From ba74d639178916221c748b0d5d89f7ac4f5ed669 Mon Sep 17 00:00:00 2001 From: Fabian Vogt Date: Sat, 22 Apr 2017 14:00:33 +0200 Subject: [PATCH] Revert "Disallow executing Dolphin as root on Linux" This reverts commit 0bdd8e0b0516555c6233fdc7901e9b417cf89791. We ship a desktop file to open dolphin as root and we allow YaST on the desktop. So this patch is absolutely pointless for us. --- src/main.cpp | 13 ------------- 1 file changed, 13 deletions(-) Index: dolphin-19.11.70git.20210328T171136~9e8e58147/src/main.cpp =================================================================== --- dolphin-19.11.70git.20210328T171136~9e8e58147.orig/src/main.cpp 2021-03-30 06:58:11.172787035 +0200 +++ dolphin-19.11.70git.20210328T171136~9e8e58147/src/main.cpp 2021-03-30 06:59:29.060316063 +0200 @@ -32,26 +32,8 @@ #include #include -#ifndef Q_OS_WIN -#include -#endif -#include - int main(int argc, char **argv) { -#ifndef Q_OS_WIN - // Prohibit using sudo or kdesu (but allow using the root user directly) - if (getuid() == 0) { - if (!qEnvironmentVariableIsEmpty("SUDO_USER")) { - std::cout << "Executing Dolphin with sudo is not possible due to unfixable security vulnerabilities." << std::endl; - return EXIT_FAILURE; - } else if (!qEnvironmentVariableIsEmpty("KDESU_USER")) { - std::cout << "Executing Dolphin with kdesu is not possible due to unfixable security vulnerabilities." << std::endl; - return EXIT_FAILURE; - } - } -#endif - /** * enable high dpi support */