summaryrefslogtreecommitdiffstats
path: root/testing/source/vtown/kde/patch/dolphin/dolphin_revert_noroot.patch
diff options
context:
space:
mode:
Diffstat (limited to 'testing/source/vtown/kde/patch/dolphin/dolphin_revert_noroot.patch')
-rw-r--r--testing/source/vtown/kde/patch/dolphin/dolphin_revert_noroot.patch23
1 files changed, 23 insertions, 0 deletions
diff --git a/testing/source/vtown/kde/patch/dolphin/dolphin_revert_noroot.patch b/testing/source/vtown/kde/patch/dolphin/dolphin_revert_noroot.patch
new file mode 100644
index 000000000..423e17074
--- /dev/null
+++ b/testing/source/vtown/kde/patch/dolphin/dolphin_revert_noroot.patch
@@ -0,0 +1,23 @@
+# Let the user decide whether she wants to run Dolphin as root:
+
+diff -uar dolphin-18.08.0.orig/src/main.cpp dolphin-18.08.0/src/main.cpp
+--- dolphin-18.08.0.orig/src/main.cpp 2018-08-06 22:41:40.000000000 +0200
++++ dolphin-18.08.0/src/main.cpp 2018-08-11 00:32:48.073913157 +0200
+@@ -43,14 +43,12 @@
+ extern "C" Q_DECL_EXPORT int kdemain(int argc, char **argv)
+ {
+ #ifndef Q_OS_WIN
+- // Prohibit using sudo or kdesu (but allow using the root user directly)
++ // Warn using sudo or kdesu (but allow using the root user directly)
+ if (getuid() == 0) {
+ if (!qEnvironmentVariableIsEmpty("SUDO_USER")) {
+- std::cout << "Executing Dolphin with sudo is not possible due to unfixable security vulnerabilities." << std::endl;
+- return EXIT_FAILURE;
++ std::cout << "Executing Dolphin with sudo is UNSAFE due to unfixable security vulnerabilities." << std::endl;
+ } else if (!qEnvironmentVariableIsEmpty("KDESU_USER")) {
+- std::cout << "Executing Dolphin with kdesu is not possible due to unfixable security vulnerabilities." << std::endl;
+- return EXIT_FAILURE;
++ std::cout << "Executing Dolphin with kdesu is UNSAFE due to unfixable security vulnerabilities." << std::endl;
+ }
+ }
+ #endif