summaryrefslogtreecommitdiff
path: root/src/main.c
diff options
context:
space:
mode:
authorHelmut Grohne <helmut@subdivi.de>2015-11-09 22:16:10 +0100
committerGuillem Jover <guillem@debian.org>2016-05-02 04:14:22 +0200
commit85651f17887d4c9f82a61b97aa13a50aa714d0eb (patch)
treebdda5106077f1778598145e592ec279742be0691 /src/main.c
parent1a1cb120d14c9e77e7e560587f444cb1bfc6da5c (diff)
downloaddpkg-85651f17887d4c9f82a61b97aa13a50aa714d0eb.tar.gz
dpkg: Add new --force-script-chrootless option
Currently, dpkg chroots to the instdir before invoking maintainer scripts. The new force flag will inhibit the chroot call. The user is supposed to know that the packages being operated on does support this new mode of operation. Thus the force flag is marked as dangerous. [guillem@debian.org: - Rename force option to --force-script-chrootless. - Reword force option description in man page. - Reactor changedir variable. ] Ref: #804624 Signed-off-by: Guillem Jover <guillem@debian.org>
Diffstat (limited to 'src/main.c')
-rw-r--r--src/main.c3
1 files changed, 3 insertions, 0 deletions
diff --git a/src/main.c b/src/main.c
index 790919eb7..2c4c933d2 100644
--- a/src/main.c
+++ b/src/main.c
@@ -196,6 +196,7 @@ int fc_conff_ask = 0;
int fc_unsafe_io = 0;
int fc_badverify = 0;
int fc_badversion = 0;
+int fc_script_chrootless = 0;
int errabort = 50;
static const char *admindir = ADMINDIR;
@@ -248,6 +249,8 @@ static const struct forceinfo {
'!', N_("Overwrite one package's directory with another's file") },
{ "unsafe-io", &fc_unsafe_io,
'!', N_("Do not perform safe I/O operations when unpacking") },
+ { "script-chrootless", &fc_script_chrootless,
+ '!', N_("Do not chroot into maintainer script environment") },
{ "confnew", &fc_conff_new,
'!', N_("Always use the new config files, don't prompt") },
{ "confold", &fc_conff_old,