diff options
Diffstat (limited to 'testing/source/vtown/kde/patch/dolphin/dolphin_revert_noroot.patch')
-rw-r--r-- | testing/source/vtown/kde/patch/dolphin/dolphin_revert_noroot.patch | 23 |
1 files changed, 0 insertions, 23 deletions
diff --git a/testing/source/vtown/kde/patch/dolphin/dolphin_revert_noroot.patch b/testing/source/vtown/kde/patch/dolphin/dolphin_revert_noroot.patch deleted file mode 100644 index 423e17074..000000000 --- a/testing/source/vtown/kde/patch/dolphin/dolphin_revert_noroot.patch +++ /dev/null @@ -1,23 +0,0 @@ -# Let the user decide whether she wants to run Dolphin as root: - -diff -uar dolphin-18.08.0.orig/src/main.cpp dolphin-18.08.0/src/main.cpp ---- dolphin-18.08.0.orig/src/main.cpp 2018-08-06 22:41:40.000000000 +0200 -+++ dolphin-18.08.0/src/main.cpp 2018-08-11 00:32:48.073913157 +0200 -@@ -43,14 +43,12 @@ - extern "C" Q_DECL_EXPORT int kdemain(int argc, char **argv) - { - #ifndef Q_OS_WIN -- // Prohibit using sudo or kdesu (but allow using the root user directly) -+ // Warn using sudo or kdesu (but allow using the root user directly) - if (getuid() == 0) { - if (!qEnvironmentVariableIsEmpty("SUDO_USER")) { -- std::cout << "Executing Dolphin with sudo is not possible due to unfixable security vulnerabilities." << std::endl; -- return EXIT_FAILURE; -+ std::cout << "Executing Dolphin with sudo is UNSAFE due to unfixable security vulnerabilities." << std::endl; - } else if (!qEnvironmentVariableIsEmpty("KDESU_USER")) { -- std::cout << "Executing Dolphin with kdesu is not possible due to unfixable security vulnerabilities." << std::endl; -- return EXIT_FAILURE; -+ std::cout << "Executing Dolphin with kdesu is UNSAFE due to unfixable security vulnerabilities." << std::endl; - } - } - #endif |