From: Richard Levitte Date: Thu, 5 Mar 2020 13:14:09 +0000 (+0100) Subject: util/wrap.pl: do not look at EXE_SHELL X-Git-Tag: openssl-3.0.0-alpha1~305 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=refs%2Fpull%2F11258%2Fhead;p=thirdparty%2Fopenssl.git util/wrap.pl: do not look at EXE_SHELL Acting on EXE_SHELL was a bit over the top, especially in light of instructions like this (from NOTES.VALGRIND): EXE_SHELL="`/bin/pwd`/util/wrap.pl valgrind --error-exitcode=1 --leak-check=full -q" Fixes #11255 Reviewed-by: Nicola Tuveri Reviewed-by: Tomas Mraz (Merged from https://github.com/openssl/openssl/pull/11258) --- diff --git a/util/wrap.pl b/util/wrap.pl index 1c3b4e7c293..4c3d4713f17 100755 --- a/util/wrap.pl +++ b/util/wrap.pl @@ -19,11 +19,7 @@ $ENV{OPENSSL_MODULES} = $std_providers my $use_system = 0; my @cmd; -if (($ENV{EXE_SHELL} // '') ne '') { - # We don't know what $ENV{EXE_SHELL} contains, so we must use the one - # string form to ensure that exec invokes a shell as needed. - @cmd = ( join(' ', $ENV{EXE_SHELL}, @ARGV) ); -} elsif (-x $unix_shlib_wrap) { +if (-x $unix_shlib_wrap) { @cmd = ( $unix_shlib_wrap, @ARGV ); } else { # Hope for the best