--- - branch: MAIN date: Wed Apr 10 08:13:11 UTC 2019 files: - new: '1.132' old: '1.131' path: src/bin/sh/expand.c pathrev: src/bin/sh/expand.c@1.132 type: modified - new: '1.21' old: '1.20' path: src/tests/bin/sh/t_expand.sh pathrev: src/tests/bin/sh/t_expand.sh@1.21 type: modified id: 20190410T081311Z.ce3c6d25bacab2b527e0016500eb125679917570 log: "PR bin/54112\n\nFix handling of \"$@\" (that is, double quoted dollar at), when it\nappears in a string which will be subject to field splitting.\n\nEg:\n\t${0+\"$@\" }\n\nMore common usages, like the simple \"$@\" or ${0+\"$@\"} end up\nbeing entirely quoted, so no field splitting happens, and the\nproblem was avoided.\n\nSee the PR for more details.\n\nThis ends up making a bunch of old hack code (and some that was\nrelatively new) vanish - for now it is just #if 0'd or commented out.\nCleanups of that stuff will happen later.\n\nThat some of the worst $@ hacks are now gone does not mean that processing\nof \"$@\" does not retain a very special place in every hackers heart.\nRIP extreme ugliness - long live the merely ordinary ugly.\n\nAdded a new bin/sh ATF test case to verify that all this remains fixed.\n" module: src subject: 'CVS commit: src' unixtime: '1554883991' user: kre