lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <1473863528.32273.30.camel@perches.com>
Date:   Wed, 14 Sep 2016 07:32:08 -0700
From:   Joe Perches <joe@...ches.com>
To:     Rafał Miłecki <zajec5@...il.com>,
        Linux Kernel Mailing List <linux-kernel@...r.kernel.org>
Subject: Re: get_maintainer.pl and git send-email: 5.1.2 The recipient
 address <linux-mtd@...ts.infradead.org)> is not a valid

On Wed, 2016-09-14 at 07:13 -0700, Joe Perches wrote:
> The scripts use --to-cmd to address the direct maintainers
> and cc-cmd to address indirect maintainers and mailing lists.

I neglected to mention I use a separate directory for each patch series
so there are no other files in the directory that could be scanned with
the wildcard use of '$(dirname $1)/*'

$ git format-patch -o <new_directory> ...

> $ cat ~/bin/to.sh
> #!/bin/bash
> 
> opts="--nogit --nogit-fallback --norolestats --pattern-depth=1"
> 
> if [[ $(basename $1) =~ ^0000- ]] ; then
>     ./scripts/get_maintainer.pl --nom $opts  $(dirname $1)/*
> else
>     maint=$(./scripts/get_maintainer.pl --nol $opts $1)
>     if [ "$maint" == "" ] ; then
> > 	echo "linux-kernel@...r.kernel.org"
>     else
> 	echo "$maint"
>     fi
> fi
> 
> $ cat ~/bin/cc.sh
> #!/bin/bash
> 
> opts="--nogit --nogit-fallback --norolestats"
> 
> if [[ $(basename $1) =~ ^0000- ]] ; then
>     ./scripts/get_maintainer.pl --nom $opts  $(dirname $1)/*
> else
>     ./scripts/get_maintainer.pl $opts $1
> fi
> 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ