Fixed a security hole: .cvspass was in the webtree, and thus readable via the server.

git-svn-id: svn://10.0.0.236/trunk@64505 18797224-902f-48f8-a5cc-f745e15eee43
This commit is contained in:
dmose%mozilla.org 2000-03-29 22:15:15 +00:00
parent 8bb729bd1c
commit 51afbba55f

View File

@ -29,7 +29,13 @@ $perlbin = "/tools/ns/bin/perl5.004";
#$cvs = "/usr/bin/cvs";
#$whoami = "/usr/bin/whoami";
#$perlbin = "/usr/bin/perl";
#$curdir = `pwd`;
#chop($curdir);
#$ENV{"CVS_PASSFILE"} = "$curdir/.cvspass";
$ENV{"CVS_PASSFILE"} = "/usr/local/etc/despot-cvspass";
$dontcommit = 0;
$usertoblame = "";
@ -70,10 +76,6 @@ if (open(HOST, "/bin/hostname|")) {
$ENV{"HOME"} = glob("~$mylogin"); # CVS wants this.
$curdir = `pwd`;
chop($curdir);
$ENV{"CVS_PASSFILE"} = "$curdir/.cvspass";
if ($usertoblame eq "") {
$usertoblame = $mylogin;
}