Mark code that escapes/unescapes "sudo -s cmd args..." for removal.

A future version of the plugin API will defer any such escaping
to the policy plugin so it can be configurable.
This commit is contained in:
Todd C. Miller
2022-09-29 13:43:20 -06:00
parent 63efad271a
commit afaeb0ed57
3 changed files with 5 additions and 0 deletions

View File

@@ -1047,6 +1047,7 @@ set_cmnd(void)
* When running a command via a shell, the sudo front-end
* escapes potential meta chars. We unescape non-spaces
* for sudoers matching and logging purposes.
* TODO: move escaping to the policy plugin instead
*/
user_args = strvec_join(NewArgv + 1, ' ', strlcpy_unescape);
} else {