From 57c421bd8153f453a0664b128362a48febb7c7c2 Mon Sep 17 00:00:00 2001 From: Flatcar Buildbot Date: Mon, 27 Mar 2023 07:22:51 +0000 Subject: [PATCH] eclass/epatch: Sync with Gentoo It's from Gentoo commit d0f772a98c7a25d3b1016935e5f3b478e10965c9. --- .../src/third_party/portage-stable/eclass/epatch.eclass | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/sdk_container/src/third_party/portage-stable/eclass/epatch.eclass b/sdk_container/src/third_party/portage-stable/eclass/epatch.eclass index 07f802583f..c42aef8e80 100644 --- a/sdk_container/src/third_party/portage-stable/eclass/epatch.eclass +++ b/sdk_container/src/third_party/portage-stable/eclass/epatch.eclass @@ -1,4 +1,4 @@ -# Copyright 1999-2022 Gentoo Authors +# Copyright 1999-2023 Gentoo Authors # Distributed under the terms of the GNU General Public License v2 # @ECLASS: epatch.eclass @@ -190,7 +190,7 @@ epatch() { local patchname=${x##*/} # Apply single patches, or forced sets of patches, or - # patches with ARCH dependant names. + # patches with ARCH dependent names. # ???_arch_foo.patch # Else, skip this input altogether local a=${patchname#*_} # strip the ???_ @@ -272,7 +272,7 @@ epatch() { fi # Check for absolute paths in patches. If sandbox is disabled, - # people could (accidently) patch files in the root filesystem. + # people could (accidentally) patch files in the root filesystem. # Or trigger other unpleasantries #237667. So disallow -p0 on # such patches. local abs_paths=$(grep -E -n '^[-+]{3} /' "${PATCH_TARGET}" | awk '$2 != "/dev/null" { print }')