summaryrefslogtreecommitdiff
path: root/pcr
diff options
context:
space:
mode:
authorDavid P. <megver83@parabola.nu>2024-02-06 11:19:37 -0300
committerDavid P. <megver83@parabola.nu>2024-02-06 11:19:37 -0300
commite435ce552618f3e989d7e9a9c2121fc1b2bbb7dd (patch)
tree1de71b267414e310a11884dffaa33ad6647853e0 /pcr
parent5a80913f95f4a5027f1171fc6fe8f3a494ff7b56 (diff)
remove pcr/kate-root
Signed-off-by: David P. <megver83@parabola.nu>
Diffstat (limited to 'pcr')
-rw-r--r--pcr/kate-root/0001-Defuse-root-block.patch54
-rw-r--r--pcr/kate-root/PKGBUILD70
2 files changed, 0 insertions, 124 deletions
diff --git a/pcr/kate-root/0001-Defuse-root-block.patch b/pcr/kate-root/0001-Defuse-root-block.patch
deleted file mode 100644
index 948718748..000000000
--- a/pcr/kate-root/0001-Defuse-root-block.patch
+++ /dev/null
@@ -1,54 +0,0 @@
-From 435ed5853b9451ab8fdfff722545c57a8f154625 Mon Sep 17 00:00:00 2001
-From: Fabian Vogt <fabian@ritter-vogt.de>
-Date: Sat, 18 Feb 2017 13:49:14 +0100
-Subject: [PATCH] Defuse root block
-
-While the main point is correct as any application running in the same
-X session (not sandboxed) can use kate's capability to open a console,
-we allow (even encourage) running YaST on X11 as root.
-That way it's only an impact on usability.
----
- kate/main.cpp | 3 +--
- kwrite/main.cpp | 3 +--
- 2 files changed, 2 insertions(+), 4 deletions(-)
-
-Index: kate-19.03.60git.20181224T024634~7203979fc/kate/main.cpp
-===================================================================
---- kate-19.03.60git.20181224T024634~7203979fc.orig/kate/main.cpp 2018-12-25 09:49:15.867478873 +0100
-+++ kate-19.03.60git.20181224T024634~7203979fc/kate/main.cpp 2018-12-25 09:49:19.231424088 +0100
-@@ -61,13 +61,8 @@
- #ifndef Q_OS_WIN
- // Prohibit using sudo or kdesu (but allow using the root user directly)
- if (getuid() == 0) {
-- if (!qEnvironmentVariableIsEmpty("SUDO_USER")) {
-- std::cout << "Executing Kate with sudo is not possible due to unfixable security vulnerabilities." << std::endl;
-- return EXIT_FAILURE;
-- } else if (!qEnvironmentVariableIsEmpty("KDESU_USER")) {
-- std::cout << "Executing Kate with kdesu is not possible due to unfixable security vulnerabilities." << std::endl;
-- return EXIT_FAILURE;
-- }
-+ std::cout << "THIS IS POTENTIALLY INSECURE!\nTo edit files as root please use:" << std::endl;
-+ std::cout << "SUDO_EDITOR=kwrite sudoedit <file>" << std::endl;
- }
- #endif
- /**
-Index: kate-19.03.60git.20181224T024634~7203979fc/kwrite/main.cpp
-===================================================================
---- kate-19.03.60git.20181224T024634~7203979fc.orig/kwrite/main.cpp 2018-12-25 09:49:19.231424088 +0100
-+++ kate-19.03.60git.20181224T024634~7203979fc/kwrite/main.cpp 2018-12-25 09:50:32.302253532 +0100
-@@ -52,13 +52,8 @@
- #ifndef Q_OS_WIN
- // Prohibit using sudo or kdesu (but allow using the root user directly)
- if (getuid() == 0) {
-- if (!qEnvironmentVariableIsEmpty("SUDO_USER")) {
-- std::cout << "Executing KWrite with sudo is not possible due to unfixable security vulnerabilities." << std::endl;
-- return EXIT_FAILURE;
-- } else if (!qEnvironmentVariableIsEmpty("KDESU_USER")) {
-- std::cout << "Executing KWrite with kdesu is not possible due to unfixable security vulnerabilities." << std::endl;
-- return EXIT_FAILURE;
-- }
-+ std::cout << "THIS IS POTENTIALLY INSECURE!\nTo edit files as root please use:" << std::endl;
-+ std::cout << "SUDO_EDITOR=kwrite sudoedit <file>" << std::endl;
- }
- #endif
- /**
diff --git a/pcr/kate-root/PKGBUILD b/pcr/kate-root/PKGBUILD
deleted file mode 100644
index ef49aa6f8..000000000
--- a/pcr/kate-root/PKGBUILD
+++ /dev/null
@@ -1,70 +0,0 @@
-# Maintainer: David P. <megver83@parabola.nu>
-# Contributor: Felix Yan <felixonmars@archlinux.org>
-# Contributor: Antonio Rojas <arojas@archlinux.org>
-# Contributor: Andrea Scarpino <andrea@archlinux.org>
-
-pkgbase=kate-root
-_pkgbase=${pkgbase%-root}
-pkgname=(kwrite-root kate-root)
-pkgver=19.04.2
-pkgrel=1
-arch=(armv7h i686 x86_64)
-license=(GPL LGPL FDL)
-makedepends=(extra-cmake-modules kdoctools plasma-framework knewstuff ktexteditor threadweaver kitemmodels kactivities)
-source=("https://download.kde.org/stable/applications/$pkgver/src/$_pkgbase-$pkgver.tar.xz"{,.sig}
- 0001-Defuse-root-block.patch)
-sha512sums=('568af7df0588d65f386f482f944b44c7bacffeecf374fce4b4e276be8ca556cbf983c2df2e99a3900c15bd7dfaa0d71b6540c37b4c2773a5293b3e5cba1d3939'
- 'SKIP'
- '01f7fd779d2e2c87ccb78e1f6014b89687b87af33831eae74864c66ed52e18d2adbb9b2803574cd8a55f7feacd24c9b1afbf3cba5b7b45b2746a36d6072894df')
-validpgpkeys=(CA262C6C83DE4D2FB28A332A3A6A4DB839EAA6D7 # Albert Astals Cid <aacid@kde.org>
- F23275E4BF10AFC1DF6914A6DBD2CE893E2D1C87) # Christoph Feck <cfeck@kde.org>
-
-prepare() {
- mkdir -p build
- cd $srcdir/$_pkgbase-$pkgver
- patch -p1 -i $srcdir/0001-Defuse-root-block.patch
-}
-
-build() {
- cd build
- cmake ../$_pkgbase-$pkgver \
- -DCMAKE_INSTALL_PREFIX=/usr \
- -DCMAKE_INSTALL_LIBDIR=lib \
- -DBUILD_TESTING=OFF
- make
-}
-
-package_kwrite-root() {
- pkgdesc="Text Editor, patched to be able to run as root"
- url="https://www.kde.org/applications/utilities/kwrite/"
- depends=(ktexteditor kactivities hicolor-icon-theme)
- provides=(${pkgname%-root})
- conflicts=(${provides[@]})
- replaces=(${provides[@]})
-
- cd build
- make DESTDIR="$pkgdir" install
-
- find "$pkgdir" -type f -name '*kate*' -exec rm {} \;
- rm -r "$pkgdir"/usr/lib/qt/plugins/ktexteditor \
- "$pkgdir"/usr/share/doc/HTML/*/{kate,katepart} \
- "$pkgdir"/usr/share/katexmltools \
- "$pkgdir"/usr/share/locale/*/LC_MESSAGES/{kterustcompletion,tabswitcherplugin,ktexteditorpreviewplugin}.mo \
- "$pkgdir"/usr/share/plasma/plasmoids
-}
-
-package_kate-root() {
- pkgdesc="Advanced Text Editor, patched to be able to run as root"
- url="https://www.kde.org/applications/utilities/kate/"
- depends=(knewstuff ktexteditor threadweaver kitemmodels kactivities hicolor-icon-theme)
- provides=(${pkgname%-root})
- conflicts=(${provides[@]})
- replaces=(${provides[@]})
- optdepends=('konsole: open a terminal in Kate')
-
- cd build
- make DESTDIR="$pkgdir" install
-
- find "$pkgdir" -type f -name '*kwrite*' -exec rm {} \;
- rm -r "$pkgdir"/usr/share/doc/HTML/*/kwrite
-}