From 997058cd74521d2347ad12970b86702abd0faf40 Mon Sep 17 00:00:00 2001 From: =?utf8?q?Mat=C3=ADas=20Fonzo?= Date: Sat, 17 Dec 2022 20:56:00 -0300 Subject: [PATCH] recipes: Upgrade of boot, compressors, shells, and daemons series (devel in progress) MIME-Version: 1.0 Content-Type: text/plain; charset=utf8 Content-Transfer-Encoding: 8bit Signed-off-by: Matías Fonzo --- patches/at/flex_isleap.patch | 13 -- patches/bash/bash51-001 | 80 --------- patches/bash/bash51-002 | 57 ------ patches/bash/bash51-003 | 53 ------ patches/bash/bash51-004 | 126 ------------- patches/bash/bash51-005 | 100 ----------- patches/bash/bash51-006 | 48 ----- patches/bash/bash51-007 | 95 ---------- patches/bash/bash51-008 | 61 ------- patches/bash/bash51-009 | 59 ------ patches/bash/bash51-010 | 59 ------ patches/bash/bash51-011 | 81 --------- patches/bash/bash51-012 | 198 --------------------- patches/bash/bash51-013 | 43 ----- patches/bash/bash51-014 | 48 ----- patches/bash/bash51-015 | 49 ----- patches/bash/bash51-016 | 64 ------- patches/os-prober/os-prober-gentoo-fix.patch | 13 -- patches/os-prober/os-prober-grepfix.patch | 13 -- patches/os-prober/os-prober-grub2-parsefix.patch | 22 --- patches/readline/readline81-001 | 92 ---------- patches/readline/readline81-002 | 45 ----- patches/readline/readline82-001 | 42 +++++ ... => sysvinit-3.06-dragora_consolidated-1.patch} | 22 ++- recipes/boot/efivar/recipe | 4 +- recipes/boot/eudev/recipe | 4 +- recipes/boot/os-prober/recipe | 11 +- recipes/boot/sysvinit/recipe | 9 +- recipes/braille/liblouis/recipe | 2 +- recipes/compressors/bzip2/recipe | 26 ++- recipes/compressors/gzip/recipe | 8 +- recipes/compressors/xz/recipe | 6 +- recipes/compressors/zutils/recipe | 4 +- recipes/daemons/acpid/recipe | 5 +- recipes/daemons/at/recipe | 5 +- recipes/daemons/sysklogd/recipe | 2 +- recipes/devel/bc/recipe | 4 +- recipes/devel/ccache/recipe | 2 +- recipes/devel/clisp/recipe | 15 +- recipes/devel/elfutils/recipe | 2 +- recipes/devel/fossil/recipe | 4 +- recipes/devel/gc/recipe | 2 +- recipes/devel/gcc/recipe | 2 +- recipes/libs/readline/recipe | 10 +- recipes/shells/bash/recipe | 8 +- sources/SOURCELIST.txt | 42 ++--- sources/acpid-2.0.33.tar.xz.sha256 | 1 - sources/acpid-2.0.34.tar.xz.sha256 | 1 + sources/at_3.2.2.orig.tar.gz.sha256 | 1 - sources/at_3.2.5.orig.tar.gz.sha256 | 1 + sources/bash-5.1.tar.gz.sha256 | 1 - sources/bash-5.2.15.tar.gz.sha256 | 1 + sources/bc-5.2.1.tar.xz.sha256 | 1 - sources/bc-6.1.1.tar.gz.sha256 | 1 + sources/bzip2-1.0.6.tar.gz.sha256 | 1 - sources/bzip2-1.0.8.tar.gz.sha256 | 1 + sources/ccache-4.7.1.tar.gz.sha256 | 1 - sources/ccache-4.7.4.tar.gz.sha256 | 1 + sources/clisp-20210628_de01f0f47.tar.lz.sha256 | 1 - sources/clisp-20221021_1d0d0e998.tar.lz.sha256 | 1 + sources/efivar-20220418_6be2cb1.tar.lz.sha256 | 1 - sources/efivar-20220927_dd901c1.tar.lz.sha256 | 1 + sources/elfutils-0.186.tar.bz2.sha256 | 1 - sources/elfutils-0.188.tar.bz2.sha256 | 1 + sources/eudev-3.2.11.tar.gz.sha256 | 1 - sources/eudev-3.2.12-pre3.tar.gz.sha256 | 1 + sources/fossil-src-2.19.tar.gz.sha256 | 1 - sources/fossil-src-2.20.tar.gz.sha256 | 1 + sources/gc-8.0.6.tar.gz.sha256 | 1 - sources/gc-8.2.2.tar.gz.sha256 | 1 + sources/gcc-11-20221111.tar.xz.sha256 | 1 - sources/gcc-11-20221216.tar.xz.sha256 | 1 + sources/gzip-1.10.tar.gz.sha256 | 1 - sources/gzip-1.12.tar.gz.sha256 | 1 + sources/liblouis-3.23.0.tar.gz.sha256 | 1 - sources/liblouis-3.24.0.tar.gz.sha256 | 1 + sources/os-prober_1.79.tar.xz.sha256 | 1 - sources/os-prober_1.81.tar.xz.sha256 | 1 + sources/readline-8.1.tar.gz.sha256 | 1 - sources/readline-8.2.tar.gz.sha256 | 1 + sources/sysklogd-2.3.0.tar.gz.sha256 | 1 - sources/sysklogd-2.4.4.tar.gz.sha256 | 1 + sources/sysvinit-3.01.tar.xz.sha256 | 1 - sources/sysvinit-3.06.tar.xz.sha256 | 1 + sources/xz-5.2.5.tar.bz2.sha256 | 1 - sources/xz-5.4.0.tar.bz2.sha256 | 1 + sources/zutils-1.11.tar.lz.sha256 | 1 - sources/zutils-1.12-rc1.tar.lz.sha256 | 1 + stages/0/03-gcc-static | 2 +- stages/0/05-gcc-final | 2 +- stages/1/06-gcc | 2 +- 91 files changed, 169 insertions(+), 1539 deletions(-) delete mode 100644 patches/at/flex_isleap.patch delete mode 100644 patches/bash/bash51-001 delete mode 100644 patches/bash/bash51-002 delete mode 100644 patches/bash/bash51-003 delete mode 100644 patches/bash/bash51-004 delete mode 100644 patches/bash/bash51-005 delete mode 100644 patches/bash/bash51-006 delete mode 100644 patches/bash/bash51-007 delete mode 100644 patches/bash/bash51-008 delete mode 100644 patches/bash/bash51-009 delete mode 100644 patches/bash/bash51-010 delete mode 100644 patches/bash/bash51-011 delete mode 100644 patches/bash/bash51-012 delete mode 100644 patches/bash/bash51-013 delete mode 100644 patches/bash/bash51-014 delete mode 100644 patches/bash/bash51-015 delete mode 100644 patches/bash/bash51-016 delete mode 100644 patches/os-prober/os-prober-gentoo-fix.patch delete mode 100644 patches/os-prober/os-prober-grepfix.patch delete mode 100644 patches/os-prober/os-prober-grub2-parsefix.patch delete mode 100644 patches/readline/readline81-001 delete mode 100644 patches/readline/readline81-002 create mode 100644 patches/readline/readline82-001 rename patches/sysvinit/{sysvinit-2.98-dragora_consolidated-1.patch => sysvinit-3.06-dragora_consolidated-1.patch} (84%) delete mode 100644 sources/acpid-2.0.33.tar.xz.sha256 create mode 100644 sources/acpid-2.0.34.tar.xz.sha256 delete mode 100644 sources/at_3.2.2.orig.tar.gz.sha256 create mode 100644 sources/at_3.2.5.orig.tar.gz.sha256 delete mode 100644 sources/bash-5.1.tar.gz.sha256 create mode 100644 sources/bash-5.2.15.tar.gz.sha256 delete mode 100644 sources/bc-5.2.1.tar.xz.sha256 create mode 100644 sources/bc-6.1.1.tar.gz.sha256 delete mode 100644 sources/bzip2-1.0.6.tar.gz.sha256 create mode 100644 sources/bzip2-1.0.8.tar.gz.sha256 delete mode 100644 sources/ccache-4.7.1.tar.gz.sha256 create mode 100644 sources/ccache-4.7.4.tar.gz.sha256 delete mode 100644 sources/clisp-20210628_de01f0f47.tar.lz.sha256 create mode 100644 sources/clisp-20221021_1d0d0e998.tar.lz.sha256 delete mode 100644 sources/efivar-20220418_6be2cb1.tar.lz.sha256 create mode 100644 sources/efivar-20220927_dd901c1.tar.lz.sha256 delete mode 100644 sources/elfutils-0.186.tar.bz2.sha256 create mode 100644 sources/elfutils-0.188.tar.bz2.sha256 delete mode 100644 sources/eudev-3.2.11.tar.gz.sha256 create mode 100644 sources/eudev-3.2.12-pre3.tar.gz.sha256 delete mode 100644 sources/fossil-src-2.19.tar.gz.sha256 create mode 100644 sources/fossil-src-2.20.tar.gz.sha256 delete mode 100644 sources/gc-8.0.6.tar.gz.sha256 create mode 100644 sources/gc-8.2.2.tar.gz.sha256 delete mode 100644 sources/gcc-11-20221111.tar.xz.sha256 create mode 100644 sources/gcc-11-20221216.tar.xz.sha256 delete mode 100644 sources/gzip-1.10.tar.gz.sha256 create mode 100644 sources/gzip-1.12.tar.gz.sha256 delete mode 100644 sources/liblouis-3.23.0.tar.gz.sha256 create mode 100644 sources/liblouis-3.24.0.tar.gz.sha256 delete mode 100644 sources/os-prober_1.79.tar.xz.sha256 create mode 100644 sources/os-prober_1.81.tar.xz.sha256 delete mode 100644 sources/readline-8.1.tar.gz.sha256 create mode 100644 sources/readline-8.2.tar.gz.sha256 delete mode 100644 sources/sysklogd-2.3.0.tar.gz.sha256 create mode 100644 sources/sysklogd-2.4.4.tar.gz.sha256 delete mode 100644 sources/sysvinit-3.01.tar.xz.sha256 create mode 100644 sources/sysvinit-3.06.tar.xz.sha256 delete mode 100644 sources/xz-5.2.5.tar.bz2.sha256 create mode 100644 sources/xz-5.4.0.tar.bz2.sha256 delete mode 100644 sources/zutils-1.11.tar.lz.sha256 create mode 100644 sources/zutils-1.12-rc1.tar.lz.sha256 diff --git a/patches/at/flex_isleap.patch b/patches/at/flex_isleap.patch deleted file mode 100644 index 0ab8c98e..00000000 --- a/patches/at/flex_isleap.patch +++ /dev/null @@ -1,13 +0,0 @@ ---- parsetime.y.orig 2015-05-11 15:16:53.018305563 +0200 -+++ parsetime.y 2015-05-11 15:17:22.820153470 +0200 -@@ -6,6 +6,10 @@ - #include "parsetime.h" - #include "panic.h" - -+#ifndef __isleap -+#define __isleap(year) ((year)%4 == 0 && ((year)%100 != 0 || (year)%400 == 0)) -+#endif -+ - #define YYDEBUG 1 - - struct tm exectm; \ No newline at end of file diff --git a/patches/bash/bash51-001 b/patches/bash/bash51-001 deleted file mode 100644 index 6f29981d..00000000 --- a/patches/bash/bash51-001 +++ /dev/null @@ -1,80 +0,0 @@ - BASH PATCH REPORT - ================= - -Bash-Release: 5.1 -Patch-ID: bash51-001 - -Bug-Reported-by: Fazal Majid -Bug-Reference-ID: -Bug-Reference-URL: https://lists.gnu.org/archive/html/bug-bash/2020-12/msg00000.html - -Bug-Description: - -There is a missing dependency on a constructed file, which can cause highly -parellel builds to fail. - -Patch (apply with `patch -p0'): - -*** ../bash-5.1-patched/Makefile.in 2020-12-04 09:51:19.000000000 -0500 ---- Makefile.in 2020-12-16 11:28:36.000000000 -0500 -*************** -*** 1316,1319 **** ---- 1316,1320 ---- - bashline.o: pcomplete.h ${BASHINCDIR}/chartypes.h input.h - bashline.o: ${BASHINCDIR}/shmbutil.h ${BASHINCDIR}/shmbchar.h -+ bashline.o: ${DEFDIR}/builtext.h - bracecomp.o: config.h bashansi.h ${BASHINCDIR}/ansi_stdlib.h - bracecomp.o: shell.h syntax.h config.h bashjmp.h ${BASHINCDIR}/posixjmp.h -*************** -*** 1436,1439 **** ---- 1437,1441 ---- - builtins/evalstring.o: jobs.h builtins.h flags.h input.h execute_cmd.h - builtins/evalstring.o: bashhist.h $(DEFSRC)/common.h pathnames.h -+ builtins/evalstring.o: ${DEFDIR}/builtext.h - builtins/getopt.o: config.h ${BASHINCDIR}/memalloc.h - builtins/getopt.o: shell.h syntax.h bashjmp.h command.h general.h xmalloc.h error.h - -*** ../bash-5.1-patched/builtins/Makefile.in 2019-07-25 08:03:45.000000000 -0400 ---- builtins/Makefile.in 2020-12-16 11:29:29.000000000 -0500 -*************** -*** 362,366 **** - evalstring.o: $(topdir)/flags.h $(topdir)/input.h $(topdir)/execute_cmd.h - evalstring.o: $(topdir)/bashhist.h $(srcdir)/common.h -! evalstring.o: $(topdir)/trap.h $(topdir)/redir.h ../pathnames.h - #evalstring.o: $(topdir)/y.tab.h - getopt.o: ../config.h $(BASHINCDIR)/memalloc.h ---- 362,366 ---- - evalstring.o: $(topdir)/flags.h $(topdir)/input.h $(topdir)/execute_cmd.h - evalstring.o: $(topdir)/bashhist.h $(srcdir)/common.h -! evalstring.o: $(topdir)/trap.h $(topdir)/redir.h ../pathnames.h ./builtext.h - #evalstring.o: $(topdir)/y.tab.h - getopt.o: ../config.h $(BASHINCDIR)/memalloc.h - -*** ../bash-5.1/patchlevel.h 2020-06-22 14:51:03.000000000 -0400 ---- patchlevel.h 2020-10-01 11:01:28.000000000 -0400 -*************** -*** 1,5 **** - /* patchlevel.h -- current bash patch level */ - -! /* Copyright (C) 2001-2016 Free Software Foundation, Inc. - - This file is part of GNU Bash, the Bourne Again SHell. ---- 1,5 ---- - /* patchlevel.h -- current bash patch level */ - -! /* Copyright (C) 2001-2020 Free Software Foundation, Inc. - - This file is part of GNU Bash, the Bourne Again SHell. -*************** -*** 26,30 **** - looks for to find the patch level (for the sccs version string). */ - -! #define PATCHLEVEL 0 - - #endif /* _PATCHLEVEL_H_ */ ---- 26,30 ---- - looks for to find the patch level (for the sccs version string). */ - -! #define PATCHLEVEL 1 - - #endif /* _PATCHLEVEL_H_ */ diff --git a/patches/bash/bash51-002 b/patches/bash/bash51-002 deleted file mode 100644 index 8c991649..00000000 --- a/patches/bash/bash51-002 +++ /dev/null @@ -1,57 +0,0 @@ - BASH PATCH REPORT - ================= - -Bash-Release: 5.1 -Patch-ID: bash51-002 - -Bug-Reported-by: oguzismailuysal@gmail.com -Bug-Reference-ID: -Bug-Reference-URL: https://lists.gnu.org/archive/html/bug-bash/2020-12/msg00037.html - -Bug-Description: - -If there are no jobs, and the `-n' and `-p' options are both supplied to -`wait', bash can assign a value to the variable name specified with `-p' -instead of leaving it unset. - -Patch (apply with `patch -p0'): - -*** ../bash-5.1-patched/builtins/wait.def 2020-04-09 15:13:57.000000000 -0400 ---- builtins/wait.def 2020-12-11 09:46:49.000000000 -0500 -*************** -*** 214,222 **** - - status = wait_for_any_job (wflags, &pstat); -- if (status < 0) -- status = 127; -- - if (vname && status >= 0) - bind_var_to_int (vname, pstat.pid); - if (list) - unset_waitlist (); ---- 214,222 ---- - - status = wait_for_any_job (wflags, &pstat); - if (vname && status >= 0) - bind_var_to_int (vname, pstat.pid); -+ -+ if (status < 0) -+ status = 127; - if (list) - unset_waitlist (); - -*** ../bash-5.1/patchlevel.h 2020-06-22 14:51:03.000000000 -0400 ---- patchlevel.h 2020-10-01 11:01:28.000000000 -0400 -*************** -*** 26,30 **** - looks for to find the patch level (for the sccs version string). */ - -! #define PATCHLEVEL 1 - - #endif /* _PATCHLEVEL_H_ */ ---- 26,30 ---- - looks for to find the patch level (for the sccs version string). */ - -! #define PATCHLEVEL 2 - - #endif /* _PATCHLEVEL_H_ */ diff --git a/patches/bash/bash51-003 b/patches/bash/bash51-003 deleted file mode 100644 index 68e5dce6..00000000 --- a/patches/bash/bash51-003 +++ /dev/null @@ -1,53 +0,0 @@ - BASH PATCH REPORT - ================= - -Bash-Release: 5.1 -Patch-ID: bash51-003 - -Bug-Reported-by: oguzismailuysal@gmail.com -Bug-Reference-ID: -Bug-Reference-URL: https://lists.gnu.org/archive/html/bug-bash/2020-12/msg00050.html - -Bug-Description: - -Bash does not put a command substitution process that is started to perform an -expansion in a child process into the right process group where it can receive -keyboard-generated signals. - -Patch (apply with `patch -p0'): - -*** ../bash-5.1-patched/subst.c 2020-11-16 10:33:15.000000000 -0500 ---- subst.c 2020-12-12 13:50:11.000000000 -0500 -*************** -*** 6357,6362 **** - #if defined (JOB_CONTROL) - old_pipeline_pgrp = pipeline_pgrp; -! /* Don't reset the pipeline pgrp if we're already a subshell in a pipeline. */ -! if ((subshell_environment & SUBSHELL_PIPE) == 0) - pipeline_pgrp = shell_pgrp; - cleanup_the_pipeline (); ---- 6357,6364 ---- - #if defined (JOB_CONTROL) - old_pipeline_pgrp = pipeline_pgrp; -! /* Don't reset the pipeline pgrp if we're already a subshell in a pipeline or -! we've already forked to run a disk command (and are expanding redirections, -! for example). */ -! if ((subshell_environment & (SUBSHELL_FORK|SUBSHELL_PIPE)) == 0) - pipeline_pgrp = shell_pgrp; - cleanup_the_pipeline (); - -*** ../bash-5.1/patchlevel.h 2020-06-22 14:51:03.000000000 -0400 ---- patchlevel.h 2020-10-01 11:01:28.000000000 -0400 -*************** -*** 26,30 **** - looks for to find the patch level (for the sccs version string). */ - -! #define PATCHLEVEL 2 - - #endif /* _PATCHLEVEL_H_ */ ---- 26,30 ---- - looks for to find the patch level (for the sccs version string). */ - -! #define PATCHLEVEL 3 - - #endif /* _PATCHLEVEL_H_ */ diff --git a/patches/bash/bash51-004 b/patches/bash/bash51-004 deleted file mode 100644 index 39a6c647..00000000 --- a/patches/bash/bash51-004 +++ /dev/null @@ -1,126 +0,0 @@ - BASH PATCH REPORT - ================= - -Bash-Release: 5.1 -Patch-ID: bash51-004 - -Bug-Reported-by: oguzismailuysal@gmail.com -Bug-Reference-ID: -Bug-Reference-URL: https://lists.gnu.org/archive/html/bug-bash/2020-12/msg00039.html - -Bug-Description: - -If a key-value compound array assignment to an associative array is supplied -as an assignment statement argument to the `declare' command that declares the -array, the assignment doesn't perform the correct word expansions. - -This patch makes key-value assignment and subscript assignment perform the -same expansions when they're supplied as an argument to `declare'. - -Patch (apply with `patch -p0'): - -*** ../bash-5.1-patched/arrayfunc.c 2020-10-09 11:38:58.000000000 -0400 ---- arrayfunc.c 2020-12-11 15:12:22.000000000 -0500 -*************** -*** 598,601 **** ---- 598,622 ---- - } - } -+ -+ /* Return non-zero if L appears to be a key-value pair associative array -+ compound assignment. */ -+ int -+ kvpair_assignment_p (l) -+ WORD_LIST *l; -+ { -+ return (l && (l->word->flags & W_ASSIGNMENT) == 0 && l->word->word[0] != '['); /*]*/ -+ } -+ -+ char * -+ expand_and_quote_kvpair_word (w) -+ char *w; -+ { -+ char *t, *r; -+ -+ t = w ? expand_assignment_string_to_string (w, 0) : 0; -+ r = sh_single_quote (t ? t : ""); -+ free (t); -+ return r; -+ } - #endif - -*************** -*** 641,645 **** - - #if ASSOC_KVPAIR_ASSIGNMENT -! if (assoc_p (var) && nlist && (nlist->word->flags & W_ASSIGNMENT) == 0 && nlist->word->word[0] != '[') /*]*/ - { - iflags = flags & ~ASS_APPEND; ---- 662,666 ---- - - #if ASSOC_KVPAIR_ASSIGNMENT -! if (assoc_p (var) && kvpair_assignment_p (nlist)) - { - iflags = flags & ~ASS_APPEND; -*** ../bash-5.1-patched/arrayfunc.h 2020-04-29 17:24:15.000000000 -0400 ---- arrayfunc.h 2020-12-11 14:23:50.000000000 -0500 -*************** -*** 68,71 **** ---- 68,74 ---- - extern void quote_compound_array_list PARAMS((WORD_LIST *, int)); - -+ extern int kvpair_assignment_p PARAMS((WORD_LIST *)); -+ extern char *expand_and_quote_kvpair_word PARAMS((char *)); -+ - extern int unbind_array_element PARAMS((SHELL_VAR *, char *, int)); - extern int skipsubscript PARAMS((const char *, int, int)); -*** ../bash-5.1-patched/subst.c 2020-11-16 10:33:15.000000000 -0500 ---- subst.c 2020-12-11 15:11:10.000000000 -0500 -*************** -*** 11605,11608 **** ---- 11605,11609 ---- - WORD_LIST *l, *nl; - char *t; -+ int kvpair; - - if (flags == 0) -*************** -*** 11619,11622 **** ---- 11620,11627 ---- - /* Associative array */ - l = parse_string_to_word_list (value, 1, "array assign"); -+ #if ASSOC_KVPAIR_ASSIGNMENT -+ kvpair = kvpair_assignment_p (l); -+ #endif -+ - /* For associative arrays, with their arbitrary subscripts, we have to - expand and quote in one step so we don't have to search for the -*************** -*** 11624,11627 **** ---- 11629,11638 ---- - for (nl = l; nl; nl = nl->next) - { -+ #if ASSOC_KVPAIR_ASSIGNMENT -+ if (kvpair) -+ /* keys and values undergo the same set of expansions */ -+ t = expand_and_quote_kvpair_word (nl->word->word); -+ else -+ #endif - if ((nl->word->flags & W_ASSIGNMENT) == 0) - t = sh_single_quote (nl->word->word ? nl->word->word : ""); - -*** ../bash-5.1/patchlevel.h 2020-06-22 14:51:03.000000000 -0400 ---- patchlevel.h 2020-10-01 11:01:28.000000000 -0400 -*************** -*** 26,30 **** - looks for to find the patch level (for the sccs version string). */ - -! #define PATCHLEVEL 3 - - #endif /* _PATCHLEVEL_H_ */ ---- 26,30 ---- - looks for to find the patch level (for the sccs version string). */ - -! #define PATCHLEVEL 4 - - #endif /* _PATCHLEVEL_H_ */ diff --git a/patches/bash/bash51-005 b/patches/bash/bash51-005 deleted file mode 100644 index dee89561..00000000 --- a/patches/bash/bash51-005 +++ /dev/null @@ -1,100 +0,0 @@ - BASH PATCH REPORT - ================= - -Bash-Release: 5.1 -Patch-ID: bash51-005 - -Bug-Reported-by: Alexander Mescheryakov , - konsolebox -Bug-Reference-ID: <5ffd7f3d.1c69fb81.dee25.166c@mx.google.com>, - -Bug-Reference-URL: https://lists.gnu.org/archive/html/bug-bash/2021-01/msg00082.html, - https://lists.gnu.org/archive/html/bug-bash/2021-04/msg00160.html - -Bug-Description: - -Fix two memory leaks when assigning arrays using compound assignment syntax. - -Patch (apply with `patch -p0'): - -*** ../bash-5.1-patched/subst.c 2020-12-16 17:01:32.000000000 -0500 ---- subst.c 2021-01-24 17:48:40.000000000 -0500 -*************** -*** 11674,11677 **** ---- 11674,11679 ---- - - value = string_list (l); -+ dispose_words (l); -+ - wlen = STRLEN (value); - -*** ../bash-5.1-patched/arrayfunc.c 2020-12-16 17:01:32.000000000 -0500 ---- arrayfunc.c 2021-04-19 16:43:09.000000000 -0400 -*************** -*** 565,574 **** - WORD_LIST *list; - char *akey, *aval, *k, *v; -- int free_aval; - - for (list = nlist; list; list = list->next) - { -- free_aval = 0; -- - k = list->word->word; - v = list->next ? list->next->word->word : 0; ---- 565,571 ---- -*************** -*** 578,583 **** - - akey = expand_assignment_string_to_string (k, 0); -- aval = expand_assignment_string_to_string (v, 0); -- - if (akey == 0 || *akey == 0) - { ---- 575,578 ---- -*************** -*** 586,599 **** - continue; - } - if (aval == 0) - { - aval = (char *)xmalloc (1); - aval[0] = '\0'; /* like do_assignment_internal */ -- free_aval = 1; - } - - bind_assoc_var_internal (var, h, akey, aval, flags); -! if (free_aval) -! free (aval); - } - } ---- 581,594 ---- - continue; - } -+ -+ aval = expand_assignment_string_to_string (v, 0); - if (aval == 0) - { - aval = (char *)xmalloc (1); - aval[0] = '\0'; /* like do_assignment_internal */ - } - - bind_assoc_var_internal (var, h, akey, aval, flags); -! free (aval); - } - } -*** ../bash-5.1/patchlevel.h 2020-06-22 14:51:03.000000000 -0400 ---- patchlevel.h 2020-10-01 11:01:28.000000000 -0400 -*************** -*** 26,30 **** - looks for to find the patch level (for the sccs version string). */ - -! #define PATCHLEVEL 4 - - #endif /* _PATCHLEVEL_H_ */ ---- 26,30 ---- - looks for to find the patch level (for the sccs version string). */ - -! #define PATCHLEVEL 5 - - #endif /* _PATCHLEVEL_H_ */ diff --git a/patches/bash/bash51-006 b/patches/bash/bash51-006 deleted file mode 100644 index dcabf811..00000000 --- a/patches/bash/bash51-006 +++ /dev/null @@ -1,48 +0,0 @@ - BASH PATCH REPORT - ================= - -Bash-Release: 5.1 -Patch-ID: bash51-006 - -Bug-Reported-by: oguzismailuysal@gmail.com -Bug-Reference-ID: -Bug-Reference-URL: https://lists.gnu.org/archive/html/bug-bash/2020-12/msg00108.html - -Bug-Description: - -Make sure child processes forked to run command substitutions are in the -proper process group. - -Patch (apply with `patch -p0'): - -*** ../bash-5.1-patched/subst.c 2020-12-16 17:01:32.000000000 -0500 ---- subst.c 2020-12-25 19:20:25.000000000 -0500 -*************** -*** 6413,6416 **** ---- 6413,6423 ---- - interactive = 0; - -+ #if defined (JOB_CONTROL) -+ /* Invariant: in child processes started to run command substitutions, -+ pipeline_pgrp == shell_pgrp. Other parts of the shell assume this. */ -+ if (pipeline_pgrp > 0 && pipeline_pgrp != shell_pgrp) -+ shell_pgrp = pipeline_pgrp; -+ #endif -+ - set_sigint_handler (); /* XXX */ - -*** ../bash-5.1/patchlevel.h 2020-06-22 14:51:03.000000000 -0400 ---- patchlevel.h 2020-10-01 11:01:28.000000000 -0400 -*************** -*** 26,30 **** - looks for to find the patch level (for the sccs version string). */ - -! #define PATCHLEVEL 5 - - #endif /* _PATCHLEVEL_H_ */ ---- 26,30 ---- - looks for to find the patch level (for the sccs version string). */ - -! #define PATCHLEVEL 6 - - #endif /* _PATCHLEVEL_H_ */ diff --git a/patches/bash/bash51-007 b/patches/bash/bash51-007 deleted file mode 100644 index ffd04fa4..00000000 --- a/patches/bash/bash51-007 +++ /dev/null @@ -1,95 +0,0 @@ - BASH PATCH REPORT - ================= - -Bash-Release: 5.1 -Patch-ID: bash51-007 - -Bug-Reported-by: Tom Tromey -Bug-Reference-ID: <875z3u9fd0.fsf@tromey.com> -Bug-Reference-URL: https://lists.gnu.org/archive/html/bug-readline/2021-01/msg00009.html - -Bug-Description: - -The code to check readline versions in an inputrc file had the sense of the -comparisons reversed. - -Patch (apply with `patch -p0'): - -*** ../bash-5.1-patched/lib/readline/bind.c 2020-10-26 10:03:14.000000000 -0400 ---- lib/readline/bind.c 2021-01-18 16:38:48.000000000 -0500 -*************** -*** 1235,1239 **** - else if (_rl_strnicmp (args, "version", 7) == 0) - { -! int rlversion, versionarg, op, previ, major, minor; - - _rl_parsing_conditionalized_out = 1; ---- 1235,1239 ---- - else if (_rl_strnicmp (args, "version", 7) == 0) - { -! int rlversion, versionarg, op, previ, major, minor, opresult; - - _rl_parsing_conditionalized_out = 1; -*************** -*** 1295,1316 **** - { - case OP_EQ: -! _rl_parsing_conditionalized_out = rlversion == versionarg; - break; - case OP_NE: -! _rl_parsing_conditionalized_out = rlversion != versionarg; - break; - case OP_GT: -! _rl_parsing_conditionalized_out = rlversion > versionarg; - break; - case OP_GE: -! _rl_parsing_conditionalized_out = rlversion >= versionarg; - break; - case OP_LT: -! _rl_parsing_conditionalized_out = rlversion < versionarg; - break; - case OP_LE: -! _rl_parsing_conditionalized_out = rlversion <= versionarg; - break; - } - } - /* Check to see if the first word in ARGS is the same as the ---- 1295,1317 ---- - { - case OP_EQ: -! opresult = rlversion == versionarg; - break; - case OP_NE: -! opresult = rlversion != versionarg; - break; - case OP_GT: -! opresult = rlversion > versionarg; - break; - case OP_GE: -! opresult = rlversion >= versionarg; - break; - case OP_LT: -! opresult = rlversion < versionarg; - break; - case OP_LE: -! opresult = rlversion <= versionarg; - break; - } -+ _rl_parsing_conditionalized_out = 1 - opresult; - } - /* Check to see if the first word in ARGS is the same as the -*** ../bash-5.1/patchlevel.h 2020-06-22 14:51:03.000000000 -0400 ---- patchlevel.h 2020-10-01 11:01:28.000000000 -0400 -*************** -*** 26,30 **** - looks for to find the patch level (for the sccs version string). */ - -! #define PATCHLEVEL 6 - - #endif /* _PATCHLEVEL_H_ */ ---- 26,30 ---- - looks for to find the patch level (for the sccs version string). */ - -! #define PATCHLEVEL 7 - - #endif /* _PATCHLEVEL_H_ */ diff --git a/patches/bash/bash51-008 b/patches/bash/bash51-008 deleted file mode 100644 index ece214f0..00000000 --- a/patches/bash/bash51-008 +++ /dev/null @@ -1,61 +0,0 @@ - BASH PATCH REPORT - ================= - -Bash-Release: 5.1 -Patch-ID: bash51-008 - -Bug-Reported-by: Michael Felt -Bug-Reference-ID: -Bug-Reference-URL: https://lists.gnu.org/archive/html/bug-bash/2021-03/msg00028.html - -Bug-Description: - -Process substitution FIFOs opened by child processes as targets of redirections -were not removed appropriately, leaving remnants in the file system. - -Patch (apply with `patch -p0'): - -*** ../bash-5.1-patched/execute_cmd.c 2020-10-12 10:16:13.000000000 -0400 ---- execute_cmd.c 2021-05-04 11:12:39.000000000 -0400 -*************** -*** 5557,5565 **** - /* Try to remove named pipes that may have been created as the - result of redirections. */ -! unlink_fifo_list (); - #endif /* PROCESS_SUBSTITUTION */ - exit (EXECUTION_FAILURE); - } - - if (async) - interactive = old_interactive; ---- 5557,5571 ---- - /* Try to remove named pipes that may have been created as the - result of redirections. */ -! unlink_all_fifos (); - #endif /* PROCESS_SUBSTITUTION */ - exit (EXECUTION_FAILURE); - } - -+ #if defined (PROCESS_SUBSTITUTION) && !defined (HAVE_DEV_FD) -+ /* This should only contain FIFOs created as part of redirection -+ expansion. */ -+ unlink_all_fifos (); -+ #endif -+ - if (async) - interactive = old_interactive; -*** ../bash-5.1/patchlevel.h 2020-06-22 14:51:03.000000000 -0400 ---- patchlevel.h 2020-10-01 11:01:28.000000000 -0400 -*************** -*** 26,30 **** - looks for to find the patch level (for the sccs version string). */ - -! #define PATCHLEVEL 7 - - #endif /* _PATCHLEVEL_H_ */ ---- 26,30 ---- - looks for to find the patch level (for the sccs version string). */ - -! #define PATCHLEVEL 8 - - #endif /* _PATCHLEVEL_H_ */ diff --git a/patches/bash/bash51-009 b/patches/bash/bash51-009 deleted file mode 100644 index 2796c3b9..00000000 --- a/patches/bash/bash51-009 +++ /dev/null @@ -1,59 +0,0 @@ - BASH PATCH REPORT - ================= - -Bash-Release: 5.1 -Patch-ID: bash51-009 - -Bug-Reported-by: Julien Moutinho -Bug-Reference-ID: <20211004035906.5kiobuzkpeckmvwg@sourcephile.fr> -Bug-Reference-URL: https://lists.gnu.org/archive/html/bug-bash/2021-10/msg00022.html - -Bug-Description: - -The bash malloc implementation of malloc_usable_size() does not follow the -specification. This can cause library functions that use it to overwrite -memory bounds checking. - -Patch (apply with `patch -p0'): - -*** ../bash-5.1-patched/lib/malloc/malloc.c 2020-07-08 10:19:30.000000000 -0400 ---- lib/malloc/malloc.c 2021-10-05 16:10:55.000000000 -0400 -*************** -*** 1287,1297 **** - } - -! /* XXX - should we return 0 if ISFREE? */ -! maxbytes = binsize(p->mh_index); -! -! /* So the usable size is the maximum number of bytes in the bin less the -! malloc overhead */ -! maxbytes -= MOVERHEAD + MSLOP; -! return (maxbytes); - } - ---- 1358,1367 ---- - } - -! /* return 0 if ISFREE */ -! if (p->mh_alloc == ISFREE) -! return 0; -! -! /* Since we use bounds checking, the usable size is the last requested size. */ -! return (p->mh_nbytes); - } - -*** ../bash-5.1/patchlevel.h 2020-06-22 14:51:03.000000000 -0400 ---- patchlevel.h 2020-10-01 11:01:28.000000000 -0400 -*************** -*** 26,30 **** - looks for to find the patch level (for the sccs version string). */ - -! #define PATCHLEVEL 8 - - #endif /* _PATCHLEVEL_H_ */ ---- 26,30 ---- - looks for to find the patch level (for the sccs version string). */ - -! #define PATCHLEVEL 9 - - #endif /* _PATCHLEVEL_H_ */ diff --git a/patches/bash/bash51-010 b/patches/bash/bash51-010 deleted file mode 100644 index cfe6fa46..00000000 --- a/patches/bash/bash51-010 +++ /dev/null @@ -1,59 +0,0 @@ - BASH PATCH REPORT - ================= - -Bash-Release: 5.1 -Patch-ID: bash51-010 - -Bug-Reported-by: Jonas Alfredsson -Bug-Reference-ID: -Bug-Reference-URL: https://lists.gnu.org/archive/html/bug-bash/2021-05/msg00059.html - -Bug-Description: - -If `wait -n' is interrupted by a trapped signal other than SIGINT, it does -not completely clean up state, and that can prevent subsequent calls to -`wait -n' from working correctly. - -Patch (apply with `patch -p0'): - -*** ../bash-5.1-patched/builtins/wait.def 2020-12-16 17:13:12.000000000 -0500 ---- builtins/wait.def 2021-11-17 10:25:15.000000000 -0500 -*************** -*** 112,116 **** - WORD_LIST *list; - { -! int status, code, opt, nflag, wflags; - char *vname; - SHELL_VAR *pidvar; ---- 112,117 ---- - WORD_LIST *list; - { -! int status, code, opt, nflag; -! volatile int wflags; - char *vname; - SHELL_VAR *pidvar; -*************** -*** 181,184 **** ---- 188,193 ---- - status = 128 + wait_signal_received; - wait_sigint_cleanup (); -+ if (wflags & JWAIT_WAITING) -+ unset_waitlist (); - WAIT_RETURN (status); - } - -*** ../bash-5.1/patchlevel.h 2020-06-22 14:51:03.000000000 -0400 ---- patchlevel.h 2020-10-01 11:01:28.000000000 -0400 -*************** -*** 26,30 **** - looks for to find the patch level (for the sccs version string). */ - -! #define PATCHLEVEL 9 - - #endif /* _PATCHLEVEL_H_ */ ---- 26,30 ---- - looks for to find the patch level (for the sccs version string). */ - -! #define PATCHLEVEL 10 - - #endif /* _PATCHLEVEL_H_ */ diff --git a/patches/bash/bash51-011 b/patches/bash/bash51-011 deleted file mode 100644 index 655c7ec8..00000000 --- a/patches/bash/bash51-011 +++ /dev/null @@ -1,81 +0,0 @@ - BASH PATCH REPORT - ================= - -Bash-Release: 5.1 -Patch-ID: bash51-011 - -Bug-Reported-by: Alex fxmbsw7 Ratchev -Bug-Reference-ID: -Bug-Reference-URL: https://lists.gnu.org/archive/html/bug-bash/2020-11/msg00064.html - -Bug-Description: - -When reading a compound assignment, and running it through the parser to -split it into words, we need to save and restore any alias we're currently -expanding. - -Patch (apply with `patch -p0'): - -*** ../bash-5.1-patched/parse.y 2020-11-28 12:10:06.000000000 -0500 ---- parse.y 2021-10-13 11:04:27.000000000 -0400 -*************** -*** 6494,6501 **** - - push_stream (1); -- #if 0 /* TAG: bash-5.2 Alex fxmbsw7 Ratchev 11/17/2020 */ - if (ea = expanding_alias ()) - parser_save_alias (); -- #endif - last_read_token = WORD; /* WORD to allow reserved words here */ - current_command_line_count = 0; ---- 6494,6499 ---- -*************** -*** 6532,6539 **** - pop_stream (); - -- #if 0 /* TAG: bash-5.2 */ - if (ea) - parser_restore_alias (); -- #endif - - #if defined (HISTORY) ---- 6530,6535 ---- -*** ../bash-5.1-patched/y.tab.c 2020-11-28 12:17:19.000000000 -0500 ---- y.tab.c 2021-11-17 10:47:35.000000000 -0500 -*************** -*** 8788,8795 **** - - push_stream (1); -- #if 0 /* TAG: bash-5.2 Alex fxmbsw7 Ratchev 11/17/2020 */ - if (ea = expanding_alias ()) - parser_save_alias (); -- #endif - last_read_token = WORD; /* WORD to allow reserved words here */ - current_command_line_count = 0; ---- 8777,8782 ---- -*************** -*** 8826,8833 **** - pop_stream (); - -- #if 0 /* TAG: bash-5.2 */ - if (ea) - parser_restore_alias (); -- #endif - - #if defined (HISTORY) ---- 8813,8818 ---- -*** ../bash-5.1/patchlevel.h 2020-06-22 14:51:03.000000000 -0400 ---- patchlevel.h 2020-10-01 11:01:28.000000000 -0400 -*************** -*** 26,30 **** - looks for to find the patch level (for the sccs version string). */ - -! #define PATCHLEVEL 10 - - #endif /* _PATCHLEVEL_H_ */ ---- 26,30 ---- - looks for to find the patch level (for the sccs version string). */ - -! #define PATCHLEVEL 11 - - #endif /* _PATCHLEVEL_H_ */ diff --git a/patches/bash/bash51-012 b/patches/bash/bash51-012 deleted file mode 100644 index 22249188..00000000 --- a/patches/bash/bash51-012 +++ /dev/null @@ -1,198 +0,0 @@ - BASH PATCH REPORT - ================= - -Bash-Release: 5.1 -Patch-ID: bash51-012 - -Bug-Reported-by: Nikolay Borisov -Bug-Reference-ID: <1a715205-06ce-413b-c1c0-2f5639ce06c0@suse.com> -Bug-Reference-URL: https://lists.gnu.org/archive/html/bug-bash/2020-11/msg00091.html - -Bug-Description: - -There is a possible race condition that arises when a child process receives -a signal trapped by the parent before it can reset the signal dispositions. -The child process is not supposed to trap the signal in this circumstance. - -Patch (apply with `patch -p0'): - -*** ../bash-20201118/command.h 2020-08-14 15:04:39.000000000 -0400 ---- command.h 2020-11-27 15:18:02.000000000 -0500 -*************** -*** 125,128 **** ---- 125,129 ---- - #define SUBSHELL_COPROC 0x40 /* subshell from a coproc pipeline */ - #define SUBSHELL_RESETTRAP 0x80 /* subshell needs to reset trap strings on first call to trap */ -+ #define SUBSHELL_IGNTRAP 0x100 /* subshell should reset trapped signals from trap_handler */ - - /* A structure which represents a word. */ - -*** ../bash-20201118/execute_cmd.c 2020-11-23 14:16:48.000000000 -0500 ---- execute_cmd.c 2020-11-27 16:43:25.000000000 -0500 -*************** -*** 1548,1551 **** ---- 1548,1554 ---- - reset_signal_handlers (); - subshell_environment |= SUBSHELL_RESETTRAP; -+ /* Note that signal handlers have been reset, so we should no longer -+ reset the handler and resend trapped signals to ourselves. */ -+ subshell_environment &= ~SUBSHELL_IGNTRAP; - - /* We are in a subshell, so forget that we are running a trap handler or -*************** -*** 4321,4325 **** - cmdflags |= CMD_NO_FORK; - -! subshell_environment = SUBSHELL_FORK; /* XXX */ - if (pipe_in != NO_PIPE || pipe_out != NO_PIPE) - subshell_environment |= SUBSHELL_PIPE; ---- 4324,4329 ---- - cmdflags |= CMD_NO_FORK; - -! /* We redo some of what make_child() does with SUBSHELL_IGNTRAP */ -! subshell_environment = SUBSHELL_FORK|SUBSHELL_IGNTRAP; /* XXX */ - if (pipe_in != NO_PIPE || pipe_out != NO_PIPE) - subshell_environment |= SUBSHELL_PIPE; -*************** -*** 4575,4578 **** ---- 4580,4584 ---- - reset_signal_handlers (); - subshell_environment |= SUBSHELL_RESETTRAP; -+ subshell_environment &= ~SUBSHELL_IGNTRAP; - - if (async) -*************** -*** 5515,5518 **** ---- 5521,5525 ---- - /* Cancel traps, in trap.c. */ - restore_original_signals (); -+ subshell_environment &= ~SUBSHELL_IGNTRAP; - - #if defined (JOB_CONTROL) - -*** ../bash-20201118/jobs.c 2020-08-04 10:17:39.000000000 -0400 ---- jobs.c 2020-11-27 16:39:56.000000000 -0500 -*************** -*** 2218,2221 **** ---- 2218,2223 ---- - pid_t mypid; - -+ subshell_environment |= SUBSHELL_IGNTRAP; -+ - /* If this ends up being changed to modify or use `command' in the - child process, go back and change callers who free `command' in -diff -rC 2 ../bash-20201118/nojobs.c nojobs.c -*** ../bash-20201118/nojobs.c 2020-07-08 10:11:25.000000000 -0400 ---- nojobs.c 2020-11-27 16:38:36.000000000 -0500 -*************** -*** 576,579 **** ---- 576,581 ---- - #endif - -+ subshell_environment |= SUBSHELL_IGNTRAP; -+ - default_tty_job_signals (); - } - -*** ../bash-20201118/sig.c 2020-11-23 13:22:17.000000000 -0500 ---- sig.c 2020-11-28 10:21:43.000000000 -0500 -*************** -*** 56,60 **** - #endif - -! extern void initialize_siglist (); - - #if !defined (JOB_CONTROL) ---- 56,61 ---- - #endif - -! extern void initialize_siglist PARAMS((void)); -! extern void set_original_signal PARAMS((int, SigHandler *)); - - #if !defined (JOB_CONTROL) -*************** -*** 256,259 **** ---- 257,267 ---- - XHANDLER(i) = oact.sa_handler; - XSAFLAGS(i) = oact.sa_flags; -+ -+ #if 0 -+ set_original_signal (XSIG(i), XHANDLER(i)); /* optimization */ -+ #else -+ set_original_signal (XSIG(i), act.sa_handler); /* optimization */ -+ #endif -+ - /* Don't do anything with signals that are ignored at shell entry - if the shell is not interactive. */ - -*** ../bash-20201118/subst.c 2020-11-16 10:33:15.000000000 -0500 ---- subst.c 2020-11-27 16:07:00.000000000 -0500 -*************** -*** 5952,5955 **** ---- 5952,5956 ---- - /* Cancel traps, in trap.c. */ - restore_original_signals (); /* XXX - what about special builtins? bash-4.2 */ -+ subshell_environment &= ~SUBSHELL_IGNTRAP; - QUIT; /* catch any interrupts we got post-fork */ - setup_async_signals (); -*************** -*** 6383,6386 **** ---- 6384,6388 ---- - QUIT; /* catch any interrupts we got post-fork */ - subshell_environment |= SUBSHELL_RESETTRAP; -+ subshell_environment &= ~SUBSHELL_IGNTRAP; - } - - -diff -rC 2 ../bash-20201118/trap.c trap.c -*** ../bash-20201118/trap.c 2020-11-28 12:04:07.000000000 -0500 ---- trap.c 2020-11-28 10:22:10.000000000 -0500 -*************** -*** 482,485 **** ---- 482,511 ---- - } - -+ /* This means we're in a subshell, but have not yet reset the handler for -+ trapped signals. We're not supposed to execute the trap in this situation; -+ we should restore the original signal and resend the signal to ourselves -+ to preserve the Posix "signal traps that are not being ignored shall be -+ set to the default action" semantics. */ -+ if ((subshell_environment & SUBSHELL_IGNTRAP) && trap_list[sig] != (char *)IGNORE_SIG) -+ { -+ sigset_t mask; -+ -+ /* Paranoia */ -+ if (original_signals[sig] == IMPOSSIBLE_TRAP_HANDLER) -+ original_signals[sig] = SIG_DFL; -+ -+ restore_signal (sig); -+ -+ /* Make sure we let the signal we just caught through */ -+ sigemptyset (&mask); -+ sigprocmask (SIG_SETMASK, (sigset_t *)NULL, &mask); -+ sigdelset (&mask, sig); -+ sigprocmask (SIG_SETMASK, &mask, (sigset_t *)NULL); -+ -+ kill (getpid (), sig); -+ -+ SIGRETURN (0); -+ } -+ - if ((sig >= NSIG) || - (trap_list[sig] == (char *)DEFAULT_SIG) || - -*** ../bash-5.1/patchlevel.h 2020-06-22 14:51:03.000000000 -0400 ---- patchlevel.h 2020-10-01 11:01:28.000000000 -0400 -*************** -*** 26,30 **** - looks for to find the patch level (for the sccs version string). */ - -! #define PATCHLEVEL 11 - - #endif /* _PATCHLEVEL_H_ */ ---- 26,30 ---- - looks for to find the patch level (for the sccs version string). */ - -! #define PATCHLEVEL 12 - - #endif /* _PATCHLEVEL_H_ */ diff --git a/patches/bash/bash51-013 b/patches/bash/bash51-013 deleted file mode 100644 index f2413a58..00000000 --- a/patches/bash/bash51-013 +++ /dev/null @@ -1,43 +0,0 @@ - BASH PATCH REPORT - ================= - -Bash-Release: 5.1 -Patch-ID: bash51-013 - -Bug-Reported-by: Anders Kaseorg -Bug-Reference-ID: -Bug-Reference-URL: https://lists.gnu.org/archive/html/bug-bash/2021-11/msg00025.html - -Bug-Description: - -Bash did not always perform tilde expansion following an unquoted colon on -the rhs of an assignment statement in posix mode. - -Patch (apply with `patch -p0'): - -*** ../bash-20211028/subst.c 2021-10-18 16:09:58.000000000 -0400 ---- subst.c 2021-11-30 11:19:47.000000000 -0500 -*************** -*** 3826,3829 **** ---- 3826,3830 ---- - td.flags = W_ASSIGNRHS; - #endif -+ td.flags |= (W_NOGLOB|W_TILDEEXP); - td.word = savestring (string); - value = call_expand_word_internal (&td, quoted, 0, (int *)NULL, (int *)NULL); - -*** ../bash-5.1/patchlevel.h 2020-06-22 14:51:03.000000000 -0400 ---- patchlevel.h 2020-10-01 11:01:28.000000000 -0400 -*************** -*** 26,30 **** - looks for to find the patch level (for the sccs version string). */ - -! #define PATCHLEVEL 12 - - #endif /* _PATCHLEVEL_H_ */ ---- 26,30 ---- - looks for to find the patch level (for the sccs version string). */ - -! #define PATCHLEVEL 13 - - #endif /* _PATCHLEVEL_H_ */ diff --git a/patches/bash/bash51-014 b/patches/bash/bash51-014 deleted file mode 100644 index cd8df23a..00000000 --- a/patches/bash/bash51-014 +++ /dev/null @@ -1,48 +0,0 @@ - BASH PATCH REPORT - ================= - -Bash-Release: 5.1 -Patch-ID: bash51-014 - -Bug-Reported-by: platon7pronko@gmail.com -Bug-Reference-ID: -Bug-Reference-URL: https://savannah.gnu.org/patch/?10035 - -Bug-Description: - -Bash may produce corrupted input if a multibyte character spans a 512-byte -boundary while reading the output of a command substitution. - -Patch (apply with `patch -p0'): - -*** ../bash-20210217/subst.c 2021-02-03 10:32:08.000000000 -0500 ---- subst.c 2021-03-01 16:47:52.000000000 -0500 -*************** -*** 6243,6247 **** - /* punt on the hard case for now */ - memset (&ps, '\0', sizeof (mbstate_t)); -! mblen = mbrtowc (&wc, bufp-1, bufn+1, &ps); - if (MB_INVALIDCH (mblen) || mblen == 0 || mblen == 1) - istring[istring_index++] = c; ---- 6243,6247 ---- - /* punt on the hard case for now */ - memset (&ps, '\0', sizeof (mbstate_t)); -! mblen = mbrtowc (&wc, bufp-1, bufn, &ps); - if (MB_INVALIDCH (mblen) || mblen == 0 || mblen == 1) - istring[istring_index++] = c; - -*** ../bash-5.1/patchlevel.h 2020-06-22 14:51:03.000000000 -0400 ---- patchlevel.h 2020-10-01 11:01:28.000000000 -0400 -*************** -*** 26,30 **** - looks for to find the patch level (for the sccs version string). */ - -! #define PATCHLEVEL 13 - - #endif /* _PATCHLEVEL_H_ */ ---- 26,30 ---- - looks for to find the patch level (for the sccs version string). */ - -! #define PATCHLEVEL 14 - - #endif /* _PATCHLEVEL_H_ */ diff --git a/patches/bash/bash51-015 b/patches/bash/bash51-015 deleted file mode 100644 index 5ae65811..00000000 --- a/patches/bash/bash51-015 +++ /dev/null @@ -1,49 +0,0 @@ - BASH PATCH REPORT - ================= - -Bash-Release: 5.1 -Patch-ID: bash51-015 - -Bug-Reported-by: Volodymyr Prodan -Bug-Reference-ID: -Bug-Reference-URL: https://savannah.gnu.org/patch/?10076 - -Bug-Description: - -Patch (apply with `patch -p0'): - -There are some characters (e.g., cyrillic) that can't be displayed using -certain single-byte encodings (e.g., cp1251) because the negative signed -int is interpreted as EOF and not displayed. - -*** ../bash-20210524/lib/readline/display.c 2021-03-16 18:12:20.000000000 -0400 ---- lib/readline/display.c 2021-06-07 16:53:08.000000000 -0400 -*************** -*** 1599,1603 **** - - for (cur_face = FACE_NORMAL, i = 0; i < n; i++) -! putc_face (str[i], face[i], &cur_face); - putc_face (EOF, FACE_NORMAL, &cur_face); - } ---- 1599,1603 ---- - - for (cur_face = FACE_NORMAL, i = 0; i < n; i++) -! putc_face ((unsigned char) str[i], face[i], &cur_face); - putc_face (EOF, FACE_NORMAL, &cur_face); - } - -*** ../bash-5.1/patchlevel.h 2020-06-22 14:51:03.000000000 -0400 ---- patchlevel.h 2020-10-01 11:01:28.000000000 -0400 -*************** -*** 26,30 **** - looks for to find the patch level (for the sccs version string). */ - -! #define PATCHLEVEL 14 - - #endif /* _PATCHLEVEL_H_ */ ---- 26,30 ---- - looks for to find the patch level (for the sccs version string). */ - -! #define PATCHLEVEL 15 - - #endif /* _PATCHLEVEL_H_ */ diff --git a/patches/bash/bash51-016 b/patches/bash/bash51-016 deleted file mode 100644 index 4694498b..00000000 --- a/patches/bash/bash51-016 +++ /dev/null @@ -1,64 +0,0 @@ - BASH PATCH REPORT - ================= - -Bash-Release: 5.1 -Patch-ID: bash51-016 - -Bug-Reported-by: Vincent Menegaux -Bug-Reference-ID: -Bug-Reference-URL: https://savannah.gnu.org/patch/?10070 - -Bug-Description: - -Multiple `!' tokens should toggle negation of an expression in a [[ -conditional command, instead of simply negating the expression. - -Patch (apply with `patch -p0'): - -*** ../bash-20210515/parse.y 2021-04-21 15:32:50.000000000 -0400 ---- parse.y 2021-05-24 11:53:30.000000000 -0400 -*************** -*** 4797,4801 **** - term = cond_term (); - if (term) -! term->flags |= CMD_INVERT_RETURN; - } - else if (tok == WORD && yylval.word->word[0] == '-' && yylval.word->word[1] && yylval.word->word[2] == 0 && test_unop (yylval.word->word)) ---- 4797,4801 ---- - term = cond_term (); - if (term) -! term->flags ^= CMD_INVERT_RETURN; - } - else if (tok == WORD && yylval.word->word[0] == '-' && yylval.word->word[1] && yylval.word->word[2] == 0 && test_unop (yylval.word->word)) - -*** ../bash-20210515/y.tab.c 2021-05-14 15:50:41.000000000 -0400 ---- y.tab.c 2021-05-24 16:35:55.000000000 -0400 -*************** -*** 7091,7095 **** - term = cond_term (); - if (term) -! term->flags |= CMD_INVERT_RETURN; - } - else if (tok == WORD && yylval.word->word[0] == '-' && yylval.word->word[1] && yylval.word->word[2] == 0 && test_unop (yylval.word->word)) ---- 7091,7095 ---- - term = cond_term (); - if (term) -! term->flags ^= CMD_INVERT_RETURN; - } - else if (tok == WORD && yylval.word->word[0] == '-' && yylval.word->word[1] && yylval.word->word[2] == 0 && test_unop (yylval.word->word)) - -*** ../bash-5.1/patchlevel.h 2020-06-22 14:51:03.000000000 -0400 ---- patchlevel.h 2020-10-01 11:01:28.000000000 -0400 -*************** -*** 26,30 **** - looks for to find the patch level (for the sccs version string). */ - -! #define PATCHLEVEL 15 - - #endif /* _PATCHLEVEL_H_ */ ---- 26,30 ---- - looks for to find the patch level (for the sccs version string). */ - -! #define PATCHLEVEL 16 - - #endif /* _PATCHLEVEL_H_ */ diff --git a/patches/os-prober/os-prober-gentoo-fix.patch b/patches/os-prober/os-prober-gentoo-fix.patch deleted file mode 100644 index 8545db25..00000000 --- a/patches/os-prober/os-prober-gentoo-fix.patch +++ /dev/null @@ -1,13 +0,0 @@ -Index: os-prober/linux-boot-probes/mounted/common/90fallback -=================================================================== ---- os-prober.orig/linux-boot-probes/mounted/common/90fallback -+++ os-prober/linux-boot-probes/mounted/common/90fallback -@@ -33,7 +33,7 @@ for kernpat in /vmlinuz /vmlinux /boot/v - # Dracut initramfses are named differently again. - initrdname3=$(echo "$kernfile" | sed "s/vmlinu[zx]/initramfs\*/" | sed 's/$/.img/') - # And Gentoo's also -- initrdname4=$(echo "$kernfile" | sed "s/kernel/initramfs\*/") -+ initrdname4=$(echo "$kernfile" | sed "s/kernel\|vmlinu[zx]/initramfs\*/") - foundinitrd=0 - for initrd in $(eval ls "$initrdname" "$initrdname1" "$initrdname2" "$initrdname3" "$initrdname4" 2>/dev/null); do - if [ "$initrd" != "$kernfile" ] && [ -f "$initrd" ] && [ ! -L "$initrd" ]; then diff --git a/patches/os-prober/os-prober-grepfix.patch b/patches/os-prober/os-prober-grepfix.patch deleted file mode 100644 index 4dadd4f5..00000000 --- a/patches/os-prober/os-prober-grepfix.patch +++ /dev/null @@ -1,13 +0,0 @@ -Index: os-prober/os-probes/mounted/x86/83haiku -=================================================================== ---- os-prober.orig/os-probes/mounted/x86/83haiku -+++ os-prober/os-probes/mounted/x86/83haiku -@@ -13,7 +13,7 @@ case "$type" in - *) debug "$partition is not a BeFS partition: exiting"; exit 1 ;; - esac - --if head -c 512 "$partition" | grep -qs "system.haiku_loader"; then -+if head -c 512 "$partition" | grep -aqs "system.haiku_loader"; then - debug "Stage 1 bootloader found" - else - debug "Stage 1 bootloader not found: exiting" diff --git a/patches/os-prober/os-prober-grub2-parsefix.patch b/patches/os-prober/os-prober-grub2-parsefix.patch deleted file mode 100644 index 0ef8bdaf..00000000 --- a/patches/os-prober/os-prober-grub2-parsefix.patch +++ /dev/null @@ -1,22 +0,0 @@ -Index: os-prober-1.58/linux-boot-probes/mounted/common/40grub2 -=================================================================== ---- os-prober-1.58.orig/linux-boot-probes/mounted/common/40grub2 -+++ os-prober-1.58/linux-boot-probes/mounted/common/40grub2 -@@ -77,7 +77,7 @@ parse_grub_menu () { - ignore_item=1 - fi - ;; -- linux) -+ linux*) - # Hack alert: sed off any (hdn,n) but - # assume the kernel is on the same - # partition. -@@ -90,7 +90,7 @@ parse_grub_menu () { - kernel="/boot$kernel" - fi - ;; -- initrd) -+ initrd*) - initrd="$(echo "$2" | sed 's/(.*)//')" - # Initrd same. - if [ "$partition" != "$bootpart" ]; then diff --git a/patches/readline/readline81-001 b/patches/readline/readline81-001 deleted file mode 100644 index 2f99282c..00000000 --- a/patches/readline/readline81-001 +++ /dev/null @@ -1,92 +0,0 @@ - READLINE PATCH REPORT - ===================== - -Readline-Release: 8.1 -Patch-ID: readline81-001 - -Bug-Reported-by: Tom Tromey -Bug-Reference-ID: <875z3u9fd0.fsf@tromey.com> -Bug-Reference-URL: https://lists.gnu.org/archive/html/bug-readline/2021-01/msg00009.html - -Bug-Description: - -The code to check readline versions in an inputrc file had the sense of the -comparisons reversed. - -Patch (apply with `patch -p0'): - -*** ../readline-8.1-patched/bind.c 2020-10-26 10:03:14.000000000 -0400 ---- bind.c 2021-01-18 16:38:48.000000000 -0500 -*************** -*** 1235,1239 **** - else if (_rl_strnicmp (args, "version", 7) == 0) - { -! int rlversion, versionarg, op, previ, major, minor; - - _rl_parsing_conditionalized_out = 1; ---- 1235,1239 ---- - else if (_rl_strnicmp (args, "version", 7) == 0) - { -! int rlversion, versionarg, op, previ, major, minor, opresult; - - _rl_parsing_conditionalized_out = 1; -*************** -*** 1295,1316 **** - { - case OP_EQ: -! _rl_parsing_conditionalized_out = rlversion == versionarg; - break; - case OP_NE: -! _rl_parsing_conditionalized_out = rlversion != versionarg; - break; - case OP_GT: -! _rl_parsing_conditionalized_out = rlversion > versionarg; - break; - case OP_GE: -! _rl_parsing_conditionalized_out = rlversion >= versionarg; - break; - case OP_LT: -! _rl_parsing_conditionalized_out = rlversion < versionarg; - break; - case OP_LE: -! _rl_parsing_conditionalized_out = rlversion <= versionarg; - break; - } - } - /* Check to see if the first word in ARGS is the same as the ---- 1295,1317 ---- - { - case OP_EQ: -! opresult = rlversion == versionarg; - break; - case OP_NE: -! opresult = rlversion != versionarg; - break; - case OP_GT: -! opresult = rlversion > versionarg; - break; - case OP_GE: -! opresult = rlversion >= versionarg; - break; - case OP_LT: -! opresult = rlversion < versionarg; - break; - case OP_LE: -! opresult = rlversion <= versionarg; - break; - } -+ _rl_parsing_conditionalized_out = 1 - opresult; - } - /* Check to see if the first word in ARGS is the same as the - -*** ../readline-8.1/patchlevel 2013-11-15 08:11:11.000000000 -0500 ---- patchlevel 2014-03-21 08:28:40.000000000 -0400 -*************** -*** 1,3 **** - # Do not edit -- exists only for use by patch - -! 0 ---- 1,3 ---- - # Do not edit -- exists only for use by patch - -! 1 diff --git a/patches/readline/readline81-002 b/patches/readline/readline81-002 deleted file mode 100644 index 3fbfb794..00000000 --- a/patches/readline/readline81-002 +++ /dev/null @@ -1,45 +0,0 @@ - READLINE PATCH REPORT - ===================== - -Readline-Release: 8.1 -Patch-ID: readline81-002 - -Bug-Reported-by: Volodymyr Prodan -Bug-Reference-ID: -Bug-Reference-URL: https://savannah.gnu.org/patch/?10076 - -Bug-Description: - -There are some characters (e.g., cyrillic) that can't be displayed using -certain single-byte encodings (e.g., cp1251) because the negative signed -int is interpreted as EOF and not displayed. - -Patch (apply with `patch -p0'): - -*** ../readline-8.1-patched/display.c 2021-03-16 18:12:20.000000000 -0400 ---- display.c 2021-06-07 16:53:08.000000000 -0400 -*************** -*** 1599,1603 **** - - for (cur_face = FACE_NORMAL, i = 0; i < n; i++) -! putc_face (str[i], face[i], &cur_face); - putc_face (EOF, FACE_NORMAL, &cur_face); - } ---- 1599,1603 ---- - - for (cur_face = FACE_NORMAL, i = 0; i < n; i++) -! putc_face ((unsigned char) str[i], face[i], &cur_face); - putc_face (EOF, FACE_NORMAL, &cur_face); - } - -*** ../readline-8.1/patchlevel 2013-11-15 08:11:11.000000000 -0500 ---- patchlevel 2014-03-21 08:28:40.000000000 -0400 -*************** -*** 1,3 **** - # Do not edit -- exists only for use by patch - -! 1 ---- 1,3 ---- - # Do not edit -- exists only for use by patch - -! 2 diff --git a/patches/readline/readline82-001 b/patches/readline/readline82-001 new file mode 100644 index 00000000..a13ff428 --- /dev/null +++ b/patches/readline/readline82-001 @@ -0,0 +1,42 @@ + READLINE PATCH REPORT + ===================== + +Readline-Release: 8.2 +Patch-ID: readline82-001 + +Bug-Reported-by: Kan-Ru Chen +Bug-Reference-ID: +Bug-Reference-URL: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021109 + +Bug-Description: + +Starting a readline application with an invalid locale specification for +LC_ALL/LANG/LC_CTYPE can cause it crash on the first call to readline. + +Patch (apply with `patch -p0'): + +*** ../readline-8.2-patched/nls.c 2022-08-15 09:38:51.000000000 -0400 +--- nls.c 2022-10-05 09:23:22.000000000 -0400 +*************** +*** 142,145 **** +--- 142,149 ---- + lspec = ""; + ret = setlocale (LC_CTYPE, lspec); /* ok, since it does not change locale */ ++ if (ret == 0 || *ret == 0) ++ ret = setlocale (LC_CTYPE, (char *)NULL); ++ if (ret == 0 || *ret == 0) ++ ret = RL_DEFAULT_LOCALE; + #else + ret = (lspec == 0 || *lspec == 0) ? RL_DEFAULT_LOCALE : lspec; + +*** ../readline-8.2/patchlevel 2013-11-15 08:11:11.000000000 -0500 +--- patchlevel 2014-03-21 08:28:40.000000000 -0400 +*************** +*** 1,3 **** + # Do not edit -- exists only for use by patch + +! 0 +--- 1,3 ---- + # Do not edit -- exists only for use by patch + +! 1 diff --git a/patches/sysvinit/sysvinit-2.98-dragora_consolidated-1.patch b/patches/sysvinit/sysvinit-3.06-dragora_consolidated-1.patch similarity index 84% rename from patches/sysvinit/sysvinit-2.98-dragora_consolidated-1.patch rename to patches/sysvinit/sysvinit-3.06-dragora_consolidated-1.patch index d113aac1..62b35a50 100644 --- a/patches/sysvinit/sysvinit-2.98-dragora_consolidated-1.patch +++ b/patches/sysvinit/sysvinit-3.06-dragora_consolidated-1.patch @@ -1,6 +1,6 @@ ---- sysvinit-2.98/src/Makefile.orig 2020-11-16 22:52:07.000000000 -0300 -+++ sysvinit-2.98/src/Makefile 2021-01-20 07:02:04.447372390 -0300 -@@ -23,19 +23,19 @@ +--- sysvinit-3.06/src/Makefile.orig 2022-12-16 14:07:55.000000000 -0300 ++++ sysvinit-3.06/src/Makefile 2022-12-16 17:54:07.621053941 -0300 +@@ -23,19 +23,17 @@ # For some known distributions we do not build all programs, otherwise we do. BIN = @@ -23,14 +23,12 @@ -MAN1 += utmpdump.1 wall.1 -MAN8 += sulogin.8 bootlogd.8 +SBIN += bootlogd -+#USRBIN += utmpdump wall -+#MAN1 += utmpdump.1 wall.1 +MAN8 += bootlogd.8 endif ifeq ($(DISTRO),Debian) -@@ -90,16 +90,16 @@ - endif +@@ -95,16 +93,16 @@ + ROOT ?= $(DESTDIR) # Additional libs for GNU libc. -ifneq ($(wildcard $(ROOT)/usr/lib*/libcrypt.*),) @@ -54,22 +52,22 @@ all: $(BIN) $(SBIN) $(USRBIN) -@@ -208,10 +208,10 @@ +@@ -213,10 +211,10 @@ ln -sf halt $(ROOT)/sbin/reboot ln -sf halt $(ROOT)/sbin/poweroff ln -sf init $(ROOT)/sbin/telinit -- ln -sf /sbin/killall5 $(ROOT)/bin/pidof +- ln -sf ../sbin/killall5 $(ROOT)/bin/pidof - if [ ! -f $(ROOT)/usr/bin/lastb ]; then \ - ln -sf last $(ROOT)/usr/bin/lastb; \ - fi -+ #ln -sf /sbin/killall5 $(ROOT)/bin/pidof ++ #ln -sf ../sbin/killall5 $(ROOT)/bin/pidof + #if [ ! -f $(ROOT)/usr/bin/lastb ]; then \ + # ln -sf last $(ROOT)/usr/bin/lastb; \ + #fi $(INSTALL_DIR) $(ROOT)/usr/include/ $(INSTALL_DATA) initreq.h $(ROOT)/usr/include/ - $(INSTALL_DIR) $(ROOT)$(MANDIR)/man1/ -@@ -233,8 +233,8 @@ + for man in $(MANPAGES) ; do \ +@@ -229,8 +227,8 @@ # # This part is skipped on Debian systems, the # debian.preinst script takes care of it. diff --git a/recipes/boot/efivar/recipe b/recipes/boot/efivar/recipe index 9f07f6da..343182b8 100644 --- a/recipes/boot/efivar/recipe +++ b/recipes/boot/efivar/recipe @@ -19,8 +19,8 @@ set -e program=efivar -version=20220418_6be2cb1 -release=4 +version=20220927_dd901c1 +release=1 # Define a category for the output of the package name pkgcategory=boot diff --git a/recipes/boot/eudev/recipe b/recipes/boot/eudev/recipe index a7a451cd..7526fab9 100644 --- a/recipes/boot/eudev/recipe +++ b/recipes/boot/eudev/recipe @@ -18,8 +18,8 @@ set -e program=eudev -version=3.2.11 -release=3 +version=3.2.12-pre3 +release=1 # Define a category for the output of the package name pkgcategory=boot diff --git a/recipes/boot/os-prober/recipe b/recipes/boot/os-prober/recipe index 1b3b26b8..ae9a26fb 100644 --- a/recipes/boot/os-prober/recipe +++ b/recipes/boot/os-prober/recipe @@ -1,6 +1,7 @@ # Build recipe for os-prober. # # Copyright (c) 2019, 2021 Matias Fonzo, . +# Copyright (c) 2022 Matias Fonzo, . # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. @@ -18,7 +19,7 @@ set -e program=os-prober -version=1.79 +version=1.81 release=1 # Define a category for the output of the package name @@ -43,9 +44,6 @@ license=GPLv2+ docs="README TODO debian/changelog debian/copyright" docsdir="${docdir}/${program}-${version}" -# The source directory has a custom name -srcdir=${program} - build() { unpack "${tardir}/$tarname" @@ -54,18 +52,17 @@ build() # Import patches from Fedora to make os-prober more reliable patch -Np1 -i "${worktree}/patches/os-prober/os-prober-no-dummy-mach-kernel.patch" + # Sent upstream patch -Np1 -i "${worktree}/patches/os-prober/os-prober-mdraidfix.patch" patch -Np1 -i "${worktree}/patches/os-prober/os-prober-btrfsfix.patch" patch -Np1 -i "${worktree}/patches/os-prober/os-prober-bootpart-name-fix.patch" patch -Np1 -i "${worktree}/patches/os-prober/os-prober-mounted-partitions-fix.patch" patch -Np1 -i "${worktree}/patches/os-prober/os-prober-factor-out-logger.patch" + # To be sent upstream patch -Np1 -i "${worktree}/patches/os-prober/os-prober-factored-logger-efi-fix.patch" patch -Np1 -i "${worktree}/patches/os-prober/os-prober-umount-fix.patch" - patch -Np1 -i "${worktree}/patches/os-prober/os-prober-grub2-parsefix.patch" - patch -Np1 -i "${worktree}/patches/os-prober/os-prober-grepfix.patch" - patch -Np1 -i "${worktree}/patches/os-prober/os-prober-gentoo-fix.patch" # Use 'libsuffix' if defined if test -n "$libSuffix" diff --git a/recipes/boot/sysvinit/recipe b/recipes/boot/sysvinit/recipe index e90323fa..a00186f7 100644 --- a/recipes/boot/sysvinit/recipe +++ b/recipes/boot/sysvinit/recipe @@ -18,7 +18,7 @@ set -e program=sysvinit -version=3.01 +version=3.06 release=1 # Define a category for the output of the package name @@ -27,7 +27,10 @@ pkgcategory=boot tarname=${program}-${version}.tar.xz # Remote source(s) -fetch=https://download.savannah.nongnu.org/releases/sysvinit/$tarname +fetch=" + https://github.com/slicer69/sysvinit/releases/download/${version}/$tarname + https://download.savannah.nongnu.org/releases/sysvinit/$tarname +" description=" The System V init (version $version). @@ -61,7 +64,7 @@ build() patch -p0 < "${worktree}/patches/sysvinit/sysvinit-adjust_paths.h.diff" # Remove several programs installed by other packages - patch -p1 < "${worktree}/patches/sysvinit/sysvinit-2.98-dragora_consolidated-1.patch" + patch -p1 < "${worktree}/patches/sysvinit/sysvinit-3.06-dragora_consolidated-1.patch" make -j${jobs} CPPFLAGS="$QICPPFLAGS -D_FORTIFY_SOURCE=1" CFLAGS="$QICFLAGS" STATIC="-static" make -j${jobs} ROOT="$destdir" install diff --git a/recipes/braille/liblouis/recipe b/recipes/braille/liblouis/recipe index e33e1a36..dd3f7efc 100644 --- a/recipes/braille/liblouis/recipe +++ b/recipes/braille/liblouis/recipe @@ -18,7 +18,7 @@ set -e program=liblouis -version=3.23.0 +version=3.24.0 release=1 # Define a category for the output of the package name diff --git a/recipes/compressors/bzip2/recipe b/recipes/compressors/bzip2/recipe index 545ea606..8633f045 100644 --- a/recipes/compressors/bzip2/recipe +++ b/recipes/compressors/bzip2/recipe @@ -1,6 +1,7 @@ # Build recipe for bzip2. # # Copyright (c) 2016-2018 Matias Fonzo, . +# Copyright (c) 2022 Matias Fonzo, . # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. @@ -18,8 +19,8 @@ set -e program=bzip2 -version=1.0.6 -release=2 +version=1.0.8 +release=1 # Define a category for the output of the package name pkgcategory=compressors @@ -28,8 +29,9 @@ tarname=${program}-${version}.tar.gz # Remote source(s) fetch=" -https://mirror.fsf.org/dragora/v3/sources/$tarname -https://www.bzip.org/${version}/$tarname + https://sourceware.org/pub/bzip2/$tarname + https://mirror.fsf.org/dragora/v3/sources/$tarname + https://www.bzip.org/${version}/$tarname " description=" @@ -74,24 +76,24 @@ build() # Build bzip2. # # Provide shared libraries for third party programs - make -f Makefile-libbz2_so + make CFLAGS="-fpic -fPIC -Wall -Winline $QICFLAGS -D_FILE_OFFSET_BITS=64" -f Makefile-libbz2_so make clean # Recompile program for static linking - make LDFLAGS="$QILDFLAGS -static" + make CFLAGS="-fpic -fPIC -Wall -Winline $QICFLAGS -D_FILE_OFFSET_BITS=64" LDFLAGS="$QILDFLAGS -static" make PREFIX="${destdir}/usr" install # Copy shared libraries into package destination cp -f -p libbz2.so* "${destdir}/usr/lib${libSuffix}" # Library measurement - strip -s "${destdir}/usr/lib${libSuffix}/libbz2.so.1.0.6" + strip -s "${destdir}/usr/lib${libSuffix}/libbz2.so.${version}" # Make soft links providing compatibility ( cd "${destdir}/usr/lib${libSuffix}" || exit 1 - ln -sf libbz2.so.1.0.6 libbz2.so.1.0 - ln -sf libbz2.so.1.0.6 libbz2.so + ln -sf libbz2.so.${version} libbz2.so.1.0 + ln -sf libbz2.so.${version} libbz2.so ) # Compress and link man pages (if needed) @@ -110,10 +112,6 @@ build() # Copy the rest of the documentation mkdir -p "${destdir}/$docsdir" - - for file in $docs - do - cp -p $file "${destdir}/$docsdir" - done + cp -p $docs "${destdir}/$docsdir" } diff --git a/recipes/compressors/gzip/recipe b/recipes/compressors/gzip/recipe index 9f825e5c..4f7feb3c 100644 --- a/recipes/compressors/gzip/recipe +++ b/recipes/compressors/gzip/recipe @@ -1,6 +1,7 @@ # Build recipe for gzip. # # Copyright (c) 2016-2018, 2020 Matias Fonzo, . +# Copyright (c) 2022 Matias Fonzo, . # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. @@ -18,8 +19,8 @@ set -e program=gzip -version=1.10 -release=3 +version=1.12 +release=1 # Define a category for the output of the package name pkgcategory=compressors @@ -56,7 +57,8 @@ build() # Set sane permissions chmod -R u+w,go-w,a+rX-s . - ./configure DEFS="NO_ASM" CPPFLAGS="$QICPPFLAGS" CFLAGS="$QICFLAGS" LDFLAGS="$QILDFLAGS -static" \ + ./configure DEFS="NO_ASM" CPPFLAGS="$QICPPFLAGS" \ + CFLAGS="$QICFLAGS" LDFLAGS="$QILDFLAGS -static" \ $configure_args \ --libdir=/usr/lib${libSuffix} \ --infodir=$infodir \ diff --git a/recipes/compressors/xz/recipe b/recipes/compressors/xz/recipe index 9d28cf75..ce0f593d 100644 --- a/recipes/compressors/xz/recipe +++ b/recipes/compressors/xz/recipe @@ -1,6 +1,7 @@ # Build recipe for xz. # # Copyright (c) 2016-2019, 2021 Matias Fonzo, . +# Copyright (c) 2022 Matias Fonzo, . # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. @@ -18,7 +19,7 @@ set -e program=xz -version=5.2.5 +version=5.4.0 release=1 # Define a category for the output of the package name @@ -61,7 +62,8 @@ build() # Set sane permissions chmod -R u+w,go-w,a+rX-s . - ./configure CPPFLAGS="$QICPPFLAGS" CFLAGS="$QICFLAGS" LDFLAGS="$QILDFLAGS" \ + ./configure CPPFLAGS="$QICPPFLAGS" \ + CFLAGS="$QICFLAGS" LDFLAGS="$QILDFLAGS" \ $configure_args \ --libdir=/usr/lib${libSuffix} \ --mandir=$mandir \ diff --git a/recipes/compressors/zutils/recipe b/recipes/compressors/zutils/recipe index d2d3c06f..5de2d97e 100644 --- a/recipes/compressors/zutils/recipe +++ b/recipes/compressors/zutils/recipe @@ -18,8 +18,8 @@ set -e program=zutils -version=1.11 -release=2 +version=1.12-rc1 +release=1 # Define a category for the output of the package name pkgcategory=compressors diff --git a/recipes/daemons/acpid/recipe b/recipes/daemons/acpid/recipe index fe1590d7..812e3d95 100644 --- a/recipes/daemons/acpid/recipe +++ b/recipes/daemons/acpid/recipe @@ -18,7 +18,7 @@ set -e program=acpid -version=2.0.33 +version=2.0.34 release=1 # Define a category for the output of the package name @@ -52,7 +52,8 @@ build() # Set sane permissions chmod -R u+w,go-w,a+rX-s . - ./configure CPPFLAGS="$QICPPFLAGS" CFLAGS="$QICFLAGS" LDFLAGS="$QILDFLAGS -static" \ + ./configure CPPFLAGS="$QICPPFLAGS" \ + CFLAGS="$QICFLAGS" LDFLAGS="$QILDFLAGS -static" \ $configure_args \ --libdir=/usr/lib${libSuffix} \ --mandir=$mandir \ diff --git a/recipes/daemons/at/recipe b/recipes/daemons/at/recipe index bbc121b7..f57154ae 100644 --- a/recipes/daemons/at/recipe +++ b/recipes/daemons/at/recipe @@ -18,7 +18,7 @@ set -e program=at -version=3.2.2 +version=3.2.5 release=1 # Define a category for the output of the package name @@ -68,9 +68,6 @@ build() # installed in the specified docdir (Thanks to BLFS!) sed -i '/docdir/s/=.*/= @docdir@/' Makefile.in - # Apply a patch (from "Void Linux") to solve build issues - patch -p0 < "${worktree}/patches/at/flex_isleap.patch" - ./configure CPPFLAGS="$QICPPFLAGS" \ CFLAGS="$QICFLAGS" LDFLAGS="$QILDFLAGS -static" \ SENDMAIL=/usr/sbin/sendmail \ diff --git a/recipes/daemons/sysklogd/recipe b/recipes/daemons/sysklogd/recipe index 863da679..fd1f8c82 100644 --- a/recipes/daemons/sysklogd/recipe +++ b/recipes/daemons/sysklogd/recipe @@ -18,7 +18,7 @@ set -e program=sysklogd -version=2.3.0 +version=2.4.4 release=1 # Define a category for the output of the package name diff --git a/recipes/devel/bc/recipe b/recipes/devel/bc/recipe index 1bdd1670..37aecc9d 100644 --- a/recipes/devel/bc/recipe +++ b/recipes/devel/bc/recipe @@ -18,13 +18,13 @@ set -e program=bc -version=5.2.1 +version=6.1.1 release=1 # Define a category for the output of the package name pkgcategory=devel -tarname=${program}-${version}.tar.xz +tarname=${program}-${version}.tar.gz # Remote source(s) fetch=https://github.com/gavinhoward/bc/releases/download/${version}/$tarname diff --git a/recipes/devel/ccache/recipe b/recipes/devel/ccache/recipe index 428c501c..422d3ae5 100644 --- a/recipes/devel/ccache/recipe +++ b/recipes/devel/ccache/recipe @@ -18,7 +18,7 @@ set -e program=ccache -version=4.7.1 +version=4.7.4 release=1 # Define a category for the output of the package name diff --git a/recipes/devel/clisp/recipe b/recipes/devel/clisp/recipe index 96a9f115..babad388 100644 --- a/recipes/devel/clisp/recipe +++ b/recipes/devel/clisp/recipe @@ -19,7 +19,7 @@ set -e program=clisp -version=20210628_de01f0f47; # From https://gitlab.com/gnu-clisp/clisp +version=20221021_1d0d0e998; # From https://gitlab.com/gnu-clisp/clisp release=1 # Define a category for the output of the package name @@ -57,6 +57,9 @@ license=GPLv2+ docs="ANNOUNCE COPYRIGHT GNU-GPL HACKING SUMMARY" docsdir="${docdir}/${program}-${version}" +# Limit parallel jobs of this build, otherwise ends in error +jobs=1 + build() { unpack "${tardir}/$tarname" @@ -71,6 +74,9 @@ build() mkdir BUILD cd BUILD + # Bogus files in order to continue with the build + touch clisp.pdf clisp-link.pdf + ../configure CPPFLAGS="$QICPPFLAGS" CFLAGS="$QICFLAGS" \ LDFLAGS="$QILDFLAGS" \ FORCE_UNSAFE_CONFIGURE=1 \ @@ -79,17 +85,20 @@ build() --libdir=/usr/lib${libSuffix} \ --mandir=$mandir \ --docdir=$docsdir \ - --disable-rpath \ --with-dynamic-ffi \ --with-module=berkeley-db \ --with-module=gdbm \ --with-module=pcre \ --with-module=zlib \ + --disable-mmap \ --build="$(gcc -dumpmachine)" - make -j${jobs} V=1 + make -j${jobs} V=1 all make -j${jobs} DESTDIR="$destdir" install + # Remove previous bogus files from the documentation + rm -f "${destdir}/$docsdir"/*.pdf + cd .. # Compress and link man pages (if needed) diff --git a/recipes/devel/elfutils/recipe b/recipes/devel/elfutils/recipe index 3e9c7343..bdbcc6cb 100644 --- a/recipes/devel/elfutils/recipe +++ b/recipes/devel/elfutils/recipe @@ -18,7 +18,7 @@ set -e program=elfutils -version=0.186 +version=0.188 release=1 # Define a category for the output of the package name diff --git a/recipes/devel/fossil/recipe b/recipes/devel/fossil/recipe index 5b78f735..7240c024 100644 --- a/recipes/devel/fossil/recipe +++ b/recipes/devel/fossil/recipe @@ -19,7 +19,7 @@ set -e program=fossil-src pkgname=fossil -version=2.19 +version=2.20 release=1 # Define a category for the output of the package name @@ -28,7 +28,7 @@ pkgcategory=devel tarname=${program}-${version}.tar.gz # Remote source(s) -fetch=https://www.fossil-scm.org/home/tarball/1e131febd3fbb028d00cab6d020214e8fe36be95daaf93237523c29c542e9a5f/$tarname +fetch=https://www.fossil-scm.org/home/tarball/210e89a0597f225f49722b096cf5563bf193e920e02a9bd38503a906deacd416/$tarname homepage=https://www.fossil-scm.org diff --git a/recipes/devel/gc/recipe b/recipes/devel/gc/recipe index 3af46527..a536de5e 100644 --- a/recipes/devel/gc/recipe +++ b/recipes/devel/gc/recipe @@ -18,7 +18,7 @@ set -e program=gc -version=8.0.6 +version=8.2.2 release=1 # Define a category for the output of the package name diff --git a/recipes/devel/gcc/recipe b/recipes/devel/gcc/recipe index 97997c8f..08b182ce 100644 --- a/recipes/devel/gcc/recipe +++ b/recipes/devel/gcc/recipe @@ -18,7 +18,7 @@ set -e program=gcc -version=11-20221111 +version=11-20221216 release=1 # Define a category for the output of the package name diff --git a/recipes/libs/readline/recipe b/recipes/libs/readline/recipe index c02d62fe..854b218d 100644 --- a/recipes/libs/readline/recipe +++ b/recipes/libs/readline/recipe @@ -18,8 +18,8 @@ set -e program=readline -version=8.1 -release=3 +version=8.2 +release=1 # Define a category for the output of the package name pkgcategory=libs @@ -27,7 +27,7 @@ pkgcategory=libs tarname=${program}-${version}.tar.gz # Remote source(s) -fetch=ftp://ftp.gnu.org/gnu/readline/$tarname +fetch=https://ftp.gnu.org/gnu/readline/$tarname description=" A library with line-editing capabilities. @@ -54,7 +54,7 @@ build() chmod -R u+w,go-w,a+rX-s . # Apply patches from upstream - for file in "${worktree}"/patches/readline/readline81-???* + for file in "${worktree}"/patches/readline/readline82-???* do if test -f "$file" then @@ -78,7 +78,7 @@ build() --infodir=$infodir \ --mandir=$mandir \ --docdir=$docsdir \ - --enable-static=yes \ + --enable-static=no \ --enable-shared=yes \ --build="$(gcc -dumpmachine)" diff --git a/recipes/shells/bash/recipe b/recipes/shells/bash/recipe index b01bf7d2..14e5ceb2 100644 --- a/recipes/shells/bash/recipe +++ b/recipes/shells/bash/recipe @@ -18,8 +18,8 @@ set -e program=bash -version=5.1 -release=4 +version=5.2.15 +release=1 # Define a category for the output of the package name pkgcategory=shells @@ -59,7 +59,7 @@ build() chmod -R u+w,go-w,a+rX-s . # Apply patches from upstream - for file in "${worktree}"/patches/bash/bash51-???* + for file in "${worktree}"/patches/bash/bash52-???* do if test -f "$file" then @@ -71,10 +71,10 @@ build() CFLAGS="$QICFLAGS" LDFLAGS="$QILDFLAGS" \ $configure_args \ --libdir=/usr/lib${libSuffix} \ + --libexecdir=/usr/libexec/bash \ --infodir=$infodir \ --mandir=$mandir \ --docdir=$docsdir \ - --enable-static-link \ --with-installed-readline \ --without-bash-malloc \ --build="$(gcc -dumpmachine)" diff --git a/sources/SOURCELIST.txt b/sources/SOURCELIST.txt index 00965188..b17f63c2 100644 --- a/sources/SOURCELIST.txt +++ b/sources/SOURCELIST.txt @@ -8,7 +8,6 @@ ftp://ftp.gnu.org/gnu/gdbm/gdbm-1.23.tar.gz ftp://ftp.gnu.org/gnu/libtool/libtool-2.4.7.tar.gz ftp://ftp.gnu.org/gnu/m4/m4-1.4.19.tar.bz2 ftp://ftp.gnu.org/gnu/patch/patch-2.7.6.tar.bz2 -ftp://ftp.gnu.org/gnu/readline/readline-8.1.tar.gz ftp://ftp.mars.org/pub/mpeg/libid3tag-0.15.1b.tar.gz ftp://ftp.ncftp.com/ncftp/ncftp-3.2.6-src.tar.gz ftp://sourceware.org/pub/valgrind/valgrind-3.18.1.tar.bz2 @@ -46,7 +45,7 @@ https://data.iana.org/time-zones/releases/tzdb-2022g.tar.lz https://dbus.freedesktop.org/releases/dbus/dbus-1.14.4.tar.xz https://dbus.freedesktop.org/releases/dbus-glib/dbus-glib-0.112.tar.gz https://dbus.freedesktop.org/releases/dbus-python/dbus-python-1.2.18.tar.gz -https://deb.debian.org/debian/pool/main/o/os-prober/os-prober_1.79.tar.xz +https://deb.debian.org/debian/pool/main/o/os-prober/os-prober_1.81.tar.xz https://deb.debian.org/debian/pool/main/p/pmount/pmount_0.9.23.orig.tar.bz2 https://dianne.skoll.ca/projects/rp-pppoe/download/rp-pppoe-3.15.tar.gz https://distfiles.dereferenced.org/libucontext/libucontext-1.2.tar.xz @@ -93,15 +92,14 @@ https://download.savannah.gnu.org/releases/lzip/clzip/clzip-1.13.tar.gz https://download.savannah.gnu.org/releases/lzip/lziprecover/lziprecover-1.23.tar.lz https://download.savannah.gnu.org/releases/lzip/lzlib/lzlib-1.13.tar.lz https://download.savannah.gnu.org/releases/moe/moe-1.12.tar.lz -https://download.savannah.gnu.org/releases/zutils/zutils-1.11.tar.lz +https://download.savannah.gnu.org/releases/zutils/zutils-1.12-rc1.tar.lz https://download.savannah.nongnu.org/releases/man-db/man-db-2.11.1.tar.xz -https://download.savannah.nongnu.org/releases/sysvinit/sysvinit-3.01.tar.xz https://downloads.sourceforge.net/e2fsprogs/e2fsprogs-1.46.5.tar.gz https://downloads.sourceforge.net/gs-fonts/ghostscript-fonts-std-8.11.tar.gz https://downloads.sourceforge.net/gs-fonts/gnu-gs-fonts-other-6.0.tar.gz https://downloads.sourceforge.net/infozip/unzip60.tar.gz https://downloads.sourceforge.net/openjade/OpenSP-1.5.2.tar.gz -https://downloads.sourceforge.net/project/acpid2/acpid-2.0.33.tar.xz +https://downloads.sourceforge.net/project/acpid2/acpid-2.0.34.tar.xz https://downloads.sourceforge.net/project/espeak/espeak/espeak-1.48/espeak-1.48.04-source.zip https://downloads.sourceforge.net/project/giflib/giflib-5.2.1.tar.gz https://downloads.sourceforge.net/project/hdparm/hdparm/hdparm-9.65.tar.gz @@ -118,14 +116,13 @@ https://downloads.sourceforge.net/project/reiser4/reiser4-utils/reiser4progs/rei https://downloads.sourceforge.net/project/squashfs/squashfs/squashfs4.5/squashfs4.5.tar.gz https://downloads.sourceforge.net/reiser4/libaal-1.0.7.tar.gz https://dragora.mirror.garr.it/current/sources/binutils-2.38.20220801_dc2474e7d20.tar.lz -https://dragora.mirror.garr.it/current/sources/bzip2-1.0.6.tar.gz https://dragora.mirror.garr.it/current/sources/ca-certificates-20220111_d12d01b.tar.lz -https://dragora.mirror.garr.it/current/sources/clisp-20210628_de01f0f47.tar.lz +https://dragora.mirror.garr.it/current/sources/clisp-20221021_1d0d0e998.tar.lz https://dragora.mirror.garr.it/current/sources/connman-gtk-20180626_b72c6ab.tar.lz https://dragora.mirror.garr.it/current/sources/db-6.2.38.tar.gz https://dragora.mirror.garr.it/current/sources/dbus-1-tqt-20220503_face487.tar.lz https://dragora.mirror.garr.it/current/sources/dbus-tqt-20220503_c2e0347.tar.lz -https://dragora.mirror.garr.it/current/sources/efivar-20220418_6be2cb1.tar.lz +https://dragora.mirror.garr.it/current/sources/efivar-20220927_dd901c1.tar.lz https://dragora.mirror.garr.it/current/sources/gpm-20200617_e82d1a6.tar.lz https://dragora.mirror.garr.it/current/sources/graft-2.16.tar.gz https://dragora.mirror.garr.it/current/sources/hldig-20210616_9427c9cd.tar.lz @@ -177,7 +174,7 @@ https://ftp.gnome.org/pub/gnome/sources/gnome-icon-theme-symbolic/3.12/gnome-ico https://ftp.gnome.org/pub/gnome/sources/gnome-themes-extra/3.28/gnome-themes-extra-3.28.tar.xz https://ftp.gnome.org/pub/gnome/sources/libnotify/0.7/libnotify-0.7.9.tar.xz https://ftp.gnu.org/gnu/automake/automake-1.16.5.tar.gz -https://ftp.gnu.org/gnu/bash/bash-5.1.tar.gz +https://ftp.gnu.org/gnu/bash/bash-5.2.15.tar.gz https://ftp.gnu.org/gnu/bison/bison-3.8.2.tar.lz https://ftp.gnu.org/gnu/ddrescue/ddrescue-1.26.tar.lz https://ftp.gnu.org/gnu/diffutils/diffutils-3.8.tar.xz @@ -191,7 +188,7 @@ https://ftp.gnu.org/gnu/grep/grep-3.8.tar.gz https://ftp.gnu.org/gnu/groff/groff-1.22.4.tar.gz https://ftp.gnu.org/gnu/grub/grub-2.06.tar.gz https://ftp.gnu.org/gnu/guile/guile-3.0.7.tar.lz -https://ftp.gnu.org/gnu/gzip/gzip-1.10.tar.gz +https://ftp.gnu.org/gnu/gzip/gzip-1.12.tar.gz https://ftp.gnu.org/gnu/inetutils/inetutils-2.2.tar.gz https://ftp.gnu.org/gnu/libidn/libidn-1.41.tar.gz https://ftp.gnu.org/gnu/libidn/libidn2-2.3.4.tar.gz @@ -202,6 +199,7 @@ https://ftp.gnu.org/gnu/mpc/mpc-1.3.1.tar.gz https://ftp.gnu.org/gnu/nettle/nettle-3.8.1.tar.gz https://ftp.gnu.org/gnu/parted/parted-3.5.tar.xz https://ftp.gnu.org/gnu/rcs/rcs-5.10.1.tar.lz +https://ftp.gnu.org/gnu/readline/readline-8.2.tar.gz https://ftp.gnu.org/gnu/sed/sed-4.9.tar.gz https://ftp.gnu.org/gnu/tar/tar-1.34.tar.bz2 https://ftp.gnu.org/gnu/wget/wget-1.21.2.tar.lz @@ -218,29 +216,29 @@ https://ftp.osuosl.org/pub/xiph/releases/flac/flac-1.4.1.tar.xz https://ftp.osuosl.org/pub/xiph/releases/ogg/libogg-1.3.5.tar.gz https://ftp.osuosl.org/pub/xiph/releases/vorbis/libvorbis-1.3.7.tar.gz https://ftp.osuosl.org/pub/xiph/releases/vorbis/vorbis-tools-1.4.2.tar.gz -https://gcc.gnu.org/pub/gcc/snapshots/11-20221111/gcc-11-20221111.tar.xz +https://gcc.gnu.org/pub/gcc/snapshots/11-20221216/gcc-11-20221216.tar.xz https://github.com/AcademySoftwareFoundation/Imath/archive/v3.1.4/imath-3.1.4.tar.gz https://github.com/AcademySoftwareFoundation/openexr/archive/v3.0.5/openexr-3.0.5.tar.gz https://github.com/arsv/perl-cross/releases/download/1.3.5/perl-cross-1.3.5.tar.gz https://github.com/ArtifexSoftware/ghostpdl-downloads/releases/download/gs1000/ghostscript-10.0.0.tar.xz https://github.com/benhoyt/inih/archive/r56/inih-r56.tar.gz -https://github.com/ccache/ccache/releases/download/v4.7.1/ccache-4.7.1.tar.gz +https://github.com/ccache/ccache/releases/download/v4.7.4/ccache-4.7.4.tar.gz https://github.com/dejavu-fonts/dejavu-fonts/releases/download/version_2_37/dejavu-fonts-ttf-2.37.tar.bz2 https://github.com/dinhviethoa/libetpan/archive/1.9.4/libetpan-1.9.4.tar.gz https://github.com/docbook/xslt10-stylesheets/releases/download/release/1.79.2/docbook-xsl-nons-1.79.2.tar.bz2 https://github.com/dosfstools/dosfstools/releases/download/v4.2/dosfstools-4.2.tar.gz https://github.com/dreamer/scrot/archive/v0.10.0/scrot-0.10.0.tar.gz -https://github.com/eudev-project/eudev/releases/download/v3.2.11/eudev-3.2.11.tar.gz +https://github.com/eudev-project/eudev/releases/download/v3.2.12-pre3/eudev-3.2.12-pre3.tar.gz https://github.com/Exiv2/exiv2/releases/download/v0.27.5/exiv2-0.27.5-Source.tar.gz https://github.com/facebook/zstd/releases/download/v1.5.2/zstd-1.5.2.tar.gz https://github.com/fribidi/fribidi/releases/download/v1.0.11/fribidi-1.0.11.tar.xz -https://github.com/gavinhoward/bc/releases/download/5.2.1/bc-5.2.1.tar.xz +https://github.com/gavinhoward/bc/releases/download/6.1.1/bc-6.1.1.tar.gz https://github.com/harfbuzz/harfbuzz/releases/download/3.3.1/harfbuzz-3.3.1.tar.xz https://github.com/htop-dev/htop/releases/download/3.2.1/htop-3.2.1.tar.xz https://github.com/intel/intel-vaapi-driver/releases/download/2.4.1/intel-vaapi-driver-2.4.1.tar.bz2 https://github.com/intel/libva/releases/download/2.16.0/libva-2.16.0.tar.bz2 https://github.com/irssi/irssi/releases/download/1.2.3/irssi-1.2.3.tar.gz -https://github.com/ivmai/bdwgc/releases/download/v8.0.6/gc-8.0.6.tar.gz +https://github.com/ivmai/bdwgc/releases/download/v8.2.2/gc-8.2.2.tar.gz https://github.com/ivmai/libatomic_ops/releases/download/v7.6.14/libatomic_ops-7.6.14.tar.gz https://github.com/jackaudio/jack1/releases/download/0.126.0/jack1-0.126.0.tar.gz https://github.com/jasper-software/jasper/releases/download/version-2.0.33/jasper-2.0.33.tar.gz @@ -251,7 +249,7 @@ https://github.com/libexif/libexif/releases/download/v0.6.24/libexif-0.6.24.tar. https://github.com/libffi/libffi/releases/download/v3.4.4/libffi-3.4.4.tar.gz https://github.com/libfuse/libfuse/releases/download/fuse-2.9.9/fuse-2.9.9.tar.gz https://github.com/libical/libical/releases/download/v3.0.13/libical-3.0.13.tar.gz -https://github.com/liblouis/liblouis/releases/download/v3.23.0/liblouis-3.23.0.tar.gz +https://github.com/liblouis/liblouis/releases/download/v3.24.0/liblouis-3.24.0.tar.gz https://github.com/liblouis/liblouisutdml/releases/download/v2.11.0/liblouisutdml-2.11.0.tar.gz https://github.com/libts/tslib/releases/download/1.22/tslib-1.22.tar.bz2 https://github.com/libusb/libusb-compat-0.1/releases/download/v0.1.8/libusb-compat-0.1.8.tar.bz2 @@ -279,12 +277,13 @@ https://github.com/qpdf/qpdf/releases/download/v11.0.0/qpdf-11.0.0.tar.gz https://github.com/rockdaboot/libpsl/releases/download/0.21.1/libpsl-0.21.1.tar.lz https://github.com/shadow-maint/shadow/releases/download/4.13/shadow-4.13.tar.gz https://github.com/skvadrik/re2c/releases/download/2.2/re2c-2.2.tar.lz +https://github.com/slicer69/sysvinit/releases/download/3.06/sysvinit-3.06.tar.xz https://github.com/thkukuk/libnsl/releases/download/v2.0.0/libnsl-2.0.0.tar.xz https://github.com/thkukuk/rpcsvc-proto/releases/download/v1.4.3/rpcsvc-proto-1.4.3.tar.xz https://github.com/thom311/libnl/releases/download/libnl3_5_0/libnl-3.5.0.tar.gz https://github.com/tlwg/libdatrie/releases/download/v0.2.13/libdatrie-0.2.13.tar.xz https://github.com/tmux/tmux/releases/download/3.3a/tmux-3.3a.tar.gz -https://github.com/troglobit/sysklogd/releases/download/v2.3.0/sysklogd-2.3.0.tar.gz +https://github.com/troglobit/sysklogd/releases/download/v2.4.4/sysklogd-2.4.4.tar.gz https://github.com/uclouvain/openjpeg/archive/v2.4.0/openjpeg-2.4.0.tar.gz https://github.com/unicode-org/icu/releases/download/release-72-1/icu4c-72_1-src.tgz https://github.com/vcrhonek/hwdata/archive/v0.365/hwdata-0.365.tar.gz @@ -335,7 +334,7 @@ https://musl.libc.org/releases/musl-1.2.3.tar.gz https://nano-editor.org/dist/latest/nano-7.1.tar.gz https://netfilter.org/projects/iptables/files/iptables-1.8.7.tar.bz2 https://netfilter.org/projects/libnftnl/files/libnftnl-1.2.1.tar.bz2 -http://software.calhariz.com/at/at_3.2.2.orig.tar.gz +http://software.calhariz.com/at/at_3.2.5.orig.tar.gz https://people.freedesktop.org/~svu/libxklavier-5.4.tar.bz2 https://people.redhat.com/sgrubb/libcap-ng/libcap-ng-0.8.3.tar.gz https://pm-utils.freedesktop.org/releases/pm-utils-1.4.1.tar.gz @@ -359,9 +358,10 @@ https://sourceforge.net/projects/libjpeg-turbo/files/2.1.4/libjpeg-turbo-2.1.4.t https://sourceforge.net/projects/libtirpc/files/libtirpc/1.3.3/libtirpc-1.3.3.tar.bz2 https://sourceforge.net/projects/net-snmp/files/net-snmp/5.9.3/net-snmp-5.9.3.tar.gz https://sourceforge.net/projects/pcre/files/pcre/8.45/pcre-8.45.tar.bz2 -https://sourceware.org/elfutils/ftp/0.186/elfutils-0.186.tar.bz2 +https://sourceware.org/elfutils/ftp/0.188/elfutils-0.188.tar.bz2 https://sourceware.org/ftp/docbook-tools/new-trials/SOURCES/sgml-common-0.6.3.tgz https://sourceware.org/ftp/lvm2/releases/LVM2.2.02.168.tgz +https://sourceware.org/pub/bzip2/bzip2-1.0.8.tar.gz https://sqlite.org/2022/sqlite-autoconf-3400000.tar.gz https://static.rust-lang.org/dist/2022-08-11/cargo-1.63.0-x86_64-unknown-linux-musl.tar.xz https://static.rust-lang.org/dist/2022-08-11/rustc-1.63.0-x86_64-unknown-linux-musl.tar.xz @@ -369,7 +369,7 @@ https://static.rust-lang.org/dist/2022-08-11/rust-std-1.63.0-x86_64-unknown-linu https://static.rust-lang.org/dist/rustc-1.64.0-src.tar.gz https://strace.io/files/5.16/strace-5.16.tar.xz https://thrysoee.dk/editline/libedit-20221030-3.1.tar.gz -https://tukaani.org/xz/xz-5.2.5.tar.bz2 +https://tukaani.org/xz/xz-5.4.0.tar.bz2 https://tuxera.com/opensource/ntfs-3g_ntfsprogs-2022.10.3.tgz https://user-dirs.freedesktop.org/releases/xdg-user-dirs-0.17.tar.gz https://w1.fi/releases/wpa_supplicant-2.10.tar.gz @@ -383,7 +383,7 @@ https://www.cpan.org/src/5.0/perl-5.32.1.tar.gz https://www.docbook.org/xml/4.1.2/docbkx412.zip https://www.docbook.org/xml/4.5/docbook-xml-4.5.zip https://www.fftw.org/fftw-3.3.10.tar.gz -https://www.fossil-scm.org/home/tarball/1e131febd3fbb028d00cab6d020214e8fe36be95daaf93237523c29c542e9a5f/fossil-src-2.19.tar.gz +https://www.fossil-scm.org/home/tarball/210e89a0597f225f49722b096cf5563bf193e920e02a9bd38503a906deacd416/fossil-src-2.20.tar.gz https://www.freedesktop.org/software/desktop-file-utils/releases/desktop-file-utils-0.26.tar.xz https://www.freedesktop.org/software/fontconfig/release/fontconfig-2.13.1.tar.bz2 https://www.freedesktop.org/software/libevdev/libevdev-1.12.0.tar.xz diff --git a/sources/acpid-2.0.33.tar.xz.sha256 b/sources/acpid-2.0.33.tar.xz.sha256 deleted file mode 100644 index 49c3176a..00000000 --- a/sources/acpid-2.0.33.tar.xz.sha256 +++ /dev/null @@ -1 +0,0 @@ -0856f71b3eb34a1b663d0a8e6363dfcbc519e63d847330498898658e2972dbe8 acpid-2.0.33.tar.xz diff --git a/sources/acpid-2.0.34.tar.xz.sha256 b/sources/acpid-2.0.34.tar.xz.sha256 new file mode 100644 index 00000000..359e0a7f --- /dev/null +++ b/sources/acpid-2.0.34.tar.xz.sha256 @@ -0,0 +1 @@ +2d095c8cfcbc847caec746d62cdc8d0bff1ec1bc72ef7c674c721e04da6ab333 acpid-2.0.34.tar.xz diff --git a/sources/at_3.2.2.orig.tar.gz.sha256 b/sources/at_3.2.2.orig.tar.gz.sha256 deleted file mode 100644 index 0ab845e6..00000000 --- a/sources/at_3.2.2.orig.tar.gz.sha256 +++ /dev/null @@ -1 +0,0 @@ -2211da14914fde1f9cc83592838fb6385a32fb11fcecb7816c77700df6559088 at_3.2.2.orig.tar.gz diff --git a/sources/at_3.2.5.orig.tar.gz.sha256 b/sources/at_3.2.5.orig.tar.gz.sha256 new file mode 100644 index 00000000..d060327c --- /dev/null +++ b/sources/at_3.2.5.orig.tar.gz.sha256 @@ -0,0 +1 @@ +bb066b389d7c9bb9d84a35738032b85c30cba7d949f758192adc72c9477fd3b8 at_3.2.5.orig.tar.gz diff --git a/sources/bash-5.1.tar.gz.sha256 b/sources/bash-5.1.tar.gz.sha256 deleted file mode 100644 index faa96d57..00000000 --- a/sources/bash-5.1.tar.gz.sha256 +++ /dev/null @@ -1 +0,0 @@ -cc012bc860406dcf42f64431bcd3d2fa7560c02915a601aba9cd597a39329baa bash-5.1.tar.gz diff --git a/sources/bash-5.2.15.tar.gz.sha256 b/sources/bash-5.2.15.tar.gz.sha256 new file mode 100644 index 00000000..fcc14732 --- /dev/null +++ b/sources/bash-5.2.15.tar.gz.sha256 @@ -0,0 +1 @@ +13720965b5f4fc3a0d4b61dd37e7565c741da9a5be24edc2ae00182fc1b3588c bash-5.2.15.tar.gz diff --git a/sources/bc-5.2.1.tar.xz.sha256 b/sources/bc-5.2.1.tar.xz.sha256 deleted file mode 100644 index cc6a072c..00000000 --- a/sources/bc-5.2.1.tar.xz.sha256 +++ /dev/null @@ -1 +0,0 @@ -bc031b68e5eafef37305697b76f6261abac4a94286e260fa339771f2484f1ecd bc-5.2.1.tar.xz diff --git a/sources/bc-6.1.1.tar.gz.sha256 b/sources/bc-6.1.1.tar.gz.sha256 new file mode 100644 index 00000000..f230a296 --- /dev/null +++ b/sources/bc-6.1.1.tar.gz.sha256 @@ -0,0 +1 @@ +14e164a4eb99f586c4b2d03bbce7e1d4f0c76a0ee66aa8f8a31ca1160b0efba6 bc-6.1.1.tar.gz diff --git a/sources/bzip2-1.0.6.tar.gz.sha256 b/sources/bzip2-1.0.6.tar.gz.sha256 deleted file mode 100644 index 45eb8e18..00000000 --- a/sources/bzip2-1.0.6.tar.gz.sha256 +++ /dev/null @@ -1 +0,0 @@ -a2848f34fcd5d6cf47def00461fcb528a0484d8edef8208d6d2e2909dc61d9cd bzip2-1.0.6.tar.gz diff --git a/sources/bzip2-1.0.8.tar.gz.sha256 b/sources/bzip2-1.0.8.tar.gz.sha256 new file mode 100644 index 00000000..b50d3466 --- /dev/null +++ b/sources/bzip2-1.0.8.tar.gz.sha256 @@ -0,0 +1 @@ +ab5a03176ee106d3f0fa90e381da478ddae405918153cca248e682cd0c4a2269 bzip2-1.0.8.tar.gz diff --git a/sources/ccache-4.7.1.tar.gz.sha256 b/sources/ccache-4.7.1.tar.gz.sha256 deleted file mode 100644 index 15c24b69..00000000 --- a/sources/ccache-4.7.1.tar.gz.sha256 +++ /dev/null @@ -1 +0,0 @@ -fa00c8446d910acebd10dc43e7b77e3b78e774ac3f621618e8d055dcc631e914 ccache-4.7.1.tar.gz diff --git a/sources/ccache-4.7.4.tar.gz.sha256 b/sources/ccache-4.7.4.tar.gz.sha256 new file mode 100644 index 00000000..14884561 --- /dev/null +++ b/sources/ccache-4.7.4.tar.gz.sha256 @@ -0,0 +1 @@ +dc283906b73bd7c461178ca472a459e9d86b5523405035921bd8204e77620264 ccache-4.7.4.tar.gz diff --git a/sources/clisp-20210628_de01f0f47.tar.lz.sha256 b/sources/clisp-20210628_de01f0f47.tar.lz.sha256 deleted file mode 100644 index 1b070ab2..00000000 --- a/sources/clisp-20210628_de01f0f47.tar.lz.sha256 +++ /dev/null @@ -1 +0,0 @@ -94974142bc750cf488af2c708c1bc28f616509eb5904c71cfae2fd79ba14e0b4 clisp-20210628_de01f0f47.tar.lz diff --git a/sources/clisp-20221021_1d0d0e998.tar.lz.sha256 b/sources/clisp-20221021_1d0d0e998.tar.lz.sha256 new file mode 100644 index 00000000..0a98a804 --- /dev/null +++ b/sources/clisp-20221021_1d0d0e998.tar.lz.sha256 @@ -0,0 +1 @@ +bb2d2170787678cf2031fa26c7be7249a1d90230e95804a16ed267f6fc6ea552 clisp-20221021_1d0d0e998.tar.lz diff --git a/sources/efivar-20220418_6be2cb1.tar.lz.sha256 b/sources/efivar-20220418_6be2cb1.tar.lz.sha256 deleted file mode 100644 index 6664b4fb..00000000 --- a/sources/efivar-20220418_6be2cb1.tar.lz.sha256 +++ /dev/null @@ -1 +0,0 @@ -dc88ba1d4b1d9525049b3ffa1307c999dd37611ccd743a7fd026eca8d3d2d9e3 efivar-20220418_6be2cb1.tar.lz diff --git a/sources/efivar-20220927_dd901c1.tar.lz.sha256 b/sources/efivar-20220927_dd901c1.tar.lz.sha256 new file mode 100644 index 00000000..c47d8734 --- /dev/null +++ b/sources/efivar-20220927_dd901c1.tar.lz.sha256 @@ -0,0 +1 @@ +790051345f8ee0c595da72aa241fe125846efd856ccde377aad684802c7b1877 efivar-20220927_dd901c1.tar.lz diff --git a/sources/elfutils-0.186.tar.bz2.sha256 b/sources/elfutils-0.186.tar.bz2.sha256 deleted file mode 100644 index 43e29f92..00000000 --- a/sources/elfutils-0.186.tar.bz2.sha256 +++ /dev/null @@ -1 +0,0 @@ -7f6fb9149b1673d38d9178a0d3e0fb8a1ec4f53a9f4c2ff89469609879641177 elfutils-0.186.tar.bz2 diff --git a/sources/elfutils-0.188.tar.bz2.sha256 b/sources/elfutils-0.188.tar.bz2.sha256 new file mode 100644 index 00000000..d96564c5 --- /dev/null +++ b/sources/elfutils-0.188.tar.bz2.sha256 @@ -0,0 +1 @@ +fb8b0e8d0802005b9a309c60c1d8de32dd2951b56f0c3a3cb56d21ce01595dff elfutils-0.188.tar.bz2 diff --git a/sources/eudev-3.2.11.tar.gz.sha256 b/sources/eudev-3.2.11.tar.gz.sha256 deleted file mode 100644 index b728c804..00000000 --- a/sources/eudev-3.2.11.tar.gz.sha256 +++ /dev/null @@ -1 +0,0 @@ -19847cafec67897da855fde56f9dc7d92e21c50e450aa79068a7e704ed44558b eudev-3.2.11.tar.gz diff --git a/sources/eudev-3.2.12-pre3.tar.gz.sha256 b/sources/eudev-3.2.12-pre3.tar.gz.sha256 new file mode 100644 index 00000000..63c1618b --- /dev/null +++ b/sources/eudev-3.2.12-pre3.tar.gz.sha256 @@ -0,0 +1 @@ +abed466623141a8049b50321bce45eeb2345a080945e0ec516031f268a0d8019 eudev-3.2.12-pre3.tar.gz diff --git a/sources/fossil-src-2.19.tar.gz.sha256 b/sources/fossil-src-2.19.tar.gz.sha256 deleted file mode 100644 index e9bcf5dd..00000000 --- a/sources/fossil-src-2.19.tar.gz.sha256 +++ /dev/null @@ -1 +0,0 @@ -4f135659ec9a3958a10eec98f79d4d3fc10edeae2605b4b38e0a58826800b490 fossil-src-2.19.tar.gz diff --git a/sources/fossil-src-2.20.tar.gz.sha256 b/sources/fossil-src-2.20.tar.gz.sha256 new file mode 100644 index 00000000..b289ce26 --- /dev/null +++ b/sources/fossil-src-2.20.tar.gz.sha256 @@ -0,0 +1 @@ +0892ea4faa573701ca285a3d4a2d203e8abbb022affe3b1be35658845e8de721 fossil-src-2.20.tar.gz diff --git a/sources/gc-8.0.6.tar.gz.sha256 b/sources/gc-8.0.6.tar.gz.sha256 deleted file mode 100644 index 327e71d3..00000000 --- a/sources/gc-8.0.6.tar.gz.sha256 +++ /dev/null @@ -1 +0,0 @@ -3b4914abc9fa76593596773e4da671d7ed4d5390e3d46fbf2e5f155e121bea11 gc-8.0.6.tar.gz diff --git a/sources/gc-8.2.2.tar.gz.sha256 b/sources/gc-8.2.2.tar.gz.sha256 new file mode 100644 index 00000000..3f097a9b --- /dev/null +++ b/sources/gc-8.2.2.tar.gz.sha256 @@ -0,0 +1 @@ +f30107bcb062e0920a790ffffa56d9512348546859364c23a14be264b38836a0 gc-8.2.2.tar.gz diff --git a/sources/gcc-11-20221111.tar.xz.sha256 b/sources/gcc-11-20221111.tar.xz.sha256 deleted file mode 100644 index f3968ff8..00000000 --- a/sources/gcc-11-20221111.tar.xz.sha256 +++ /dev/null @@ -1 +0,0 @@ -2c86932305237c9600dc676e01b5adff39c2957a0776eb938b5de650bc3b3326 gcc-11-20221111.tar.xz diff --git a/sources/gcc-11-20221216.tar.xz.sha256 b/sources/gcc-11-20221216.tar.xz.sha256 new file mode 100644 index 00000000..c2148ea8 --- /dev/null +++ b/sources/gcc-11-20221216.tar.xz.sha256 @@ -0,0 +1 @@ +8eef95871cadef0a03710a8c9c9a0115baec527304bf73534a576150c00e78ea gcc-11-20221216.tar.xz diff --git a/sources/gzip-1.10.tar.gz.sha256 b/sources/gzip-1.10.tar.gz.sha256 deleted file mode 100644 index 323b90f9..00000000 --- a/sources/gzip-1.10.tar.gz.sha256 +++ /dev/null @@ -1 +0,0 @@ -c91f74430bf7bc20402e1f657d0b252cb80aa66ba333a25704512af346633c68 gzip-1.10.tar.gz diff --git a/sources/gzip-1.12.tar.gz.sha256 b/sources/gzip-1.12.tar.gz.sha256 new file mode 100644 index 00000000..fe156309 --- /dev/null +++ b/sources/gzip-1.12.tar.gz.sha256 @@ -0,0 +1 @@ +5b4fb14d38314e09f2fc8a1c510e7cd540a3ea0e3eb9b0420046b82c3bf41085 gzip-1.12.tar.gz diff --git a/sources/liblouis-3.23.0.tar.gz.sha256 b/sources/liblouis-3.23.0.tar.gz.sha256 deleted file mode 100644 index 44da8b11..00000000 --- a/sources/liblouis-3.23.0.tar.gz.sha256 +++ /dev/null @@ -1 +0,0 @@ -706fa0888a530f3c16b55c6ce0f085b25472c7f4e7047400f9df07cffbc71cfb liblouis-3.23.0.tar.gz diff --git a/sources/liblouis-3.24.0.tar.gz.sha256 b/sources/liblouis-3.24.0.tar.gz.sha256 new file mode 100644 index 00000000..72dbdc0f --- /dev/null +++ b/sources/liblouis-3.24.0.tar.gz.sha256 @@ -0,0 +1 @@ +02360230cf5c1fe7dcec59c41a3e74bc283548b0de637963760fa8fad9cd0c39 liblouis-3.24.0.tar.gz diff --git a/sources/os-prober_1.79.tar.xz.sha256 b/sources/os-prober_1.79.tar.xz.sha256 deleted file mode 100644 index c4b7bef5..00000000 --- a/sources/os-prober_1.79.tar.xz.sha256 +++ /dev/null @@ -1 +0,0 @@ -abe6317d078c4e51e322e62036b6df4a698bfe80c5be110a08894841179810ee os-prober_1.79.tar.xz diff --git a/sources/os-prober_1.81.tar.xz.sha256 b/sources/os-prober_1.81.tar.xz.sha256 new file mode 100644 index 00000000..3c561943 --- /dev/null +++ b/sources/os-prober_1.81.tar.xz.sha256 @@ -0,0 +1 @@ +2fd928ec86538227711e2adf49cfd6a1ef74f6bb3555c5dad4e0425ccd978883 os-prober_1.81.tar.xz diff --git a/sources/readline-8.1.tar.gz.sha256 b/sources/readline-8.1.tar.gz.sha256 deleted file mode 100644 index 2656ab85..00000000 --- a/sources/readline-8.1.tar.gz.sha256 +++ /dev/null @@ -1 +0,0 @@ -f8ceb4ee131e3232226a17f51b164afc46cd0b9e6cef344be87c65962cb82b02 readline-8.1.tar.gz diff --git a/sources/readline-8.2.tar.gz.sha256 b/sources/readline-8.2.tar.gz.sha256 new file mode 100644 index 00000000..001d298c --- /dev/null +++ b/sources/readline-8.2.tar.gz.sha256 @@ -0,0 +1 @@ +3feb7171f16a84ee82ca18a36d7b9be109a52c04f492a053331d7d1095007c35 readline-8.2.tar.gz diff --git a/sources/sysklogd-2.3.0.tar.gz.sha256 b/sources/sysklogd-2.3.0.tar.gz.sha256 deleted file mode 100644 index 8b34144e..00000000 --- a/sources/sysklogd-2.3.0.tar.gz.sha256 +++ /dev/null @@ -1 +0,0 @@ -9a410b484713d9600c820d8113f2d80cb14708328c908b1a28e8b7b31fd54f57 sysklogd-2.3.0.tar.gz diff --git a/sources/sysklogd-2.4.4.tar.gz.sha256 b/sources/sysklogd-2.4.4.tar.gz.sha256 new file mode 100644 index 00000000..f52b345d --- /dev/null +++ b/sources/sysklogd-2.4.4.tar.gz.sha256 @@ -0,0 +1 @@ +01f25931d1508c3e6be4e182f49356c993abc7d035d5835db35f9b61d5085549 sysklogd-2.4.4.tar.gz diff --git a/sources/sysvinit-3.01.tar.xz.sha256 b/sources/sysvinit-3.01.tar.xz.sha256 deleted file mode 100644 index 77e8c6a9..00000000 --- a/sources/sysvinit-3.01.tar.xz.sha256 +++ /dev/null @@ -1 +0,0 @@ -68b11a4772cdacce5fb65a4cbead324a2ce3999d138b4ff61dc2d59e57ef5793 sysvinit-3.01.tar.xz diff --git a/sources/sysvinit-3.06.tar.xz.sha256 b/sources/sysvinit-3.06.tar.xz.sha256 new file mode 100644 index 00000000..c9fdb9ed --- /dev/null +++ b/sources/sysvinit-3.06.tar.xz.sha256 @@ -0,0 +1 @@ +17e446c9e0be874fa4cb7d8266410382c6fb4efe0ea0d87a57fe218d2a651d70 sysvinit-3.06.tar.xz diff --git a/sources/xz-5.2.5.tar.bz2.sha256 b/sources/xz-5.2.5.tar.bz2.sha256 deleted file mode 100644 index 030e2e2a..00000000 --- a/sources/xz-5.2.5.tar.bz2.sha256 +++ /dev/null @@ -1 +0,0 @@ -5117f930900b341493827d63aa910ff5e011e0b994197c3b71c08a20228a42df xz-5.2.5.tar.bz2 diff --git a/sources/xz-5.4.0.tar.bz2.sha256 b/sources/xz-5.4.0.tar.bz2.sha256 new file mode 100644 index 00000000..91d1f246 --- /dev/null +++ b/sources/xz-5.4.0.tar.bz2.sha256 @@ -0,0 +1 @@ +795ea0494c66d509b052ddc36dc63bd634e59ff2a0f39c16a3b5644dd01d87e6 xz-5.4.0.tar.bz2 diff --git a/sources/zutils-1.11.tar.lz.sha256 b/sources/zutils-1.11.tar.lz.sha256 deleted file mode 100644 index 2fab5076..00000000 --- a/sources/zutils-1.11.tar.lz.sha256 +++ /dev/null @@ -1 +0,0 @@ -50e8e24b0a280ccab037004b9000b070d17a6e0cd86972927d1b2a5505421389 zutils-1.11.tar.lz diff --git a/sources/zutils-1.12-rc1.tar.lz.sha256 b/sources/zutils-1.12-rc1.tar.lz.sha256 new file mode 100644 index 00000000..275caab2 --- /dev/null +++ b/sources/zutils-1.12-rc1.tar.lz.sha256 @@ -0,0 +1 @@ +cef322147be483ada5f3ea6ccb0a4f75abd8b089a3e3a904b83ce9f756bc8e29 zutils-1.12-rc1.tar.lz diff --git a/stages/0/03-gcc-static b/stages/0/03-gcc-static index 1ec8a76e..4acf41f0 100755 --- a/stages/0/03-gcc-static +++ b/stages/0/03-gcc-static @@ -14,7 +14,7 @@ # See the License for the specific language governing permissions and # limitations under the License. -version=11-20221111 +version=11-20221216 # Prerequisites gmp_version=6.2.1 diff --git a/stages/0/05-gcc-final b/stages/0/05-gcc-final index a7e01392..59afc8d4 100755 --- a/stages/0/05-gcc-final +++ b/stages/0/05-gcc-final @@ -14,7 +14,7 @@ # See the License for the specific language governing permissions and # limitations under the License. -version=11-20221111 +version=11-20221216 # Prerequisites gmp_version=6.2.1 diff --git a/stages/1/06-gcc b/stages/1/06-gcc index 966e6dd4..ddf85b66 100755 --- a/stages/1/06-gcc +++ b/stages/1/06-gcc @@ -14,7 +14,7 @@ # See the License for the specific language governing permissions and # limitations under the License. -version=11-20221111 +version=11-20221216 # Prerequisites gmp_version=6.2.1 -- 2.11.4.GIT