-rw-r--r-- | share/opie-login/post-session | 6 | ||||
-rw-r--r-- | share/opie-login/pre-session | 6 |
2 files changed, 6 insertions, 6 deletions
diff --git a/share/opie-login/post-session b/share/opie-login/post-session index bc88902..5275513 100644 --- a/share/opie-login/post-session +++ b/share/opie-login/post-session @@ -1,24 +1,24 @@ #!/bin/sh permout () { if [ -e $1 ] then chown root $1 else echo Warning: $1 does not exist. return 1 fi } if [ -e /proc/hal/model ]; then - devs = /dev/sound/dsp /dev/sound/mixer /dev/touchscreen/0 \ + devs=/dev/sound/dsp /dev/sound/mixer /dev/touchscreen/0 \ /dev/fb/0 /dev/vc/0 else - devs = /dev/dsp /dev/dsp1 /dev/mixer /dev/ts /dev/fb0 \ + devs=/dev/dsp /dev/dsp1 /dev/mixer /dev/ts /dev/fb0 \ /dev/sharp* /dev/collie* fi for i in $devs; do - permout( $i ) + permout $i done diff --git a/share/opie-login/pre-session b/share/opie-login/pre-session index e147afc..1c2b630 100644 --- a/share/opie-login/pre-session +++ b/share/opie-login/pre-session @@ -8,34 +8,34 @@ USER=$1 # question. We wish to ensure that, as a policy # choice, a login to opie makes access to these # devices exclusive by 1) changing device ownership # to the user, and 2) removing group access. # # A better implementation would probably be to store # existing device permissions at load time, and restore # them at exit, rather than making assumptions about # user/group ownership, or permissions. permin () { if [ -e $1 ] then chown $USER $1 else echo Warning: $1 does not exist. return 1 fi } if [ -e /proc/hal/model ]; then # fix for misconfigured devfsd chmod +x /dev/sound /dev/touchscreen /dev/fb /dev/vc - devs = /dev/sound/dsp /dev/sound/mixer /dev/touchscreen/0 \ + devs=/dev/sound/dsp /dev/sound/mixer /dev/touchscreen/0 \ /dev/fb/0 /dev/vc/0 else - devs = /dev/dsp /dev/dsp1 /dev/mixer /dev/ts /dev/fb0 \ + devs=/dev/dsp /dev/dsp1 /dev/mixer /dev/ts /dev/fb0 \ /dev/sharp* /dev/collie* fi for i in $devs; do - permin( $i ) + permin $i done |