wok annotate portmap/stuff/portmap-5beta-disable-tcp_wrapper.patch @ rev 22023
Remove cat process
| author | Pascal Bellard <pascal.bellard@slitaz.org> |
|---|---|
| date | Sun Oct 20 12:39:13 2019 +0200 (2019-10-20) |
| parents | |
| children |
| rev | line source |
|---|---|
| erjo@174 | 1 --- portmap_5beta/Makefile Fri Feb 1 11:54:29 2008 |
| erjo@174 | 2 +++ Makefile Fri Feb 1 11:55:19 2008 |
| erjo@174 | 3 @@ -15,9 +15,9 @@ |
| erjo@174 | 4 # no access control tables. The local system, since it runs the portmap |
| erjo@174 | 5 # daemon, is always treated as an authorized host. |
| erjo@174 | 6 |
| erjo@174 | 7 -HOSTS_ACCESS= -DHOSTS_ACCESS |
| erjo@174 | 8 +#HOSTS_ACCESS= -DHOSTS_ACCESS |
| erjo@174 | 9 #WRAP_LIB = $(WRAP_DIR)/libwrap.a |
| erjo@174 | 10 -WRAP_LIB = -lwrap |
| erjo@174 | 11 +#WRAP_LIB = -lwrap |
| erjo@174 | 12 |
| erjo@174 | 13 # Comment out if your RPC library does not allocate privileged ports for |
| erjo@174 | 14 # requests from processes with root privilege, or the new portmap will |
| erjo@174 | 15 @@ -25,7 +25,7 @@ |
| erjo@174 | 16 # ports. You can find out by running "rpcinfo -p"; if all mountd and NIS |
| erjo@174 | 17 # daemons use a port >= 1024 you should probably disable the next line. |
| erjo@174 | 18 |
| erjo@174 | 19 -CHECK_PORT = -DCHECK_PORT |
| erjo@174 | 20 +#CHECK_PORT = -DCHECK_PORT |
| erjo@174 | 21 |
| erjo@174 | 22 # Warning: troublesome feature ahead!! Enable only when you are really |
| erjo@174 | 23 # desperate!! |