shells: do not allow bare "read" in non-bash compat configs

On Sat, Feb 9, 2019 Cristian Ionescu-Idbohrn wrote:
    > In my case (at work), I have to watch and prevent people from doing
    > unportable things.  For me, that's a burden.

Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
This commit is contained in:
Denys Vlasenko
2021-06-06 12:07:11 +02:00
parent a1b0d3856d
commit 457825f77a
4 changed files with 22 additions and 8 deletions

View File

@ -89,6 +89,12 @@ getopt32(char **argv, const char *applet_opts, ...)
root:x:0:0:root:/root:/bin/bash
user:x:500:500::/home/user:/bin/bash
"^" options string is "^optchars""\0""opt_complementary".
"!" If the first character in the applet_opts string is a '!',
report bad options, missing required options,
inconsistent options with all-ones return value (instead of abort.
"+" If the first character in the applet_opts string is a plus,
then option processing will stop as soon as a non-option is
encountered in the argv array. Useful for applets like env
@ -96,10 +102,7 @@ getopt32(char **argv, const char *applet_opts, ...)
env -i ls -d /
Here we want env to process just the '-i', not the '-d'.
"!" Report bad options, missing required options,
inconsistent options with all-ones return value (instead of abort).
"^" options string is "^optchars""\0""opt_complementary".
(The order of multiple prefixes must be "^!+...")
uint32_t
getopt32long(char **argv, const char *applet_opts, const char *logopts...)