From e4ef35e65282e1fa5edd415501af626ccbc78917 Mon Sep 17 00:00:00 2001 From: Suresh Sundriyal Date: Sat, 23 Apr 2016 11:18:01 -0700 Subject: [PATCH] [commands] Remove eval from the list of sandboxed commands. --- NEWS | 1 - docs/source/commands.rst | 1 - src/lnav_commands.cc | 3 --- 3 files changed, 5 deletions(-) diff --git a/NEWS b/NEWS index e9e42aee..cd6435c0 100644 --- a/NEWS +++ b/NEWS @@ -46,7 +46,6 @@ lnav v0.8.1: - pipe-to - pipe-line-to - write-*-to - - eval This makes it easier to run lnav with escalated privileges in restricted environments, without the risk of users being able to use the above mentioned commands to gain privileged access. diff --git a/docs/source/commands.rst b/docs/source/commands.rst index 95925741..f559b428 100644 --- a/docs/source/commands.rst +++ b/docs/source/commands.rst @@ -143,7 +143,6 @@ The following options are available: environment variable before executing the **lnav** binary: - open - - eval - pipe-to - pipe-line-to - write-*-to diff --git a/src/lnav_commands.cc b/src/lnav_commands.cc index 85b0699e..18d9cf9e 100644 --- a/src/lnav_commands.cc +++ b/src/lnav_commands.cc @@ -2241,9 +2241,6 @@ static string com_eval(string cmdline, vector &args) if (args.empty()) { - } - else if (lnav_data.ld_flags & LNF_SECURE_MODE) { - return "error: " + args[0] + " -- unavailable in secure mode"; } else if (args.size() > 1) { string all_args = remaining_args(cmdline, args);