From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on inbox.vuxu.org X-Spam-Level: X-Spam-Status: No, score=0.3 required=5.0 tests=MAILING_LIST_MULTI, RCVD_IN_DNSWL_NONE,RDNS_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.2 Received: (qmail 17794 invoked from network); 26 Mar 2020 21:28:37 -0000 Received-SPF: pass (primenet.com.au: domain of zsh.org designates 203.24.36.2 as permitted sender) receiver=inbox.vuxu.org; client-ip=203.24.36.2 envelope-from= Received: from unknown (HELO primenet.com.au) (203.24.36.2) by inbox.vuxu.org with ESMTP; 26 Mar 2020 21:28:37 -0000 Received: (qmail 14833 invoked by alias); 26 Mar 2020 21:28:30 -0000 Mailing-List: contact zsh-workers-help@zsh.org; run by ezmlm Precedence: bulk X-No-Archive: yes List-Id: Zsh Workers List List-Post: List-Help: List-Unsubscribe: X-Seq: 45635 Received: (qmail 5936 invoked by uid 1010); 26 Mar 2020 21:28:30 -0000 X-Qmail-Scanner-Diagnostics: from know-smtprelay-omc-9.server.virginmedia.net by f.primenet.com.au (envelope-from , uid 7791) with qmail-scanner-2.11 (clamdscan: 0.102.2/25758. spamassassin: 3.4.2. Clear:RC:0(80.0.253.73):SA:0(-2.0/5.0):. Processed in 0.710729 secs); 26 Mar 2020 21:28:30 -0000 X-Envelope-From: p.w.stephenson@ntlworld.com X-Qmail-Scanner-Mime-Attachments: | X-Qmail-Scanner-Zip-Files: | Received-SPF: pass (ns1.primenet.com.au: SPF record at _smtprelay.virginmedia.com designates 80.0.253.73 as permitted sender) X-Originating-IP: [86.16.88.158] X-Authenticated-User: p.w.stephenson@ntlworld.com X-Spam: 0 X-Authority: v=2.3 cv=DOmhHRFb c=1 sm=1 tr=0 a=MiHCjVqLJ44lE3bxSlffFQ==:117 a=MiHCjVqLJ44lE3bxSlffFQ==:17 a=IkcTkHD0fZMA:10 a=GdyVLwyXKkfYM2zl-_8A:9 a=QEXdDO2ut3YA:10 Message-ID: Subject: :P test failure From: Peter Stephenson To: Zsh hackers list Date: Thu, 26 Mar 2020 21:27:54 +0000 Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.28.5-0ubuntu0.18.04.1 Mime-Version: 1.0 Content-Transfer-Encoding: 7bit X-CMAE-Envelope: MS4wfF56W459kD1puZqcA2TH97VnM+PXa9d+RXnuBPJTsiohFTcv6MT1xxshWlR8i7pgSz3eRzNEn4xtmgrUutu56xqUpFpU+D4XXTke+DalX4bw96XaLkpg VtZSqS/10LIoQAIk+9ZC7Iljwkm2zngqUhKfoKmUihyT6JrN/i2JD2Xr This doesn't work on my machine: # This is a bit brittle as it depends on PATH_MAX. # We could use sysconf.. bad_pwd="/${(l:16000:: :):-}" print ${bad_pwd:P} | wc -c 0:modifier ':P' with path too long >16002 The modification fails with error and output zsh: path expansion failed, using root directory 2 pws