/tests/exec.right ++++ b/tests/exec.right +@@ -51,7 +51,6 @@ this is ohio-state + 0 + 1 + testb +-expand_aliases on + 1 + 1 + 1 +diff --git a/tests/execscript b/tests/execscript +index c1819de..9227a4a 100644 +--- a/tests/execscript ++++ b/tests/execscript +@@ -108,8 +108,6 @@ ${THIS_SH} ./exec6.sub + # checks for properly deciding what constitutes an executable file + ${THIS_SH} ./exec7.sub + +-${THIS_SH} -i ${PWD}/exec8.sub +- + ${THIS_SH} ./exec9.sub + + ${THIS_SH} ./exec10.sub +diff --git a/tests/read.right b/tests/read.right +index 73cb704..a92fe7f 100644 +--- a/tests/read.right ++++ b/tests/read.right +@@ -33,14 +33,6 @@ a = abcdefg + a = xyz + a = -xyz 123- + a = abc +-timeout 1: ok +- +-timeout 2: ok +- +-./read2.sub: line 23: read: -3: invalid timeout specification +-1 +- +-abcde + ./read3.sub: line 4: read: -1: invalid number + abc + ab +diff --git a/tests/read.tests b/tests/read.tests +index f67cd00..083f4a4 100644 +--- a/tests/read.tests ++++ b/tests/read.tests +@@ -82,9 +82,6 @@ echo " foo" | { IFS=$':' ; read line; recho "$line"; } + # test read -d delim behavior + ${THIS_SH} ./read1.sub + +-# test read -t timeout behavior +-${THIS_SH} ./read2.sub +- + # test read -n nchars behavior + ${THIS_SH} ./read3.sub + +-- +2.17.2 + diff --git a/bash.spec b/bash.spec new file mode 100644 index 0000000..0fb39cc --- /dev/null +++ b/bash.spec @@ -0,0 +1,1691 @@ +#% define beta_tag rc2 +%define patchleveltag .17 +%define baseversion 5.0 +%bcond_without tests + +Version: %{baseversion}%{patchleveltag} +Name: bash +Summary: The GNU Bourne Again shell +Release: 2%{?dist} +License: GPLv3+ +Url: https://www.gnu.org/software/bash +Source0: https://ftp.gnu.org/gnu/bash/bash-%{baseversion}.tar.gz + +# For now there isn't any doc +#Source2: ftp://ftp.gnu.org/gnu/bash/bash-doc-%%{version}.tar.gz + +Source1: dot-bashrc +Source2: dot-bash_profile +Source3: dot-bash_logout + +# Official upstream patches +# Patches are converted to apply with '-p1' +%{lua:for i=1,17 do print(string.format("Patch%u: bash-5.0-patch-%u.patch\n", i, i)) end} + +# Other patches +# We don't want to add '/etc:/usr/etc' in standard utils path. +Patch101: bash-2.03-paths.patch +# Non-interactive shells beginning with argv[0][0] == '-' should run the startup files when not in posix mode. +Patch102: bash-2.03-profile.patch +# https://bugzilla.redhat.com/show_bug.cgi?id=60870 +Patch103: bash-2.05a-interpreter.patch +# Generate info for debuginfo files. +Patch104: bash-2.05b-debuginfo.patch +# Pid passed to setpgrp() can not be pid of a zombie process. +Patch105: bash-2.05b-pgrp_sync.patch +# Enable audit logs +Patch106: bash-3.2-audit.patch +# Source bashrc file when bash is run under ssh. +Patch107: bash-3.2-ssh_source_bash.patch +# Use makeinfo to generate .texi file +Patch108: bash-infotags.patch +# Try to pick up latest `--rpm-requires` patch from http://git.altlinux.org/gears/b/bash4.git +Patch109: bash-requires.patch +Patch110: bash-setlocale.patch +# Disable tty tests while doing bash builds +Patch111: bash-tty-tests.patch + +# 484809, check if interp section is NOBITS +Patch116: bash-4.0-nobits.patch + +# Do the same CFLAGS in generated Makefile in examples +Patch117: bash-4.1-examples.patch + +# Builtins like echo and printf won't report errors +# when output does not succeed due to EPIPE +Patch118: bash-4.1-broken_pipe.patch + +# # Enable system-wide .bash_logout for login shells +Patch119: bash-4.2-rc2-logout.patch +# +# Static analyzis shows some issues in bash-2.05a-interpreter.patch +Patch120: bash-4.2-coverity.patch + +# 799958, updated info about trap +# This patch should be upstreamed. +Patch122: bash-4.2-manpage_trap.patch + +# https://www.securecoding.cert.org/confluence/display/seccode/INT32-C.+Ensure+that+operations+on+signed+integers+do+not+result+in+overflow +# This patch should be upstreamed. +Patch123: bash-4.2-size_type.patch +# +# 1112710 - mention ulimit -c and -f POSIX block size +# This patch should be upstreamed. +Patch124: bash-4.3-man-ulimit.patch +# +# 1102815 - fix double echoes in vi visual mode +Patch125: bash-4.3-noecho.patch +# +# #1241533,1224855 - bash leaks memory when LC_ALL set +Patch126: bash-4.3-memleak-lc_all.patch +# +# bash-4.4 builds loadable builtin examples by default +# this patch disables it +Patch127: bash-4.4-no-loadable-builtins.patch + +BuildRequires: gcc +BuildRequires: texinfo bison +BuildRequires: ncurses-devel +BuildRequires: autoconf, gettext +# Required for bash tests +BuildRequires: glibc-all-langpacks +Requires: filesystem >= 3 +Provides: /bin/sh +Provides: /bin/bash + +%description +The GNU Bourne Again shell (Bash) is a shell or command language +interpreter that is compatible with the Bourne shell (sh). Bash +incorporates useful features from the Korn shell (ksh) and the C shell +(csh). Most sh scripts can be run by bash without modification. + +%package devel +Summary: Development headers for %{name} +Requires: %{name}%{?_isa} = %{version}-%{release} + +%description devel +This package contains development headers for %{name}. + +%package doc +Summary: Documentation files for %{name} +Requires: %{name} = %{version}-%{release} + +%description doc +This package contains documentation files for %{name}. + +%prep +%autosetup -n %{name}-%{baseversion} -p1 + +echo %{version} > _distribution +echo %{release} > _patchlevel + +# force refreshing the generated files +rm y.tab.* + +%build +autoconf +%configure --with-bash-malloc=no --with-afs + +# Recycles pids is neccessary. When bash's last fork's pid was X +# and new fork's pid is also X, bash has to wait for this same pid. +# Without Recycles pids bash will not wait. +make "CPPFLAGS=-D_GNU_SOURCE -DRECYCLES_PIDS -DDEFAULT_PATH_VALUE='\"/usr/local/bin:/usr/bin\"' `getconf LFS_CFLAGS`" %{?_smp_mflags} + +%install +if [ -e autoconf ]; then + # Yuck. We're using autoconf 2.1x. + export PATH=.:$PATH +fi + +# Fix bug #83776 +sed -i -e 's,bashref\.info,bash.info,' doc/bashref.info + +%make_install install-headers + +mkdir -p %{buildroot}/%{_sysconfdir} + +# make manpages for bash builtins as per suggestion in DOC/README +pushd doc +sed -e ' +/^\.SH NAME/, /\\- bash built-in commands, see \\fBbash\\fR(1)$/{ +/^\.SH NAME/d +s/^bash, // +s/\\- bash built-in commands, see \\fBbash\\fR(1)$// +s/,//g +b +} +d +' builtins.1 > man.pages +for i in echo pwd test kill; do + sed -i -e "s,$i,,g" man.pages + sed -i -e "s, , ,g" man.pages +done + +install -p -m 644 builtins.1 %{buildroot}%{_mandir}/man1/builtins.1 + +for i in `cat man.pages` ; do + echo .so man1/builtins.1 > %{buildroot}%{_mandir}/man1/$i.1 + chmod 0644 %{buildroot}%{_mandir}/man1/$i.1 +done +popd + +# Link bash man page to sh so that man sh works. +ln -s bash.1 %{buildroot}%{_mandir}/man1/sh.1 + +# Not for printf, true and false (conflict with coreutils) +rm -f %{buildroot}/%{_mandir}/man1/printf.1 +rm -f %{buildroot}/%{_mandir}/man1/true.1 +rm -f %{buildroot}/%{_mandir}/man1/false.1 + +ln -sf bash %{buildroot}%{_bindir}/sh +rm -f %{buildroot}%{_infodir}/dir +mkdir -p %{buildroot}%{_sysconfdir}/skel +install -p -m644 %SOURCE1 %{buildroot}/etc/skel/.bashrc +install -p -m644 %SOURCE2 %{buildroot}/etc/skel/.bash_profile +install -p -m644 %SOURCE3 %{buildroot}/etc/skel/.bash_logout +LONG_BIT=$(getconf LONG_BIT) +mv %{buildroot}%{_bindir}/bashbug \ + %{buildroot}%{_bindir}/bashbug-"${LONG_BIT}" +ln -s bashbug-"${LONG_BIT}" %{buildroot}%{_bindir}/bashbug +ln -s bashbug.1 %{buildroot}/%{_mandir}/man1/bashbug-"$LONG_BIT".1 + +# Fix missing sh-bangs in example scripts (bug #225609). +for script in \ + examples/scripts/shprompt +# I don't know why these are gone in 4.3 + #examples/scripts/krand.bash \ + #examples/scripts/bcsh.sh \ + #examples/scripts/precedence \ +do + cp "$script" "$script"-orig + echo '#!/bin/bash' > "$script" + cat "$script"-orig >> "$script" + rm -f "$script"-orig +done + +# bug #820192, need to add execable alternatives for regular built-ins +for ea in alias bg cd command fc fg getopts hash jobs read type ulimit umask unalias wait +do + cat < "%{buildroot}"/%{_bindir}/"$ea" +#!/bin/sh +builtin $ea "\$@" +EOF +chmod +x "%{buildroot}"/%{_bindir}/"$ea" +done + +%find_lang %{name} + +# copy doc to /usr/share/doc +cat /dev/null > %{name}-doc.files +mkdir -p %{buildroot}/%{_pkgdocdir}/doc +# loadables aren't buildable +rm -rf examples/loadables +for file in CHANGES COMPAT NEWS NOTES POSIX RBASH README examples +do + cp -rp "$file" %{buildroot}%{_pkgdocdir}/"$file" + echo "%%doc %{_pkgdocdir}/$file" >> %{name}-doc.files +done +echo "%%doc %{_pkgdocdir}/doc" >> %{name}-doc.files + + + +%if %{with tests} +%check +make check +%endif + +# post is in lua so that we can run it without any external deps. Helps +# for bootstrapping a new install. +# Jesse Keating 2009-01-29 (code from Ignacio Vazquez-Abrams) +# Roman Rakus 2011-11-07 (code from Sergey Romanov) #740611 +%post -p +nl = '\n' +sh = '/bin/sh'..nl +bash = '/bin/bash'..nl +f = io.open('/etc/shells', 'a+') +if f then + local shells = nl..f:read('*all')..nl + if not shells:find(nl..sh) then f:write(sh) end + if not shells:find(nl..bash) then f:write(bash) end + f:close() +end + +%postun -p +-- Run it only if we are uninstalling +if arg[2] == "0" +then + t={} + for line in io.lines("/etc/shells") + do + if line ~= "/bin/bash" and line ~= "/bin/sh" + then + table.insert(t,line) + end + end + + f = io.open("/etc/shells", "w+") + for n,line in pairs(t) + do + f:write(line.."\n") + end + f:close() +end + +%files -f %{name}.lang +%config(noreplace) /etc/skel/.b* +%{_bindir}/sh +%{_bindir}/bash +%{_bindir}/alias +%{_bindir}/bg +%{_bindir}/cd +%{_bindir}/command +%{_bindir}/fc +%{_bindir}/fg +%{_bindir}/hash +%{_bindir}/getopts +%{_bindir}/jobs +%{_bindir}/read +%{_bindir}/type +%{_bindir}/ulimit +%{_bindir}/umask +%{_bindir}/unalias +%{_bindir}/wait +%dir %{_pkgdocdir}/ +%license COPYING +%attr(0755,root,root) %{_bindir}/bashbug[-.]* +%{_bindir}/bashbug +%{_infodir}/bash.info* +%{_mandir}/*/* +%{_mandir}/*/..1* +%doc RBASH README +%doc doc/{FAQ,INTRO,README,bash{,ref}.html} + +%files doc -f %{name}-doc.files +%doc doc/*.ps doc/*.0 doc/*.html doc/article.txt + +%files devel +%{_includedir}/%{name} +%{_libdir}/pkgconfig/%{name}.pc + +%changelog +* Mon Jul 27 2020 Fedora Release Engineering - 5.0.17-2 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_33_Mass_Rebuild + +* Mon Jun 01 2020 Siteshwar Vashisht - 5.0.17-1 +- Update to bash-5.0 patchlevel 17 + +* Tue Jan 28 2020 Fedora Release Engineering - 5.0.11-2 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild + +* Fri Dec 06 2019 Siteshwar Vashisht - 5.0.11-1 +- Update to bash-5.0 patchlevel 11 + Resolves: #1745602 + +* Fri Aug 02 2019 Kamil Dudka - 5.0.7-3 +- Sanitize public header file + Resolves: #1736676 + +* Wed Jul 24 2019 Fedora Release Engineering - 5.0.7-2 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild + +* Tue May 07 2019 Siteshwar Vashisht - 5.0.7-1 +- Update to bash-5.0 patchlevel 7 + +* Thu Feb 14 2019 Siteshwar Vashisht - 5.0.2-1 +- Rebase to bash 5.0 + Resolves: #1675080 + +* Thu Jan 31 2019 Fedora Release Engineering - 4.4.23-7 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild + +* Thu Jan 10 2019 Siteshwar Vashisht - 4.4.23-6 +- Avoid duplicating user path entries + Resolves: #1652639 + +* Mon Oct 08 2018 Siteshwar Vashisht - 4.4.23-5 +- Fix some issues identified by coverity + +* Mon Sep 10 2018 Siteshwar Vashisht - 4.4.23-4 +- Set custom PATH in non-login shells + Resolves: #1615131 + +* Thu Jul 12 2018 Fedora Release Engineering - 4.4.23-3 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild + +* Mon Jun 25 2018 Miro Hrončok - 4.4.23-2 +- Move user bin directories in front of the PATH + See: https://fedoraproject.org/wiki/Changes/UserPathPrioritization + Resolves: #1595098 + +* Tue Jun 12 2018 Siteshwar Vashisht - 4.4.23-1 +- Update to bash-4.4 patchlevel 23 + Resolves: #1585510 + +* Thu Mar 15 2018 Siteshwar Vashisht - 4.4.19-2 +- Fix handling case statement in command subsitution + Resolves: #1556867 + +* Mon Feb 12 2018 Siteshwar Vashisht - 4.4.19-1 +- Update to bash-4.4 patchlevel 19 + Resolves: #1540383 + +* Wed Feb 07 2018 Fedora Release Engineering - 4.4.12-14 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild + +* Wed Nov 08 2017 Christoph Junghans - 4.4.12-13 +- Package headers in devel package, in prep for MPI-bash + +* Mon Oct 30 2017 Siteshwar Vashisht - 4.4.12-12 +- Revert change to always source from /etc/bashrc + +* Tue Aug 29 2017 Siteshwar Vashisht - 4.4.12-11 +- Always source from /etc/bashrc + Resolves: #1193590 + +* Tue Aug 22 2017 Siteshwar Vashisht - 4.4.12-10 +- Enable parallel builds + +* Tue Aug 08 2017 Siteshwar Vashisht - 4.4.12-9 +- command should not be treated as special builtin + Resolves: #1479220 + +* Wed Aug 02 2017 Fedora Release Engineering - 4.4.12-8 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Binutils_Mass_Rebuild + +* Wed Jul 26 2017 Fedora Release Engineering - 4.4.12-7 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Mass_Rebuild + +* Fri Jun 30 2017 Siteshwar Vashisht - 4.4.12-6 +- Fix test for comparing file modification times when they differ by subsecond + Resolves: #1458008 + +* Tue May 30 2017 Siteshwar Vashisht - 4.4.12-5 +- command builtin should not abort on variable assignment errors + Resolves: #1389838 + +* Wed Apr 26 2017 Siteshwar Vashisht - 4.4.12-4 +- Explicitly unset nonblocking mode while reading from stdin + Resolves: #1068697 + +* Wed Apr 26 2017 Siteshwar Vashisht - 4.4.12-3 +- Fix heredoc file descriptor leak + Resolves: #1413676 + +* Tue Apr 18 2017 Siteshwar Vashisht - 4.4.12-2 +- Document 'bashbug' for reporting bugs + Resolves: #1255886 + +* Mon Apr 10 2017 Siteshwar Vashisht - 4.4.12-1 +- Update to bash-4.4 patchlevel 12 + +* Fri Feb 10 2017 Fedora Release Engineering - 4.4.11-2 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_26_Mass_Rebuild + +* Sat Jan 21 2017 Siteshwar Vashisht - 4.4.11-1 +- Update to bash-4.4 patchlevel 11 + +* Mon Jan 16 2017 Siteshwar Vashisht - 4.4.5-1 +- Update to bash-4.4 patchlevel 5 + +* Fri Jan 06 2017 Siteshwar Vashisht - 4.4.0-1 +- Rebase to bash-4.4 + Resolves: #1376609 + +* Fri Sep 30 2016 Siteshwar Vashisht - 4.3.43-4 +- CVE-2016-7543: Fix for arbitrary code execution via SHELLOPTS+PS4 variables + Resolves: #1379634 + +* Wed Sep 21 2016 David Kaspar [Dee'Kej] - 4.3.43-3 +- CVE-2016-0634 - Fix for arbitrary code execution via malicious hostname + Resolves: #1377614 + +* Tue Sep 6 2016 David Kaspar [Dee'Kej] - 4.3.43-2 +- Inverted the condition for UsrMove safeguard check, so we comply with: + https://fedoraproject.org/wiki/Packaging:Conflicts + +* Thu Jun 23 2016 Siteshwar Vashisht - 4.3.43-1 +- Fix a crash in nested pipeline in lastpipe mode + Resolves: #1349430 + +* Tue May 17 2016 Siteshwar Vashisht - 4.3.42-5 +- Do not set terminate_immediately and interrupt_immediately while expanding tilda + Resolves: #1336800 + +* Wed Feb 03 2016 Fedora Release Engineering - 4.3.42-4 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_24_Mass_Rebuild + +* Mon Jan 11 2016 Ondrej Oprala - 4.3.42-3 +- Actually do it properly this time + Related: #1297166 + +* Mon Jan 11 2016 Ondrej Oprala - 4.3.42-2 +- Provide exec-able alternatives to hash, type and ulimit + Resolves: #1297166 + +* Tue Aug 18 2015 Ondrej Oprala - 4.3.42-1 +- Patchlevel 42 + +* Mon Aug 03 2015 Ondrej Oprala - 4.3.39-6 +- #1245233 - fixed memleak + +* Wed Jul 15 2015 Ondrej Oprala - 4.3.39-5 +- #1182278 - bash crashes on `select' if REPLY is readonly +- #1241533,1224855 - bash memleak when LC_ALL set + +* Tue Jun 30 2015 Ondrej Oprala - 4.3.39-4 +- Fix a leak introduced by plevel39 + +* Tue Jun 30 2015 Ondrej Oprala - 4.3.39-3 +- Fix --rpm-requires + +* Wed Jun 17 2015 Fedora Release Engineering - 4.3.39-2 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_23_Mass_Rebuild + +* Thu May 21 2015 Ondrej Oprala - 4.3.39-1 +- Patchlevel 39 + +* Mon Mar 16 2015 Than Ngo 4.3.33-3 +- rebuild against new gcc + +* Fri Jan 23 2015 Elad Alfassa - 4.3.25-3 +- Enable PIE (hardened build) + +* Tue Dec 30 2014 Ondrej Oprala - 4.3.33-1 +- Patchlevel 33 + +* Wed Oct 08 2014 Dan Horák - 4.3.30-2 +- force refreshing generated files, fixes build on s390 + +* Mon Oct 06 2014 Ondrej Oprala - 4.3.30-1 +- Patchlevel 30 + +* Mon Oct 06 2014 Ondrej Oprala - 4.3.28-1 +- RedHat's patchlevel 28 + +* Thu Sep 25 2014 Ondrej Oprala - 4.3.25-2 +- CVE-2014-7169 + Resolves: #1146319 ++ +* Thu Sep 25 2014 Ondrej Oprala - 4.3.25-1 +- Patchlevel 25 + +* Wed Sep 24 2014 Ondrej Oprala - 4.3.24-2 +- Inhibit code injection - patch by Stephane Chazelas + +* Wed Aug 20 2014 Ondrej Oprala - 4.3.24-1 +- Patchlevel 24 + +* Fri Aug 15 2014 Fedora Release Engineering - 4.3.22-2 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild + +* Mon Aug 04 2014 Ondrej Oprala - 4.3.22-1 +- Patchlevel 22 + +* Wed Jul 30 2014 Ondrej Oprala - 4.3.18-7 +- #1102815 - fix double echo in vi visual mode + +* Thu Jul 24 2014 Ondrej Oprala - 4.3.18-6 +- Apply all upstream patches since 4.3-18-1 up to this date + +* Thu Jul 24 2014 Ondrej Oprala - 4.3.18-5 +- Array name expansion - apply upstream quickfix + +* Mon Jul 21 2014 Ondrej Oprala - 4.3.18-4 +- Mention ulimit -c and -f block size in POSIX mode + +* Fri Jul 11 2014 Tom Callaway - 4.3.18-3 +- fix license handling + +* Sat Jun 07 2014 Fedora Release Engineering - 4.3.18-2 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild + +* Mon Apr 14 2014 Ondrej Oprala - 4.3.18-1 +- Patchlevel 18 + +* Mon Apr 14 2014 Ondrej Oprala - 4.3.11-2 +- And let the build system know... + +* Mon Apr 14 2014 Ondrej Oprala - 4.3.11-1 +- Patchlevel 11 + +* Tue Apr 01 2014 Ondrej Oprala - 4.3.8-1 +- Patchlevel 8 + +* Thu Feb 27 2014 Ondrej Oprala - 4.3.0-1 +- Update to bash-4.3 + +* Wed Dec 04 2013 Ondrej Oprala - 4.2.45-6 +- Change the paths for format-security patch + +* Wed Dec 04 2013 Ondrej Oprala - 4.2.45-5 +- bash FTBFS if -Werror=format-string is used (#1036998) + +* Fri Aug 09 2013 Roman Rakus - 4.2.45-4 +- Added suggestion to .bashrc how to disable autopaging in systemctl + +* Fri Jul 26 2013 Ville Skyttä - 4.2.45-3 +- Install docs to %%{_pkgdocdir} where available. +- Fix bogus dates in %%changelog. + +* Thu Jun 27 2013 Roman Rakus - 4.2.45-2 +- Fixed a bug that caused trap handlers to be executed recursively, + corrupting internal data structures. + +* Mon Mar 11 2013 Roman Rakus - 4.2.45-1 +- Patchlevel 45 + +* Thu Jan 31 2013 Roman Rakus - 4.2.42-3 +- Fix usage of partial unitialized structure + Resolves: #857948 + +* Thu Jan 31 2013 Roman Rakus - 4.2.42-2 +- Fix fd leaks + Resolves: #903833 + +* Thu Jan 03 2013 Roman Rakus - 4.2.42-1 +- Patchlevel 42 + +* Thu Nov 29 2012 Roman Rakus - 4.2.39-3 +- Use unsigned type for size + +* Tue Nov 27 2012 Roman Rakus - 4.2.39-2 +- Create bashbug symlink + +* Fri Nov 02 2012 Roman Rakus - 4.2.39-1 +- Patchlevel 39 + +* Tue Aug 28 2012 Roman Rakus - 4.2.37-8 +- Fix a comments in rpm changelog + +* Tue Aug 28 2012 Roman Rakus - 4.2.37-7 +- Update info about trap in man page + Resolves: #799958 +- instead of setting the signal handler to SIG_IGN while installing + the new trap handler, block the signal and unblock it after the new handler + is installed + Resolves: #695656 + +* Wed Aug 22 2012 Ondrej Oprala - 4.2.37-6 +- Revert revision 4.2.37-5 - already fixed upstream + +* Tue Aug 21 2012 Ondrej Oprala - 4.2.37-5 +- Don't filter out environmental variables with + a dot in the name + Resolves: #819995 + +* Wed Aug 08 2012 Roman Rakus - 4.2.37-4 +- Added doc subdir to bash-doc ownership list + Resolves: #846734 + +* Tue Jul 24 2012 Roman Rakus - 4.2.37-3 +- Increment patchlevel tag + +* Tue Jul 24 2012 Roman Rakus - 4.2.36-3 +- Patchlevel 37 + +* Wed Jul 18 2012 Fedora Release Engineering - 4.2.36-2 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild + +* Tue Jul 10 2012 Roman Rakus - 4.2.36-1 +- Patchlevel 36 + +* Sat Jun 23 2012 Roman Rakus - 4.2.29-3 +- Remove /bin from DEFAULT_PATH_VALUE + Resolves: #834571 + +* Thu May 31 2012 Roman Rakus - 4.2.29-2 +- Patchlevel 29 +- Also keep release at -2, so we are newer then f16 and f17 + +* Tue May 29 2012 Roman Rakus - 4.2.28-2 +- Provide exec-able alternatives to some builtins + Resolves #820192 + +* Wed May 09 2012 Roman Rakus - 4.2.28-1 +- Patchlevel 28 + +* Mon Apr 23 2012 Roman Rakus - 4.2.24-2 +- Don't call malloc in signal handler + +* Tue Mar 13 2012 Roman Rakus - 4.2.24-1 +- Patchlevel 24 + +* Wed Jan 25 2012 Harald Hoyer 4.2.20-4 +- install everything in /usr + https://fedoraproject.org/wiki/Features/UsrMove + +* Thu Jan 12 2012 Fedora Release Engineering - 4.2.20-3 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_17_Mass_Rebuild + +* Thu Nov 24 2011 Roman Rakus - 4.2.20-2 +- Add missing f:close() in postun +- Patchlevel 20 + +* Thu Nov 10 2011 Roman Rakus - 4.2.10-7 +- erase /bin/bash and /bin/sh in postun only if we are uninstalling (#752827) + +* Mon Nov 07 2011 Roman Rakus - 4.2.10-6 +- Simplified lua post script (#740611) + +* Fri Jul 29 2011 Roman Rakus - 4.2.10-5 +- Clean up unneeded bash-doc files (Ville Skyttä) (#721116) + +* Wed Jun 22 2011 Roman Rakus - 4.2.10-4 +- Don't crash when use `read' with associative array (#715050) + +* Tue Jun 07 2011 Roman Rakus - 4.2.10-3 +- Added $HOME/.local/bin to PATH in .bash_profile (#699812) + +* Thu May 05 2011 Roman Rakus - 4.2.10-2 +- Inc. a release no. + +* Thu May 05 2011 Roman Rakus - 4.2.10-1 +- Patchlevel 10 + +* Thu Mar 31 2011 Roman Rakus - 4.2.8-2 +- Remove bash-4.2-xdupmbstowcs2-patch, which introduced another bugs + +* Tue Mar 15 2011 Roman Rakus - 4.2.8-1 +- Patchlevel 8 + +* Tue Mar 15 2011 Roman Rakus - 4.2.7-3 +- #684293, fix the infinite loop with invalid wide char + +* Mon Mar 14 2011 Roman Rakus - 4.2.7-2 +- Use lua script in postun + +* Mon Mar 07 2011 Roman Rakus - 4.2.7-1 +- Patchlevel 7 + +* Wed Mar 02 2011 Roman Rakus - 4.2.6-1 +- Patchlevel 6 + +* Tue Mar 01 2011 Roman Rakus - 4.2.5-1 +- Patchlevel 5 +- Static analyzis show some issues in some patches +- Some cleanup + +* Wed Feb 16 2011 Roman Rakus - 4.2.0-2 +- pattern matching glitch, patch from upstream + +* Wed Feb 16 2011 Roman Rakus - 4.2.0-1 +- Release bash-4.2 + +* Mon Feb 14 2011 Roman Rakus - 4.2.0-0.2.rc2 +- Enable system-wide .bash_logout for login shells + +* Wed Feb 09 2011 Roman Rakus - 4.2.0-0.1.rc2 +- Update to bash-4.2-rc2 + +* Mon Feb 07 2011 Fedora Release Engineering - 4.1.9-6 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild + +* Thu Jan 06 2011 Roman Rakus - 4.1.9-5 +- Builtins like echo and printf won't report errors + when output does not succeed due to EPIPE + +* Thu Dec 16 2010 Roman Rakus - 4.1.9-4 +- Drop doc/examples/loadables + +* Wed Dec 01 2010 Roman Rakus - 4.1.9-3 +- don't segfault when trying to bind int variable to array + with bad array subsrcipt + Resolves: #618289 + +* Fri Oct 15 2010 Ville Skyttä - 4.1.9-2 +- Move doc dir ownership to main package. +- Preserve doc timestamps. +- Add --without tests option for building without running the test suite. + +* Thu Oct 14 2010 Roman Rakus - 4.1.9-1 +- Patch level 9 + +* Mon Aug 02 2010 Roman Rakus - 4.1.7-4 +- Use better nomenclature for --rpm-requires bash option (#557134) + +* Tue Jun 22 2010 Roman Rakus - 4.1.7-3 +- Added missing patch + +* Tue Jun 22 2010 Roman Rakus - 4.1.7-2 +- Do the same CFLAGS in generated Makefile in examples + +* Fri May 21 2010 Roman Rakus - 4.1.7-1 +- Patch level 7 + +* Mon Apr 12 2010 Roman Rakus - 4.1.5-1 +- Patch level 5 +- There's no more need for Requires(post) ncurses-libs + +* Tue Mar 30 2010 Roman Rakus - 4.1.2-4 +- Corrected requires patch (#563301) + +* Fri Jan 22 2010 rrakus@redhat.com 4.1.2-3 +- Don't use cond-rmatch patch +- Use manso patch +- Include COPYING in base bash rpm + +* Fri Jan 22 2010 rrakus@redhat.com 4.1.2-2 +- Correct patchlevel 2 + +* Fri Jan 22 2010 Roman Rakus rrakus@redhat.com 4.1.2-1 +- Patchlevel 4.2 +- Removed old patch +- Returned back manso patch + +* Fri Jan 08 2010 Roman Rakus rrakus@redhat.com 4.1.0-2 +- Include COPYING in doc dir + +* Mon Jan 04 2010 Roman Rakus - 4.1.0-1 +- Upstream 4.1 + +* Sun Dec 27 2009 Roman Rakus - 4.1-0.2.rc1 +- Fixed patch for fuzz=0 + +* Sun Dec 27 2009 Roman Rakus - 4.1-0.1.rc1 +- Upstream 4.1.rc1 + +* Fri Dec 11 2009 Roman Rakus - 4.0.35-2 +- Don't segfault when TERM=eterm* and EMACS is unset (#530911) + +* Thu Oct 29 2009 Roman Rakus - 4.0.35-1 +- Patch level 35 + +* Mon Oct 05 2009 Roman Rakus - 4.0.33-2 +- Make symlink from bashbug-suffix to bashbug man pages + +* Wed Sep 16 2009 Roman Rakus - 4.0.33-1 +- Patch level 33 +- spec file cleanup + +* Fri Sep 04 2009 Roman Rakus - 4.0.28-3 +- check if interp section is NOBITS +- define Recycles pids + +* Wed Aug 26 2009 Roman Rakus - 4.0.28-2 +- alloc memory for key in creation associative array (#518644) + +* Tue Jul 28 2009 Roman Rakus - 4.0.28-1 +- Upstream patch level 28 + +* Fri Jul 24 2009 Fedora Release Engineering - 4.0.24-2 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild + +* Tue May 19 2009 Roman Rakus - 4.0.24-1 +- Upstream patch level 24 + +* Wed Apr 22 2009 Roman Rakus - 4.0.16-1 +- better to use patch level in version tag like vim do + +* Tue Apr 21 2009 Roman Rakus - 4.0-7.16 +- Use patch level in Release tag + +* Wed Apr 08 2009 Roman Rakus - 4.0-6 +- Official upstream patch level 16 + +* Mon Mar 30 2009 Roman Rakus - 4.0-5 +- Split documentation, use bash-doc package + Resolves: #492447 + +* Sat Mar 21 2009 Lubomir Rintel - 4.0-4 +- Add full URLs to upstream patches +- Don't uselessly use %%version macro + +* Wed Mar 11 2009 Roman Rakus - 4.0-3 +- Official upstream patch level 10 + +* Wed Feb 25 2009 Roman Rakus - 4.0-2 +- Save parser state in pcomplete. + Resolves: #487257 + +* Tue Feb 24 2009 Roman Rakus - 4.0-1 +- Release of bash-4.0 + +* Mon Feb 23 2009 Fedora Release Engineering - 4.0-0.5.rc1 +- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild + +* Wed Feb 11 2009 Roman Rakus - 4.0-0.4.rc1 +- Fix handling pipelines with `set -e' + Resolves: #483385 + +* Thu Jan 29 2009 Roman Rakus - 4.0-0.3.rc1 +- No more debug output + Resolves: #483002 + +* Wed Jan 28 2009 Jesse Keating - 4.0-0.2.rc1 +- Replace post code with lua to be able to not have external deps + +* Mon Jan 26 2009 Roman Rakus - 4.0-0.1.rc1 +- Fixed release tag + +* Wed Jan 21 2009 Roman Rakus - 4.0-rc1.1 +- Bump to upstream bash-4.0-rc1 + +* Mon Dec 15 2008 Roman Rakus - 3.2-33 +- fc builtin fix + Resolves: #438841 + +* Mon Dec 15 2008 Roman Rakus - 3.2-32 +- Enabling auditing + Resolves: #476216 + +* Tue Dec 09 2008 Roman Rakus - 3.2-31 +- Patchlevel 48 + +* Thu Dec 04 2008 Roman Rakus - 3.2-30 +- Added check for `command_not_found_handler' shell function + Resolves: #432579 + +* Tue Oct 28 2008 Jesse Keating - 3.2-29 +- Add the Requires(post) back for ncurses-libs, so that rpm knows + where to break the loop. The post actually does require the curses + libs for the sh calls. Could consider doing this in LUA and not have + any external deps. + +* Thu Oct 23 2008 Roman Rakus - 3.2-28 +- Removing Requires for mktemp and ncurses, which cause + dependencing loop +- Enabling #define SSH_SOURCE_BASHRC, because ssh changed. + Resolves: #458839 +- Catch signals right after calling execve() + Resolves: #455548 + +* Thu Jul 17 2008 Roman Rakus - 3.2-27 +- Changes in man page - #442018, #445692, #446625, #453409 +- Changed patches to satisfy fuzz=0 + +* Thu Jun 5 2008 Roman Rakus - 3.2-26 +- Patchlevel 39 + +* Tue Jun 3 2008 Roman Rakus - 3.2-25 +- #449512 - reverting back last change - don't use glob library + +* Wed May 28 2008 Roman Rakus - 3.2-24 +- #217359 - use posix glob library + +* Thu May 22 2008 Roman Rakus - 3.2-23 +- #446420 - COMP_WORDBREAKS settings now works + +* Fri Feb 29 2008 Tomas Janousek - 3.2-22 +- drop /usr/bin/clear from /etc/skel/.bash_logout as suggested by #429406 + +* Wed Feb 20 2008 Fedora Release Engineering - 3.2-21 +- Autorebuild for GCC 4.3 + +* Mon Jan 14 2008 Tomas Janousek - 3.2-20 +- Added bash32-026 upstream official patch +- Added bash32-027 upstream official patch (#249987) +- Added bash32-028 upstream official patch +- Added bash32-029 upstream official patch (#286861) +- Added bash32-030 upstream official patch +- Added bash32-031 upstream official patch (#358231) +- Added bash32-032 upstream official patch +- Added bash32-033 upstream official patch +- Fix insert command repeating in vi mode (#190350) + +* Tue Nov 06 2007 Tomas Janousek - 3.2-19 +- fix cursor position when prompt has one invisible character (#358231) +- dropped examples/loadables/ from docs, since it wasn't possible to build them + anyway (#174380) +- fix #286861: Wrong input confuses bash's arithmetic unit permanently +- fix #344411: $RANDOM stays the same when job executed in the background + +* Fri Aug 31 2007 Pete Graner - 3.2-18 +- Added bash32-021 upstream official patch +- Added bash32-025 upstream official patch +- Added bash32-024 upstream official patch +- Added bash32-023 upstream official patch +- Added bash32-022 upstream official patch + +* Wed Aug 29 2007 Pete Graner - 3.2-17 +- Added bash32-018 upstream official patch +- Added bash32-020 upstream official patch +- Added bash32-019 upstream official patch + +* Thu Aug 23 2007 Pete Graner - 3.2-16 +- Rebuild + +* Mon Aug 20 2007 Pete Graner - 3.2-15 +- Update to the Improve bash $RANDOM pseudo RNG (bug #234906) + now works with subshells and make $RANDOM on demand thus reducing the + amount of AVCs thrown. + +* Thu Aug 16 2007 Pete Graner - 3.2-15 +- Changed spec file License to GPLv2+ + +* Wed Aug 15 2007 Pete Graner - 3.2-13 +- Improve bash $RANDOM pseudo RNG (bug #234906) + +* Fri Jul 20 2007 Tim Waugh 3.2-12 +- Quote environment variables in the post scriptlet to prevent upgrade + failures (bug #249005). + +* Thu Jul 5 2007 Tim Waugh 3.2-11 +- Patchlevel 17 (bug #241647). + +* Wed Jul 4 2007 Tim Waugh 3.2-10 +- Clarification in the ulimit man page (bug #220657). + +* Mon Feb 12 2007 Tim Waugh 3.2-9 +- Rebuild to link with libtinfo instead of libncurses. + +* Wed Feb 7 2007 Tim Waugh 3.2-8 +- Avoid %%makeinstall (bug #225609). + +* Tue Feb 6 2007 Tim Waugh 3.2-7 +- Reinstated this change: + - Post requires ncurses (bug #224567). +- Reverted this change: + - Added triggers for install-info (bug #225609). + +* Tue Feb 6 2007 Tim Waugh 3.2-6 +- Reverted this change: + - Post requires ncurses (bug #224567). + +* Mon Feb 5 2007 Tim Waugh 3.2-5 +- Added triggers for install-info (bug #225609). +- Use full path to utilities in scriptlets (bug #225609). +- Fix missing sh-bangs in example scripts (bug #225609). +- Post requires ncurses (bug #224567). +- Removed Prefix tag (bug #225609). +- Fixed BuildRoot tag (bug #225609). +- Removed trailing full-stop from summary (bug #225609). +- Spec file is now UTF-8 (bug #225609). +- Removed obsolete Obsoletes (bug #225609). +- Moved 'make check' to new 'check' section (bug #225609). +- Removed uses of RPM_SOURCE_DIR (bug #225609). +- Fixed macros in changelog (bug #225609). +- Changed tabs to spaces (bug #225609). + +* Tue Jan 23 2007 Tim Waugh 3.2-4 +- Slightly better .bash_logout (bug #223960). + +* Fri Jan 19 2007 Tim Waugh 3.2-3 +- Back out rmatch change introduced in 3.2 (bug #220087). + +* Tue Jan 16 2007 Miroslav Lichvar 3.2-2 +- Link with ncurses. + +* Fri Dec 15 2006 Tim Waugh 3.2-1 +- Build requires autoconf and gettext. +- 3.2. No longer need aq, login, ulimit, sighandler or read-memleak + patches. + +* Wed Jul 12 2006 Tim Waugh 3.1-17 +- Fixed 'tags out of date' problem with 'info bash' (bug #150118). + +* Wed Jul 12 2006 Jesse Keating - 3.1-16.1 +- rebuild + +* Wed Jun 28 2006 Tim Waugh 3.1-16 +- Removed 'unset USERNAME' from default .bash_profile (bug #196735). + +* Thu Jun 15 2006 Tim Waugh 3.1-15 +- Updated requires patch to the ALT version. + +* Wed May 31 2006 Tim Waugh 3.1-14 +- More sighandler fixes, this time hypothetical. + +* Thu May 25 2006 Tim Waugh 3.1-13 +- Another fix for the sighandler patch (bug #192297). + +* Thu Apr 13 2006 Tim Waugh 3.1-12 +- Patchlevel 17. + +* Tue Apr 4 2006 Tim Waugh 3.1-11 +- Patchlevel 16. + +* Thu Mar 23 2006 Tim Waugh 3.1-10 +- Patchlevel 14. + +* Thu Mar 2 2006 Tim Waugh 3.1-9 +- Fixed duplicate documentation of ulimit '-x' option introduced by + ulimit patch (bug #183596). + +* Tue Feb 21 2006 Tim Waugh 3.1-8 +- Patchlevel 10. + +* Thu Feb 16 2006 Tim Waugh 3.1-7 +- Patchlevel 8. + +* Fri Feb 10 2006 Jesse Keating - 3.1-6.2 +- bump again for double-long bug on ppc(64) + +* Tue Feb 07 2006 Jesse Keating - 3.1-6.1 +- rebuilt for new gcc4.1 snapshot and glibc changes + +* Sun Feb 5 2006 Tim Waugh 3.1-6 +- Patchlevel 7. + +* Wed Jan 18 2006 Tim Waugh +- Removed inaccuracies from %%description (bug #178189). + +* Fri Jan 13 2006 Tim Waugh 3.1-5 +- Fix 'exec -l /bin/bash'. + +* Thu Jan 12 2006 Tim Waugh 3.1-4 +- Fix sighandler patch bug (bug #177545). + +* Tue Jan 10 2006 Tim Waugh 3.1-3 +- Patchlevel 5. + +* Fri Jan 6 2006 Tim Waugh 3.1-2 +- No longer need loadables, mbinc or shellfunc patches. +- Use literal single-quote in bash man page where appropriate (bug #177051). + +* Mon Jan 2 2006 Tim Waugh 3.1-1 +- 3.1. +- No longer need ia64, utf8, multibyteifs, jobs, sigpipe, + read-e-segfault, manpage, crash, pwd, afs, subshell patches. +- Remove wrap patch for now. +- Use upstream patch to fix arrays. + +* Thu Dec 15 2005 Tim Waugh 3.0-41 +- Missed another loop for improved sighandler patch (bug #169231). + +* Fri Dec 09 2005 Jesse Keating +- rebuilt + +* Thu Dec 8 2005 Tim Waugh 3.0-40 +- Fix read memleak when reading from non-blocking fd (bug #173283). +- Missed another loop for improved sighandler patch (bug #169231). + +* Wed Dec 7 2005 Tim Waugh 3.0-39 +- Missed a loop for improved sighandler patch (bug #169231). + +* Tue Dec 6 2005 Tim Waugh 3.0-38 +- Test out improved sighandler patch (bug #169231). + +* Tue Nov 22 2005 Tim Waugh 3.0-37 +- Applied patch from upstream to fix parsing problem (bug #146638). + +* Wed Nov 9 2005 Tim Waugh 3.0-36 +- Added Url: tag (bug #172770). +- Do not explicitly gzip info pages (bug #172770). +- Fix permissions on bashbug (bug #172770). + +* Thu Oct 6 2005 Tim Waugh 3.0-35 +- Fixed memory allocation bug in multibyteifs patch (bug #169996). + +* Fri Sep 23 2005 Tim Waugh +- Use 'volatile' in sighandler patch. + +* Wed Sep 21 2005 Tim Waugh 3.0-34 +- Avoid writing history files during signal handling (bug #163235). + +* Mon Aug 8 2005 Tim Waugh 3.0-33 +- Fixed multibyte IFS handling for invalid input (bug #165243). + +* Mon Aug 8 2005 Tim Waugh 3.0-32 +- Fixed 'LC_ALL=C export LC_ALL' behaviour (bug #165249). + +* Thu Jun 23 2005 Tim Waugh +- Added ulimit support for RLIMIT_NICE and RLIMIT_RTPRIO (bug #157049). + +* Wed Jun 8 2005 Tim Waugh +- Move a comment in dot-bashrc (bug #159522). + +* Tue May 10 2005 Tim Waugh 3.0-31 +- Small fix for multibyteifs patch to prevent segfault (bug #157260). + +* Wed Apr 20 2005 Tim Waugh +- Fixed AFS support for output redirection, so that the correct errors + are reported for other filesystems (bug #155373). + +* Tue Mar 15 2005 Tim Waugh 3.0-30 +- Fix PS1 expansion crash when PWD is unset (bg #151116). + +* Wed Mar 2 2005 Tim Waugh 3.0-29 +- Rebuild for new GCC. + +* Thu Feb 17 2005 Tim Waugh 3.0-28 +- Define _GNU_SOURCE in CPPFLAGS (bug #147573). + +* Mon Feb 14 2005 Tim Waugh +- Reverted this change: + - Added code to /etc/skel/.bash_logout to support the gpm selection buffer + invalidation on virtual terminals (bug #115493). + +* Mon Jan 31 2005 Tim Waugh 3.0-27 +- Applied upstream patch to fix a potential NULL dereference. + +* Fri Jan 28 2005 Tim Waugh 3.0-26 +- Fixed job handling bug (bug #145124). + +* Sun Dec 5 2004 Tim Waugh 3.0-25 +- Applied patch from Florian La Roche to fix CPPFLAGS quoting in spec file. + +* Tue Nov 30 2004 Tim Waugh +- Fixed typo in man page (spotted on bug-bash). + +* Thu Nov 18 2004 Tim Waugh 3.0-24 +- Use upstream patch to fix bug #139575 and bug #139306. + +* Thu Nov 18 2004 Tim Waugh 3.0-23 +- Fixed last patch to avoid regressions (bug #139575). + +* Mon Nov 15 2004 Tim Waugh 3.0-22 +- Fixed prompt wrapping code to cope with zero-length prompts (bug #139306). + +* Thu Nov 11 2004 Tim Waugh 3.0-21 +- Added code to /etc/skel/.bash_logout to support the gpm selection buffer + invalidation on virtual terminals (bug #115493). + +* Wed Nov 10 2004 Tim Waugh 3.0-20 +- Patchlevel 16. + +* Mon Nov 1 2004 Tim Waugh +- Patchlevel 15. + +* Tue Oct 19 2004 Tim Waugh 3.0-17 +- Patchlevel 14. +- No longer need brace patch. + +* Wed Sep 29 2004 Tim Waugh 3.0-16 +- Apply patch from Chet Ramey to fix brace expansion. + +* Fri Sep 24 2004 Tim Waugh 3.0-15 +- Minor fix for job handling. + +* Mon Sep 13 2004 Tim Waugh +- Add bashbug back in (with suffix). + +* Mon Sep 13 2004 Tim Waugh +- Remove bash2. + +* Fri Sep 10 2004 Tim Waugh 3.0-14 +- Don't run tests that read from /dev/tty. +- Patchlevel 13. + +* Wed Sep 8 2004 Tim Waugh 3.0-13 +- Check for EINVAL from waitpid() and avoid WCONTINUED in that case. +- Fixed jobs4 test. +- Applied experimental upstream patch for trap compatibility. +- Re-make documentation to reflect source changes. + +* Tue Sep 7 2004 Tim Waugh 3.0-12 +- Remove 'bashbug' from the documentation, because we don't ship it due + to biarch concerns. + +* Thu Sep 2 2004 Tim Waugh 3.0-11 +- Fixed multibyte parameter length expansion. + +* Tue Aug 31 2004 Tim Waugh 3.0-9 +- Fix ulimits patch from Ulrich Drepper (bug #129800). + +* Fri Aug 27 2004 Tim Waugh 3.0-8 +- Provide support for new limits (bug #129800). + +* Thu Aug 26 2004 Tim Waugh 3.0-7 +- Use upstream patch for last fix. + +* Thu Aug 26 2004 Tim Waugh 3.0-6 +- Fixed history saved-line handling. + +* Tue Aug 24 2004 Tim Waugh +- Fixed multibyte IFS handling. + +* Wed Aug 18 2004 Tim Waugh +- Applied bug-bash list patch to fix pipefail. + +* Tue Aug 17 2004 Tim Waugh 3.0-5 +- Make trap usage string show POSIX usage (bug #128938). +- Updated ${x[@]:1} expansion fix from bug-bash list. +- Updated patch to fix unset array crash (from bug-bash list). + +* Sun Aug 15 2004 Tim Waugh +- Fix ${x[@]:1} expansion (William Park, bug-bash list). + +* Tue Aug 10 2004 Tim Waugh 3.0-4 +- Fix vi-change-char behaviour at EOL (bug #129526). + +* Mon Aug 9 2004 Tim Waugh 3.0-3 +- Applied bug-bash list patch to fix multiline PS1 prompting (bug #129382). + +* Wed Aug 4 2004 Tim Waugh 3.0-2 +- Fixed brace expansion (bug #129128). +- Build with AFS support again, since bug #86514 seems fixed upstream + (bug #129094). + +* Tue Aug 3 2004 Tim Waugh +- Fixed crash when unsetting an unset array (from bug-bash list). + +* Wed Jul 28 2004 Tim Waugh 3.0-1 +- 3.0. + +* Wed Jul 21 2004 Tim Waugh 2.05b-44 +- Don't report SIGPIPE errors (bug #128274). + +* Thu Jul 8 2004 Tim Waugh 2.05b-43 +- Fixed command substitution problem (bug #127242). + +* Mon Jun 28 2004 Tim Waugh 2.05b-42 +- Fixed multibyte variable substitution patch (bug #126399). + +* Thu Jun 17 2004 Karsten Hopp 2.05b-41 +- remove bashbug script/docs to avoid conflicting files in + biarch installs. + +* Tue Jun 15 2004 Elliot Lee +- rebuilt + +* Fri Jun 4 2004 Tim Waugh +- Build requires bison (bug #125307). + +* Wed Jun 2 2004 Tim Waugh 2.05b-39 +- Build requires libtermcap-devel (bug #125068). + +* Wed May 19 2004 Tim Waugh +- Don't ship empty %%{_libdir}/bash (bug #123556). + +* Thu Mar 11 2004 Tim Waugh 2.05b-38 +- Apply patch from Nalin Dahyabhai fixing an overread. + +* Tue Mar 02 2004 Elliot Lee +- rebuilt + +* Fri Feb 13 2004 Elliot Lee +- rebuilt + +* Thu Jan 22 2004 Tim Waugh 2.05b-36 +- Fix the bug causing bindings to need reparsing .inputrc (bug #114101). + +* Mon Jan 5 2004 Tim Waugh 2.05b-35 +- Fix parameter expansion in multibyte locales (bug #112657). +- Run 'make check'. + +* Tue Dec 9 2003 Tim Waugh 2.05b-34 +- Build requires texinfo (bug #111171). + +* Fri Nov 28 2003 Tim Waugh 2.05b-33 +- Speed up UTF-8 command-line redrawing in the common case (bug #102353, + bug #110777). + +* Thu Nov 6 2003 Tim Waugh 2.05b-32 +- Apply upstream patches (bug #109269 among others). + +* Fri Oct 31 2003 Tim Waugh +- Fix bash.info (bug #83776). + +* Tue Oct 28 2003 Tim Waugh 2.05b-31 +- Add bash205b-007 patch to fix bug #106876. + +* Thu Oct 23 2003 Tim Waugh 2.05b-30 +- Rebuilt. + +* Thu Sep 18 2003 Tim Waugh 2.05b-29.1 +- Rebuilt. + +* Thu Sep 18 2003 Tim Waugh 2.05b-29 +- Avoid crashing on multibyte input when locale is set incorrectly + (bug #74266). + +* Fri Sep 5 2003 Tim Waugh 2.05b-28.1 +- Rebuilt. + +* Fri Sep 5 2003 Tim Waugh 2.05b-28 +- Avoid built-in malloc implementation (bug #103768). + +* Wed Sep 3 2003 Tim Waugh 2.05b-27.1 +- Rebuilt. + +* Wed Sep 3 2003 Tim Waugh 2.05b-27 +- LFS support (bug #103627). + +* Thu Jul 31 2003 Tim Waugh 2.05b-26.1 +- Rebuilt. + +* Thu Jul 31 2003 Tim Waugh 2.05b-26 +- Merge bash-doc into main package (bug #100632). + +* Wed Jun 04 2003 Elliot Lee 2.05b-25 +- rebuilt + +* Mon May 12 2003 Tim Waugh 2.05b-24 +- Fix completion display when multibyte or control characters are to be + shown (bug #90201). + +* Wed Mar 26 2003 Tim Waugh 2.05b-23 +- Fix a warning message (bug #79629). +- Don't remove generated source during build, for debuginfo package. +- Don't build with AFS support (bug #86514). + +* Tue Mar 25 2003 Tim Waugh 2.05b-22 +- Really fix bug #78455. + +* Tue Mar 11 2003 Tim Waugh 2.05b-21 +- Don't explicitly strip binaries (bug #85995). + +* Tue Feb 11 2003 Tim Waugh 2.05b-20 +- Really fix bug #83331 for good. + +* Mon Feb 10 2003 Tim Waugh 2.05b-19 +- Fix builtins.1. + +* Fri Feb 7 2003 Tim Waugh 2.05b-18 +- Actually apply the patch (bug #83331). + +* Wed Feb 5 2003 Tim Waugh 2.05b-17 +- Fix history/UTF-8 bug (bug #83331). + +* Sun Jan 26 2003 Tim Waugh 2.05b-16 +- More tab-completion fixing (bug #72512). + +* Wed Jan 22 2003 Tim Powers 2.05b-15 +- rebuilt + +* Wed Jan 15 2003 Tim Waugh 2.05b-14 +- Force pgrp synchronization (bug #81653). + +* Thu Dec 05 2002 Elliot Lee 2.05b-13 +- (patch26) Don't call 'size' in makefile. Pointless, and interferes with + cross compiles. + +* Tue Dec 3 2002 Tim Waugh 2.05b-12 +- Prevent prompt overwriting output (bug #74383). + +* Wed Nov 27 2002 Tim Waugh 2.05b-11 +- Fix '-rbash' (bug #78455). + +* Thu Nov 21 2002 Tim Waugh 2.05b-10 +- Rebuild. + +* Wed Nov 20 2002 Elliot Lee +- Use the configure macro instead of calling ./configure directly + +* Wed Nov 13 2002 Tim Waugh +- Revert previous change. + +* Wed Nov 13 2002 Tim Waugh 2.05b-8 +- PreReq libtermcap. + +* Fri Oct 18 2002 Tim Waugh 2.05b-7 +- Add readline-init patch (bug #74925). + +* Wed Oct 16 2002 Tim Waugh 2.05b-6 +- Add the (4) patches from ftp.gnu.org (bug #75888, bug #72512). +- Ship '.' man page, which doesn't get picked up by glob. +- Don't install files not shipped when building. +- Locale shell variables fix (bug #74701). + +* Fri Aug 23 2002 Tim Powers 2.05b-5 +- re-bzip the docs, something was corrupted + +* Thu Aug 22 2002 Tim Waugh 2.05b-4 +- Fix history substitution modifiers in UTF-8 (bug #70294, bug #71186). +- Fix ADVANCE_CHAR at end of string (bug #70819). +- docs: CWRU/POSIX.NOTES no longer exists, but ship POSIX. + +* Wed Aug 07 2002 Phil Knirsch 2.05b-3 +- Fixed out of memory problem with readline. + +* Tue Jul 23 2002 Phil Knirsch 2.05b-2 +- Added symlink for sh.1 in man1 section so that man sh works (#44039). + +* Mon Jul 22 2002 Phil Knirsch 2.05b-1 +- Update to 2.05b + +* Wed Jul 10 2002 Phil Knirsch 2.05a-16 +- Fixed readline utf8 problem (#68313). + +* Fri Jun 21 2002 Tim Powers 2.05a-15 +- automated rebuild + +* Thu May 23 2002 Tim Powers 2.05a-14 +- automated rebuild + +* Fri Apr 12 2002 Tim Powers 2.05a-13 +- don't build the stuff in examples/loadables. It breaks FHS + compliance + +* Fri Apr 5 2002 Bernhard Rosenkraenzer 2.05a-12 +- Fix the fix for #62418 + +* Thu Apr 4 2002 Bernhard Rosenkraenzer 2.05a-11 +- Fix kill builtin (#62418) + +* Mon Mar 25 2002 Trond Eivind Glomsrød 2.0.5a-10 +- Get rid of completion subpackage +- Use %%{_tmppath} + +* Mon Mar 11 2002 Bernhard Rosenkraenzer 2.05a-9 +- Add patch from Ulrich Drepper to get better error messages when trying + to launch an application with a bad ELF interpreter (e.g. libc5 ld.so) + (#60870) + +* Fri Feb 22 2002 Bernhard Rosenkraenzer 2.05a-8 +- Update completion + +* Wed Jan 30 2002 Bernhard Rosenkraenzer 2.05a-7 +- Update completion stuff and move it to a separate package + +* Sat Jan 26 2002 Bernhard Rosenkraenzer 2.05a-6 +- Add patches from Ian Macdonald + +* Wed Jan 23 2002 Bernhard Rosenkraenzer 2.05a-5 +- Add programmable completion (optional) + +* Thu Jan 17 2002 Bernhard Rosenkraenzer 2.05a-4 +- Fix mailcheck (#57792) + +* Tue Jan 15 2002 Bernhard Rosenkraenzer 2.05a-3 +- Fix autoconf mess +- Build --with-afs, some users may be using it + +* Wed Jan 09 2002 Tim Powers +- automated rebuild + +* Thu Nov 22 2001 Bernhard Rosenkraenzer 2.05a-2 +- Fix conflict with sh-utils (printf builtin manpage vs. printf binary manpage) + (#56590) + +* Tue Nov 20 2001 Bernhard Rosenkraenzer 2.05a-1 +- 2.05a + +* Wed Oct 10 2001 Florian La Roche +- disable s390x fix, not needed anymore + +* Mon Oct 1 2001 Bernhard Rosenkraenzer 2.05-9 +- Add patch from readline 4.2-3 to bash's internal libreadline + +* Mon Jul 9 2001 Bernhard Rosenkraenzer 2.05-8 +- Merge Pekka Savola's patch (RFE#47762) + +* Mon Jul 2 2001 Pekka Savola +- Add IPv6 patch from PLD (only redirection to /dev/{tcp,udp}/host/port + support) + +* Sun Jun 24 2001 Bernhard Rosenkraenzer 2.05-7 +- Add some bugfix patches from the maintainer + +* Mon Jun 11 2001 Florian La Roche +- added patch for s390x from + +* Wed May 23 2001 Bernhard Rosenkraenzer 2.05-5 +- Don't set BASH_ENV in .bash_profile, it causes .bashrc to be sourced + twice in interactive non-login shells. +- s/Copyright/License/ + +* Sat May 5 2001 Bernhard Rosenkraenzer 2.05-4 +- Fix tempfile creation in bashbug + +* Wed May 2 2001 Preston Brown 2.05-3 +- bashrc moved to setup package + +* Tue Apr 24 2001 Bernhard Rosenkraenzer 2.05-2 +- bash comes with its own copy of readline... Add the patches we're + applying in the readline package. + +* Tue Apr 24 2001 Bernhard Rosenkraenzer 2.05-1 +- Update to 2.05 +- Change PROMPT_COMMAND in bashrc for xterms + to something less space consuming (#24159) +- Provide plugs for alternate prompt commands (#30634), but don't + default to them + +* Mon Mar 19 2001 Preston Brown +- add default aliases for 'dir' and 'df' to have human readable output + +* Wed Feb 28 2001 Matt Wilson +- don't Prereq: /sbin/install-info! + +* Tue Feb 27 2001 Preston Brown +- noreplace config files +- don't own /etc/skel directory + +* Thu Feb 22 2001 Harald Hoyer +- changed /etc/bashrc to work with backspace = 0177 (rxvt) + +* Wed Feb 07 2001 Florian La Roche +- changed /etc/skel/.bash_profile to "unset USERNAME" + +* Mon Feb 5 2001 Yukihiro Nakai +- Delete Japanese resources from dot-bashrc + and move them to each package. + +* Fri Dec 15 2000 Yukihiro Nakai +- Add Japanese resource to dot-bashrc + +* Mon Dec 11 2000 Bernhard Rosenkraenzer +- rebuild to get rid of 0777 doc dirs + +* Thu Nov 16 2000 Bernhard Rosenkraenzer +- restore the ^Hs in documentation, they're highlighting sequences + for less (#20654) + +* Fri Sep 15 2000 Florian La Roche +- bash-2.04-export.patch is reported to fix compilation + of older glibc-2.1 sources + +* Tue Aug 22 2000 Matt Wilson +- fixed the summary of bash-doc to use %%{version} instead of "2.03" + +* Tue Aug 8 2000 Bill Nottingham +- 'exit' in bashrc is very bad. + +* Tue Aug 8 2000 Bernhard Rosenkraenzer +- minor bashrc fix (Bug #8518) + +* Mon Jul 17 2000 Bernhard Rosenkraenzer +- Don't use tput etc. in bashrc if /usr isn't available (Bug #14116) + +* Wed Jul 12 2000 Prospector +- automatic rebuild + +* Thu Jun 22 2000 Bill Nottingham +- fix for some IA-64 issues from Stephane Eranian + +* Thu Jun 15 2000 Bernhard Rosenkraenzer +- Fix summary and description, they had old version numbers (Bug #12092) + +* Tue Jun 6 2000 Bill Nottingham +- add /etc/skel/.bash* ; obsolete etcskel + +* Tue May 2 2000 Bill Nottingham +- fix for shell functions on 64-bit architectures... + +* Wed Mar 29 2000 Bernhard Rosenkraenzer +- Add some backwards compatibility (for i in ; do something; done) + +* Tue Mar 21 2000 Bernhard Rosenkraenzer +- 2.04 final +- remove the echo, pwd, test and kill man pages from the package, + we're getting them from sh-utils + +* Sun Mar 19 2000 Bernhard Rosenkraenzer +- 2.04beta5 +- adapt patches +- Fix up bashrc +- Don't put in bashrc1, this should be done by the bash1 package +- use install -c instead of plain install to work on *BSD +- remove the collected patches - they're now in the base version. +- make compressed man pages optional + +* Thu Mar 16 2000 Florian La Roche +- add some collected patches for bash2 +- change it over to be the main bash package +- install man-pages root:root +- obsolete bash2, bash2-doc + +* Wed Feb 02 2000 Cristian Gafton +- man pages are compressed +- fix description + +* Thu Dec 2 1999 Ken Estes +- updated patch to detect what executables are required by a script. + +* Tue Sep 14 1999 Dale Lovelace +- Remove annoying ^H's from documentation + +* Fri Jul 16 1999 Ken Estes +- patch to detect what executables are required by a script. + +* Sun Mar 21 1999 Cristian Gafton +- auto rebuild in the new build environment (release 4) + +* Fri Mar 19 1999 Jeff Johnson +- strip binaries. +- include bash-doc correctly. + +* Thu Mar 18 1999 Preston Brown +- fixed post/postun /etc/shells work. + +* Thu Mar 18 1999 Cristian Gafton +- updated again text in the spec file + +* Mon Feb 22 1999 Jeff Johnson +- updated text in spec file. +- update to 2.03. + +* Fri Feb 12 1999 Cristian Gafton +- build it as bash2 instead of bash + +* Tue Feb 9 1999 Bill Nottingham +- set 'NON_INTERACTIVE_LOGIN_SHELLS' so profile gets read + +* Thu Jan 14 1999 Jeff Johnson +- rename man pages in bash-doc to avoid packaging conflicts (#606). + +* Wed Dec 02 1998 Cristian Gafton +- patch for the arm +- use $RPM_ARCH-redhat-linux as the build target + +* Tue Oct 6 1998 Bill Nottingham +- rewrite %%pre, axe %%postun (to avoid prereq loops) + +* Wed Aug 19 1998 Jeff Johnson +- resurrect for RH 6.0. + +* Sun Jul 26 1998 Jeff Johnson +- update to 2.02.1 + +* Thu Jun 11 1998 Jeff Johnson +- Package for 5.2. + +* Mon Apr 20 1998 Ian Macdonald +- added POSIX.NOTES doc file +- some extraneous doc files removed +- minor .spec file changes + +* Sun Apr 19 1998 Ian Macdonald +- upgraded to version 2.02 +- Alpha, MIPS & Sparc patches removed due to lack of test platforms +- glibc & signal patches no longer required +- added documentation subpackage (doc) + +* Fri Nov 07 1997 Donnie Barnes +- added signal handling patch from Dean Gaudet that + is based on a change made in bash 2.0. Should fix some early exit + problems with suspends and fg. + +* Mon Oct 20 1997 Donnie Barnes +- added %%clean + +* Mon Oct 20 1997 Erik Troan +- added comment explaining why install-info isn't used +- added mips patch + +* Fri Oct 17 1997 Donnie Barnes +- added BuildRoot + +* Tue Jun 03 1997 Erik Troan +- built against glibc diff --git a/dot-bash_logout b/dot-bash_logout new file mode 100644 index 0000000..af7c6fd --- /dev/null +++ b/dot-bash_logout @@ -0,0 +1,2 @@ +# ~/.bash_logout + diff --git a/dot-bash_profile b/dot-bash_profile new file mode 100644 index 0000000..55136b9 --- /dev/null +++ b/dot-bash_profile @@ -0,0 +1,8 @@ +# .bash_profile + +# Get the aliases and functions +if [ -f ~/.bashrc ]; then + . ~/.bashrc +fi + +# User specific environment and startup programs diff --git a/dot-bashrc b/dot-bashrc new file mode 100644 index 0000000..d81e0b5 --- /dev/null +++ b/dot-bashrc @@ -0,0 +1,18 @@ +# .bashrc + +# Source global definitions +if [ -f /etc/bashrc ]; then + . /etc/bashrc +fi + +# User specific environment +if ! [[ "$PATH" =~ "$HOME/.local/bin:$HOME/bin:" ]] +then + PATH="$HOME/.local/bin:$HOME/bin:$PATH" +fi +export PATH + +# Uncomment the following line if you don't like systemctl's auto-paging feature: +# export SYSTEMD_PAGER= + +# User specific aliases and functions diff --git a/sources b/sources new file mode 100644 index 0000000..dff100d --- /dev/null +++ b/sources @@ -0,0 +1 @@ +SHA512 (bash-5.0.tar.gz) = bb4519f06e278f271d08722b531e49d2e842cc3e0b02a6b3eee422e2efcb5b6226111af43f5e5eae56beb85ac8bfebcd6a4aacbabb8f609e529aa4d571890864 diff --git a/tests/tests.yml b/tests/tests.yml new file mode 100644 index 0000000..2eaaa7a --- /dev/null +++ b/tests/tests.yml @@ -0,0 +1,29 @@ +--- + +# Tests that run in classic context +- hosts: localhost + roles: + - role: standard-test-beakerlib + tags: + - classic + repositories: + - repo: "https://src.fedoraproject.org/tests/shell.git" + dest: "shell" + fmf_filter: "tier: 1, 2 & tags: classic" + required_packages: + - expect # login requires expect + - which # smoke requires which + +# Tests that run in container and atomic contexts +- hosts: localhost + roles: + - role: standard-test-beakerlib + tags: + - container + - atomic + repositories: + - repo: "https://src.fedoraproject.org/tests/shell.git" + dest: "shell" + fmf_filter: "tier: 1, 2 & tags: container, atomic" + required_packages: + - which # smoke requires which