Zsh Mailing List Archive
Messages sorted by:
Reverse Date,
Date,
Thread,
Author
Crucial typo in compaudit enhancement
- X-seq: zsh-workers 31055
- From: Peter Stephenson <p.stephenson@xxxxxxxxxxx>
- To: Zsh Hackers' List <zsh-workers@xxxxxxx>
- Subject: Crucial typo in compaudit enhancement
- Date: Tue, 19 Feb 2013 10:00:52 +0000
- List-help: <mailto:zsh-workers-help@zsh.org>
- List-id: Zsh Workers List <zsh-workers.zsh.org>
- List-post: <mailto:zsh-workers@zsh.org>
- Mailing-list: contact zsh-workers-help@xxxxxxx; run by ezmlm
- Organization: Samsung Cambridge Solution Centre
Just got around to trying this out in anger... with this fix I think it
works.
diff --git a/Completion/compaudit b/Completion/compaudit
index 5eaa41e..75742a0 100644
--- a/Completion/compaudit
+++ b/Completion/compaudit
@@ -97,7 +97,7 @@ local _i_exe
# If we can find out who owns the executable, we will allow files to
# be owned by that user, too. The argument is that if you don't trust
# the owner of the executable, it's way too late to worry about it now...
-for _i_exe in _i_exes; do
+for _i_exe in $_i_exes; do
if [[ -e $_i_exe ]] ;then
if zmodload -F zsh/stat b:zstat 2>/dev/null; then
local -A _i_stathash
--
Peter Stephenson <p.stephenson@xxxxxxxxxxx> Consultant, Software
Tel: +44 (0)1223 434724 Samsung Cambridge Solution Centre
St John's House, St John's Innovation Park,
Cowley Road, Cambridge, CB4 0DS, UK
Messages sorted by:
Reverse Date,
Date,
Thread,
Author