summaryrefslogtreecommitdiff
path: root/debian/patches/configure-bashism.patch
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2012-09-07 00:20:47 +0100
committerColin Watson <cjwatson@debian.org>2012-09-07 00:20:47 +0100
commiteab78da6a54225de06271d9c8da650f04a55ed88 (patch)
treeaa258ca77515939f6d89317ff67fbcb0bca08b24 /debian/patches/configure-bashism.patch
parenta26f5de49df59322fde07f7be91b3e3969c9c238 (diff)
parentc6a2c0334e45419875687d250aed9bea78480f2e (diff)
* New upstream release (http://www.openssh.com/txt/release-6.1).
- Enable pre-auth sandboxing by default for new installs. - Allow "PermitOpen none" to refuse all port-forwarding requests (closes: #543683).
Diffstat (limited to 'debian/patches/configure-bashism.patch')
-rw-r--r--debian/patches/configure-bashism.patch31
1 files changed, 0 insertions, 31 deletions
diff --git a/debian/patches/configure-bashism.patch b/debian/patches/configure-bashism.patch
deleted file mode 100644
index 09f878376..000000000
--- a/debian/patches/configure-bashism.patch
+++ /dev/null
@@ -1,31 +0,0 @@
1Description: Fix a bashism in configure
2Author: Colin Watson <cjwatson@debian.org>
3Forwarded: https://bugzilla.mindrot.org/show_bug.cgi?id=2010
4Last-Update: 2012-05-18
5
6Index: b/configure
7===================================================================
8--- a/configure
9+++ b/configure
10@@ -11918,7 +11918,7 @@
11
12 elif test "x$sandbox_arg" = "xseccomp_filter" || \
13 ( test -z "$sandbox_arg" && \
14- test "x$have_seccomp_filter" == "x1" && \
15+ test "x$have_seccomp_filter" = "x1" && \
16 test "x$ac_cv_header_linux_audit_h" = "xyes" && \
17 test "x$have_seccomp_audit_arch" = "x1" && \
18 test "x$have_linux_no_new_privs" = "x1" && \
19Index: b/configure.ac
20===================================================================
21--- a/configure.ac
22+++ b/configure.ac
23@@ -2615,7 +2615,7 @@
24 AC_DEFINE([SANDBOX_DARWIN], [1], [Sandbox using Darwin sandbox_init(3)])
25 elif test "x$sandbox_arg" = "xseccomp_filter" || \
26 ( test -z "$sandbox_arg" && \
27- test "x$have_seccomp_filter" == "x1" && \
28+ test "x$have_seccomp_filter" = "x1" && \
29 test "x$ac_cv_header_linux_audit_h" = "xyes" && \
30 test "x$have_seccomp_audit_arch" = "x1" && \
31 test "x$have_linux_no_new_privs" = "x1" && \