wok view portmap/stuff/portmap-5beta-disable-tcp_wrapper.patch @ rev 25037

Up glza (0.11.4)
author Pascal Bellard <pascal.bellard@slitaz.org>
date Sat May 21 21:38:29 2022 +0000 (2022-05-21)
parents
children
line source
1 --- portmap_5beta/Makefile Fri Feb 1 11:54:29 2008
2 +++ Makefile Fri Feb 1 11:55:19 2008
3 @@ -15,9 +15,9 @@
4 # no access control tables. The local system, since it runs the portmap
5 # daemon, is always treated as an authorized host.
7 -HOSTS_ACCESS= -DHOSTS_ACCESS
8 +#HOSTS_ACCESS= -DHOSTS_ACCESS
9 #WRAP_LIB = $(WRAP_DIR)/libwrap.a
10 -WRAP_LIB = -lwrap
11 +#WRAP_LIB = -lwrap
13 # Comment out if your RPC library does not allocate privileged ports for
14 # requests from processes with root privilege, or the new portmap will
15 @@ -25,7 +25,7 @@
16 # ports. You can find out by running "rpcinfo -p"; if all mountd and NIS
17 # daemons use a port >= 1024 you should probably disable the next line.
19 -CHECK_PORT = -DCHECK_PORT
20 +#CHECK_PORT = -DCHECK_PORT
22 # Warning: troublesome feature ahead!! Enable only when you are really
23 # desperate!!