summaryrefslogtreecommitdiffstats
path: root/source/kde/kde/patch/dolphin/dolphin_revert_noroot.patch
diff options
context:
space:
mode:
Diffstat (limited to 'source/kde/kde/patch/dolphin/dolphin_revert_noroot.patch')
-rw-r--r--source/kde/kde/patch/dolphin/dolphin_revert_noroot.patch23
1 files changed, 0 insertions, 23 deletions
diff --git a/source/kde/kde/patch/dolphin/dolphin_revert_noroot.patch b/source/kde/kde/patch/dolphin/dolphin_revert_noroot.patch
deleted file mode 100644
index 423e17074..000000000
--- a/source/kde/kde/patch/dolphin/dolphin_revert_noroot.patch
+++ /dev/null
@@ -1,23 +0,0 @@
-# Let the user decide whether she wants to run Dolphin as root:
-
-diff -uar dolphin-18.08.0.orig/src/main.cpp dolphin-18.08.0/src/main.cpp
---- dolphin-18.08.0.orig/src/main.cpp 2018-08-06 22:41:40.000000000 +0200
-+++ dolphin-18.08.0/src/main.cpp 2018-08-11 00:32:48.073913157 +0200
-@@ -43,14 +43,12 @@
- extern "C" Q_DECL_EXPORT int kdemain(int argc, char **argv)
- {
- #ifndef Q_OS_WIN
-- // Prohibit using sudo or kdesu (but allow using the root user directly)
-+ // Warn using sudo or kdesu (but allow using the root user directly)
- if (getuid() == 0) {
- if (!qEnvironmentVariableIsEmpty("SUDO_USER")) {
-- std::cout << "Executing Dolphin with sudo is not possible due to unfixable security vulnerabilities." << std::endl;
-- return EXIT_FAILURE;
-+ std::cout << "Executing Dolphin with sudo is UNSAFE due to unfixable security vulnerabilities." << std::endl;
- } else if (!qEnvironmentVariableIsEmpty("KDESU_USER")) {
-- std::cout << "Executing Dolphin with kdesu is not possible due to unfixable security vulnerabilities." << std::endl;
-- return EXIT_FAILURE;
-+ std::cout << "Executing Dolphin with kdesu is UNSAFE due to unfixable security vulnerabilities." << std::endl;
- }
- }
- #endif