wok-next diff portmap/stuff/portmap-5beta-disable-tcp_wrapper.patch @ rev 174

Typo in patch disable-tcp_wrapper
author Eric Joseph-Alexandre <erjo@slitaz.org>
date Fri Feb 01 12:12:28 2008 +0100 (2008-02-01)
parents
children
line diff
     1.1 --- /dev/null	Thu Jan 01 00:00:00 1970 +0000
     1.2 +++ b/portmap/stuff/portmap-5beta-disable-tcp_wrapper.patch	Fri Feb 01 12:12:28 2008 +0100
     1.3 @@ -0,0 +1,23 @@
     1.4 +--- portmap_5beta/Makefile	Fri Feb  1 11:54:29 2008
     1.5 ++++ Makefile	Fri Feb  1 11:55:19 2008
     1.6 +@@ -15,9 +15,9 @@
     1.7 + # no access control tables. The local system, since it runs the portmap
     1.8 + # daemon, is always treated as an authorized host.
     1.9 + 
    1.10 +-HOSTS_ACCESS= -DHOSTS_ACCESS
    1.11 ++#HOSTS_ACCESS= -DHOSTS_ACCESS
    1.12 + #WRAP_LIB = $(WRAP_DIR)/libwrap.a
    1.13 +-WRAP_LIB = -lwrap
    1.14 ++#WRAP_LIB = -lwrap
    1.15 + 
    1.16 + # Comment out if your RPC library does not allocate privileged ports for
    1.17 + # requests from processes with root privilege, or the new portmap will
    1.18 +@@ -25,7 +25,7 @@
    1.19 + # ports. You can find out by running "rpcinfo -p"; if all mountd and NIS
    1.20 + # daemons use a port >= 1024 you should probably disable the next line.
    1.21 + 
    1.22 +-CHECK_PORT = -DCHECK_PORT
    1.23 ++#CHECK_PORT = -DCHECK_PORT
    1.24 + 
    1.25 + # Warning: troublesome feature ahead!! Enable only when you are really
    1.26 + # desperate!!