A modular Perl shell written, configured, and operated
entirely in Perl. It aspires to be a fully operational login
shell with all the features one normally expects. But it
also gives direct access to Perl objects and data structures
from the command line, and allows you to run Perl code
within the scope of your command line.
WWW: http://zoidberg.student.utwente.nl/
PR: ports/72053
Submitted by: Ying-Chieh Liao <ijliao@csie.nctu.edu.tw>
System III, 4.3BSD-Reno, Ultrix 3.1 and `home made'' fixes and enhancements
PR: ports/68127
Submitted by: Cyrille Lefevre <cyrille.lefevre@laposte.net>
rssh is a Restricted Secure SHell that allow only the use of sftp or
scp. It could be use when you need an account (and a valid shell) in
order to execute sftp or scp but when you don't want to give the
possibility to log in to this user.
WWW: http://www.pizzashack.org/rssh/index.shtml
PR: ports/65860
Submitted by: enigmatyc
The shells/bash-completion port installs Ian Macdonald's
programmable completion library for Bash 2.04 and above.
This gives users context- sensitive tab-completion for such
things as program arguments, SSH hostnames, NFS mounts, and
so on.
PR: ports/52790
Submitted by: Kirk Strauser <kirk@strauser.com>
This is just an experimental hack and cannot happily be merged into
the upstream. Zsh's line editor apparently needs a rewrite in order
to support multi-byte encodings because it strongly relies on the
single-byte character scheme.
These patches are mostly based on the work by ono@ono.org (Thanks!):
http://www.ono.org/software/zsh-euc/
What I did over this is disable the hack for non-EUC locales. Maybe
the patches can be moved to shells/zsh in the future, but it's
premature for the moment.
Notes:
- forward-char, backward-char and backward-delete-char with no numeric
argument should work properly with this hack.
- Completion and redisplay should work fine.
- There can be some trivial side-effects.
- JIS X0201-Roman and JIS X0208-Kanji are supported.
- JIS X0201-Katakana and JIS X0212 Kanji are NOT supported.
- Only tested with the EUC-JP (ja_JP.eucJP) locale. I'm not sure if
it works for GB 2312/CNS 11643-1/KS X 1001. Any feedbacks is
welcome, especially a patch if it does not work. :)
2. It causes bash2 to core on my 4.3-STABLE box randomly
3. Since bash is a likely contender for any Linux converts, the last
thing we need is for them to grep through the ports INDEX file, install
this, destabilize their FreeBSD box, and generate bad PR
4. (portmgr hat on) it was not added in an appropriate manner.
Should the original submitter wish to re-evaluate points 1-4 above, then
we'll consider re-adding it. For now, it's toast.
Remove shells/ruby-shell as it is now part of the standard distribution.
(in both Ruby 1.6.4 and 1.7.0)
Mark security/ruby-sha1 broken for Ruby >= 1.7.0, as it is also part of the
standard distribution now.
shell. Pipes and redirections work just as expected:
sh = Shell.cd("/foo")
sh.cat("bar") | sh.tee("baz") > "baa"
# or
sh.transact do
cat("bar") | tee("baz") > "baa"
end
patches were included to fix various bugs (including what I believe are
potential overflow bugs involving gets()).
PR: 23949
Submitted by: George Reid <greid@ukug.uk.freebsd.org>
that was in standard use up to UNIX 6th Edition and was supplied as osh
with UNIX 7th Edition. Its command language is a sparse subset of those
of modern shells and is mostly common to both sh(1) and csh(1).
PR: 23943
Submitted by: George Reid <greid@ukug.uk.freebsd.org>
dispite their meanings. (Sometimes we're too smart for computers. :)
Found by: sorting ports/INDEX by "sort -t '|' +1 -2"
(Note: the whole "x11" category appears at the end with the above sort
command, but I'll leave that the way it is for now -- "ls" shows it
before other x11-* entries.)
=====
# Id line
#
# RESTRICTED: restricted_port_1 (comment1)
# RESTRICTED: restricted_port_2 (comment2)
#
# BROKEN: broken_port_3 (comment3)
# BROKEN: broken_port_4 (comment4)
# BROKEN: broken_port_5 (comment5)
#
SUBDIR= good_port_1 good_port_2 ...
=====
Basically, the idea is to make it easy to find restricted or broken
ports by doing a "grep".