After an evaluation, GNOME has moved from Bugzilla to GitLab. Learn more about GitLab.
No new issues can be reported in GNOME Bugzilla anymore.
To report an issue in a GNOME project, go to GNOME GitLab.
Do not go to GNOME Gitlab for: Bluefish, Doxygen, GnuCash, GStreamer, java-gnome, LDTP, NetworkManager, Tomboy.
Bug 771257 - Make caps/gperf generation more robust
Make caps/gperf generation more robust
Status: RESOLVED OBSOLETE
Product: vte
Classification: Core
Component: general
git master
Other Linux
: Normal enhancement
: ---
Assigned To: VTE Maintainers
VTE Maintainers
Depends on:
Blocks:
 
 
Reported: 2016-09-11 19:16 UTC by Egmont Koblinger
Modified: 2021-03-23 20:16 UTC
See Also:
GNOME target: ---
GNOME version: ---



Description Egmont Koblinger 2016-09-11 19:16:30 UTC
See bug 771256 (and the commit that fixes that). We should do something to prevent these kinds of breakages in the future.

The entire list of OSC sequences is dupliated for BEL and ST terminators. It should be present in the source code only once and auto-generated.

There's no verification whether the strings in caps.cc indeed match the ones in vteseq-n.gperf and hence we do not catch typos, instead we just silently begin to ignore the given escape sequence.
Comment 1 Christian Persch 2021-03-23 20:16:39 UTC
This was fixed long ago with the new parser.