From rushani@FreeBSD.org  Wed Dec 15 04:54:39 2004
Return-Path: <rushani@FreeBSD.org>
Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125])
	by hub.freebsd.org (Postfix) with ESMTP id 2E90B16A4CE
	for <FreeBSD-gnats-submit@freebsd.org>; Wed, 15 Dec 2004 04:54:39 +0000 (GMT)
Received: from wasley.bl.mmtr.or.jp (wasley.bl.mmtr.or.jp [210.228.173.142])
	by mx1.FreeBSD.org (Postfix) with SMTP id 8964643D31
	for <FreeBSD-gnats-submit@freebsd.org>; Wed, 15 Dec 2004 04:54:38 +0000 (GMT)
	(envelope-from rushani@FreeBSD.org)
Received: (qmail 10101 invoked from network); 15 Dec 2004 13:54:37 +0900
Received: from unknown (HELO localhost) (210.165.212.57)
  by wasley.bl.mmtr.or.jp with SMTP; 15 Dec 2004 13:54:37 +0900
Message-Id: <20041215.135218.71107742.rushani@FreeBSD.org>
Date: Wed, 15 Dec 2004 13:52:18 +0900 (JST)
From: Hideyuki KURASHINA <rushani@FreeBSD.org>
To: FreeBSD-gnats-submit@freebsd.org
Subject: [Maintainer update] shells/scponly: Unbreak sftp only support
X-Send-Pr-Version: 3.113

>Number:         75092
>Category:       ports
>Synopsis:       [Maintainer update] shells/scponly: Unbreak sftp only support
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-ports-bugs
>State:          closed
>Quarter:        
>Keywords:       
>Date-Required:  
>Class:          maintainer-update
>Submitter-Id:   current-users
>Arrival-Date:   Wed Dec 15 05:00:46 GMT 2004
>Closed-Date:    Wed Dec 15 10:48:20 GMT 2004
>Last-Modified:  Wed Dec 15 10:48:20 GMT 2004
>Originator:     Hideyuki KURASHINA
>Release:        FreeBSD 5.3-STABLE i386
>Organization:
>Environment:

	System: FreeBSD ***.*******.jp 5.3-STABLE FreeBSD 5.3-STABLE #0: Sun Dec 5 04:38:28 JST 2004 hideyuki@***.*******.jp:/usr/obj/usr/src/sys/*** i386

>Description:

	Scponly validates dangerous arguments since version 4.0.  However,
	there is a regression compared with version 3.11.  That is scponly
	can not be built only with sftp support.

	Reference:
	  https://lists.ccs.neu.edu/pipermail/scponly/2004-December/000655.html

>How-To-Repeat:

	# cd /usr/ports/shells/scponly
	# make -DWITHOUT_SCPONLY_WINSCP -DWITHOUT_SCPONLY_SCP

>Fix:

	Apply following patch,

Index: Makefile
===================================================================
RCS file: /home/ncvs/ports/shells/scponly/Makefile,v
retrieving revision 1.13
diff -u -r1.13 Makefile
--- Makefile	4 Dec 2004 23:56:24 -0000	1.13
+++ Makefile	15 Dec 2004 04:44:31 -0000
@@ -63,7 +63,7 @@
 
 PORTNAME=	scponly
 PORTVERSION=	4.0
-PORTREVISION=	0
+PORTREVISION=	1
 CATEGORIES=	shells
 MASTER_SITES=	http://www.sublimation.org/scponly/
 EXTRACT_SUFX=	.tgz
Index: files/patch-ab
===================================================================
RCS file: files/patch-ab
diff -N files/patch-ab
--- /dev/null	1 Jan 1970 00:00:00 -0000
+++ files/patch-ab	15 Dec 2004 04:41:40 -0000
@@ -0,0 +1,12 @@
+--- scponly.c.orig	Sun Nov 28 10:16:39 2004
++++ scponly.c	Wed Dec 15 13:38:11 2004
+@@ -76,7 +76,9 @@
+  */
+ cmd_arg_t dangerous_args[] =
+ {
++#ifdef ENABLE_SCP2
+ 	{ PROG_SCP, "-S" },
++#endif
+ 	{ PROG_SFTP_SERVER, "-S" },
+ #ifdef UNISON_COMPAT
+ 	{ PROG_UNISON, "-rshcmd" },
>Release-Note:
>Audit-Trail:
State-Changed-From-To: open->closed 
State-Changed-By: vs 
State-Changed-When: Wed Dec 15 10:47:59 GMT 2004 
State-Changed-Why:  
Committed, thanks! 

http://www.freebsd.org/cgi/query-pr.cgi?pr=75092 
>Unformatted:
