Hello community, here is the log from the commit of package pcre for openSUSE:Factory checked in at 2014-05-06 14:02:23 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/pcre (Old) and /work/SRC/openSUSE:Factory/.pcre.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "pcre" Changes: -------- --- /work/SRC/openSUSE:Factory/pcre/pcre.changes 2014-04-06 09:54:03.000000000 +0200 +++ /work/SRC/openSUSE:Factory/.pcre.new/pcre.changes 2014-05-06 14:02:24.000000000 +0200 @@ -1,0 +2,13 @@ +Sat May 3 06:07:56 UTC 2014 - [email protected] + +- update to 0.35: + There have been performance improvements for classes containing non-ASCII + characters and the "auto-possessification" feature has been extended. Other + minor improvements have been implemented and bugs fixed. There is a new callout + feature to enable applications to do detailed stack checks at compile time, to + avoid running out of stack for deeply nested parentheses. The JIT compiler has + been extended with experimental support for ARM-64, MIPS-64, and PPC-LE. +- add pcre-commit1472.patch from SVN to work with gcc49, see + http://bugs.exim.org/show_bug.cgi?id=1463 + +------------------------------------------------------------------- Old: ---- pcre-8.34.tar.bz2 pcre-8.34.tar.bz2.sig New: ---- pcre-8.35.tar.bz2 pcre-8.35.tar.bz2.sig pcre-commit1472.patch ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ pcre.spec ++++++ --- /var/tmp/diff_new_pack.0UJHOA/_old 2014-05-06 14:02:25.000000000 +0200 +++ /var/tmp/diff_new_pack.0UJHOA/_new 2014-05-06 14:02:25.000000000 +0200 @@ -17,7 +17,7 @@ Name: pcre -Version: 8.34 +Version: 8.35 Release: 0 Summary: A library for Perl-compatible regular expressions License: BSD-3-Clause @@ -33,6 +33,8 @@ Patch0: pcre-8.32-visibility.patch #PATCH-FIX-OPENSUSE [email protected] upstream thinks it is good idea to use rpath, taken from RH Patch1: pcre-8.21-multilib.patch +#PATCH-FIX-UPSTREAM http://bugs.exim.org/show_bug.cgi?id=1463 +Patch2: pcre-commit1472.patch BuildRequires: autoconf BuildRequires: automake BuildRequires: gcc-c++ @@ -153,6 +155,7 @@ %setup -q %patch0 -p1 %patch1 -p1 +%patch2 %build # Available JIT archs see sljit/sljitConfig.h ++++++ pcre-8.34.tar.bz2 -> pcre-8.35.tar.bz2 ++++++ ++++ 43179 lines of diff (skipped) ++++++ pcre-commit1472.patch ++++++ Index: configure.ac =================================================================== --- configure.ac (Revision 1471) +++ configure.ac (Revision 1472) @@ -9,9 +9,9 @@ dnl be defined as -RC2, for example. For real releases, it should be empty. m4_define(pcre_major, [8]) -m4_define(pcre_minor, [35]) -m4_define(pcre_prerelease, []) -m4_define(pcre_date, [2014-04-04]) +m4_define(pcre_minor, [36]) +m4_define(pcre_prerelease, [-RC1]) +m4_define(pcre_date, [2014-04-21]) # NOTE: The CMakeLists.txt file searches for the above variables in the first # 50 lines of this file. Please update that if the variables above are moved. Index: pcrecpp.cc =================================================================== --- pcrecpp.cc (Revision 1471) +++ pcrecpp.cc (Revision 1472) @@ -511,7 +511,7 @@ return 0; } - pcre_extra extra = { 0, 0, 0, 0, 0, 0 }; + pcre_extra extra = { 0, 0, 0, 0, 0, 0, 0, 0 }; if (options_.match_limit() > 0) { extra.flags |= PCRE_EXTRA_MATCH_LIMIT; extra.match_limit = options_.match_limit(); @@ -660,6 +660,8 @@ /***** Parsers for various types *****/ bool Arg::parse_null(const char* str, int n, void* dest) { + (void)str; + (void)n; // We fail if somebody asked us to store into a non-NULL void* pointer return (dest == NULL); } Index: ChangeLog =================================================================== --- ChangeLog (Revision 1471) +++ ChangeLog (Revision 1472) @@ -1,6 +1,18 @@ ChangeLog for PCRE ------------------ +Version 8.36 xx-xxx-2014 +------------------------ + +1. Got rid of some compiler warnings in the C++ modules that were shown up by + -Wmissing-field-initializers and -Wunused-parameter. + +2. The tests for quantifiers being too big (greater than 65535) were being + applied after reading the number, and stupidly assuming that integer + overflow would give a negative number. The tests are now applied as the + numbers are read. + + Version 8.35 04-April-2014 -------------------------- Index: pcre_stringpiece_unittest.cc =================================================================== --- pcre_stringpiece_unittest.cc (Revision 1471) +++ pcre_stringpiece_unittest.cc (Revision 1472) @@ -142,6 +142,8 @@ } int main(int argc, char** argv) { + (void)argc; + (void)argv; CheckComparisonOperators(); CheckSTLComparator(); Index: pcre_scanner_unittest.cc =================================================================== --- pcre_scanner_unittest.cc (Revision 1471) +++ pcre_scanner_unittest.cc (Revision 1472) @@ -149,6 +149,8 @@ // small stack size int main(int argc, char** argv) { + (void)argc; + (void)argv; TestScanner(); TestBigComment(); Index: testdata/testoutput2 =================================================================== --- testdata/testoutput2 (Revision 1471) +++ testdata/testoutput2 (Revision 1472) @@ -5821,13 +5821,13 @@ No match /a{11111111111111111111}/I -Failed: number too big in {} quantifier at offset 22 +Failed: number too big in {} quantifier at offset 8 /(){64294967295}/I -Failed: number too big in {} quantifier at offset 14 +Failed: number too big in {} quantifier at offset 9 /(){2,4294967295}/I -Failed: number too big in {} quantifier at offset 15 +Failed: number too big in {} quantifier at offset 11 "(?i:a)(?i:b)(?i:c)(?i:d)(?i:e)(?i:f)(?i:g)(?i:h)(?i:i)(?i:j)(k)(?i:l)A\1B"I Capturing subpattern count = 1 Index: pcre_compile.c =================================================================== --- pcre_compile.c (Revision 1471) +++ pcre_compile.c (Revision 1472) @@ -1583,30 +1583,30 @@ int min = 0; int max = -1; -/* Read the minimum value and do a paranoid check: a negative value indicates -an integer overflow. */ - -while (IS_DIGIT(*p)) min = min * 10 + (int)(*p++ - CHAR_0); -if (min < 0 || min > 65535) +while (IS_DIGIT(*p)) { - *errorcodeptr = ERR5; - return p; - } + min = min * 10 + (int)(*p++ - CHAR_0); + if (min > 65535) + { + *errorcodeptr = ERR5; + return p; + } + } -/* Read the maximum value if there is one, and again do a paranoid on its size. -Also, max must not be less than min. */ - if (*p == CHAR_RIGHT_CURLY_BRACKET) max = min; else { if (*(++p) != CHAR_RIGHT_CURLY_BRACKET) { max = 0; - while(IS_DIGIT(*p)) max = max * 10 + (int)(*p++ - CHAR_0); - if (max < 0 || max > 65535) + while(IS_DIGIT(*p)) { - *errorcodeptr = ERR5; - return p; - } + max = max * 10 + (int)(*p++ - CHAR_0); + if (max > 65535) + { + *errorcodeptr = ERR5; + return p; + } + } if (max < min) { *errorcodeptr = ERR4; @@ -1615,9 +1615,6 @@ } } -/* Fill in the required variables, and pass back the pointer to the terminating -'}'. */ - *minp = min; *maxp = max; return p; -- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected]
