Scponly validates dangerous arguments since version 4.0. However,
there is a regression compared with version 3.11. That is scponly can not be built only with sftp support. Reference: https://lists.ccs.neu.edu/pipermail/scponly/2004-December/000655.html PR: ports/75092 Submitteed by: maintainer
This commit is contained in:
parent
71c537e275
commit
1cb6e17cc5
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=124095
@ -63,7 +63,7 @@
|
||||
|
||||
PORTNAME= scponly
|
||||
PORTVERSION= 4.0
|
||||
PORTREVISION= 0
|
||||
PORTREVISION= 1
|
||||
CATEGORIES= shells
|
||||
MASTER_SITES= http://www.sublimation.org/scponly/
|
||||
EXTRACT_SUFX= .tgz
|
||||
|
12
shells/scponly/files/patch-ab
Normal file
12
shells/scponly/files/patch-ab
Normal file
@ -0,0 +1,12 @@
|
||||
--- scponly.c.orig Sun Nov 28 10:16:39 2004
|
||||
+++ scponly.c Wed Dec 15 13:38:11 2004
|
||||
@@ -76,7 +76,9 @@
|
||||
*/
|
||||
cmd_arg_t dangerous_args[] =
|
||||
{
|
||||
+#ifdef ENABLE_SCP2
|
||||
{ PROG_SCP, "-S" },
|
||||
+#endif
|
||||
{ PROG_SFTP_SERVER, "-S" },
|
||||
#ifdef UNISON_COMPAT
|
||||
{ PROG_UNISON, "-rshcmd" },
|
Loading…
Reference in New Issue
Block a user