wok-next view portmap/stuff/portmap-5beta-disable-tcp_wrapper.patch @ rev 174

Typo in patch disable-tcp_wrapper
author Eric Joseph-Alexandre <erjo@slitaz.org>
date Fri Feb 01 12:12:28 2008 +0100 (2008-02-01)
parents
children
line source
1 --- portmap_5beta/Makefile Fri Feb 1 11:54:29 2008
2 +++ Makefile Fri Feb 1 11:55:19 2008
3 @@ -15,9 +15,9 @@
4 # no access control tables. The local system, since it runs the portmap
5 # daemon, is always treated as an authorized host.
7 -HOSTS_ACCESS= -DHOSTS_ACCESS
8 +#HOSTS_ACCESS= -DHOSTS_ACCESS
9 #WRAP_LIB = $(WRAP_DIR)/libwrap.a
10 -WRAP_LIB = -lwrap
11 +#WRAP_LIB = -lwrap
13 # Comment out if your RPC library does not allocate privileged ports for
14 # requests from processes with root privilege, or the new portmap will
15 @@ -25,7 +25,7 @@
16 # ports. You can find out by running "rpcinfo -p"; if all mountd and NIS
17 # daemons use a port >= 1024 you should probably disable the next line.
19 -CHECK_PORT = -DCHECK_PORT
20 +#CHECK_PORT = -DCHECK_PORT
22 # Warning: troublesome feature ahead!! Enable only when you are really
23 # desperate!!