[commands] Remove eval from the list of sandboxed commands.

pull/310/head
Suresh Sundriyal 8 years ago
parent 88833c8035
commit e4ef35e652

@ -46,7 +46,6 @@ lnav v0.8.1:
- pipe-to
- pipe-line-to
- write-*-to
- eval
This makes it easier to run lnav with escalated privileges in restricted
environments, without the risk of users being able to use the above
mentioned commands to gain privileged access.

@ -143,7 +143,6 @@ The following options are available:
environment variable before executing the **lnav** binary:
- open
- eval
- pipe-to
- pipe-line-to
- write-*-to

@ -2241,9 +2241,6 @@ static string com_eval(string cmdline, vector<string> &args)
if (args.empty()) {
}
else if (lnav_data.ld_flags & LNF_SECURE_MODE) {
return "error: " + args[0] + " -- unavailable in secure mode";
}
else if (args.size() > 1) {
string all_args = remaining_args(cmdline, args);

Loading…
Cancel
Save