From owner-freebsd-ports@freebsd.org Thu Jan 10 17:11:11 2019 Return-Path: Delivered-To: freebsd-ports@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id E59BA1492C95 for ; Thu, 10 Jan 2019 17:11:10 +0000 (UTC) (envelope-from ehaupt@FreeBSD.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 83A9A8CA88 for ; Thu, 10 Jan 2019 17:11:10 +0000 (UTC) (envelope-from ehaupt@FreeBSD.org) Received: by mailman.ysv.freebsd.org (Postfix) id 46B991492C94; Thu, 10 Jan 2019 17:11:10 +0000 (UTC) Delivered-To: ports@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 33C491492C93 for ; Thu, 10 Jan 2019 17:11:10 +0000 (UTC) (envelope-from ehaupt@FreeBSD.org) Received: from smtp.freebsd.org (smtp.freebsd.org [96.47.72.83]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id CA48E8CA84; Thu, 10 Jan 2019 17:11:09 +0000 (UTC) (envelope-from ehaupt@FreeBSD.org) Received: from localhost (90.4.106.92.dynamic.wline.res.cust.swisscom.ch [92.106.4.90]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) (Authenticated sender: ehaupt) by smtp.freebsd.org (Postfix) with ESMTPSA id 0C01A14BFA; Thu, 10 Jan 2019 17:11:08 +0000 (UTC) (envelope-from ehaupt@FreeBSD.org) Date: Thu, 10 Jan 2019 18:10:41 +0100 From: Emanuel Haupt To: ports@FreeBSD.org Subject: [CFT] shells/bash: update to 5.0 Message-Id: <20190110181041.de43b1b86842cb8b5115a28f@FreeBSD.org> X-Mailer: Sylpheed 3.7.0 (GTK+ 2.24.32; amd64-portbld-freebsd12.0) Mime-Version: 1.0 Content-Type: multipart/signed; protocol="application/pgp-signature"; micalg="PGP-SHA512"; boundary="Signature=_Thu__10_Jan_2019_18_10_41_+0100_AtcbJJedUTHLHVtz" X-Rspamd-Queue-Id: CA48E8CA84 X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.91 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-0.996,0]; NEURAL_HAM_SHORT(-0.92)[-0.918,0]; ASN(0.00)[asn:11403, ipnet:96.47.64.0/20, country:US]; NEURAL_HAM_LONG(-1.00)[-0.997,0] X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 10 Jan 2019 17:11:11 -0000 --Signature=_Thu__10_Jan_2019_18_10_41_+0100_AtcbJJedUTHLHVtz Content-Type: text/plain; charset=US-ASCII Content-Disposition: inline Content-Transfer-Encoding: quoted-printable bash 5.0 was released a few days ago. The following link tersely lists the new features: https://tiswww.case.edu/php/chet/bash/NEWS Because this port affects many other ports an exp-run is pending. The patch is here: https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D2348= 27 Please report issues or comment on PR 234827. Thanks, Emanuel --Signature=_Thu__10_Jan_2019_18_10_41_+0100_AtcbJJedUTHLHVtz Content-Type: application/pgp-signature -----BEGIN PGP SIGNATURE----- iQGTBAEBCgB9FiEE2fEWSWlkmeqtv9HEEE5ixUUxbokFAlw3fJFfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEQ5 RjExNjQ5Njk2NDk5RUFBREJGRDFDNDEwNEU2MkM1NDUzMTZFODkACgkQEE5ixUUx bomgFwgAo5sMpCt6iIDRlnimaO4xDERKpibq8GEAVaEtcQg4qNsBUFfXP8Aa9+Xk 0PTs0DJfIepCkWD1nhHn/yNDp7HhOredbR/cOWyfG7Chpo53b4QovsMfURGJu69F rXyiSEFcERAxkrA4HpMRx8rIWPxmD+PszzNMVcRVrZ0m9zbwJEUS88udjVEuwzD4 JeRQTY/pLD7Kuvvn4/CRV4R/GiIswZ/Enuv2GGh/b76HDEnPPHQreHrjBH7jVplG +8HvJRZj/CZQ0LzeoWrxhwxYbNowXHqJAbn3hvklB40oLUgRgYjMou7ReVaG0Aui Lc/irGJe9z7EWx1gEsHrqw5N4yB7vg== =Kzxp -----END PGP SIGNATURE----- --Signature=_Thu__10_Jan_2019_18_10_41_+0100_AtcbJJedUTHLHVtz--