You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
when we designed the dma architecture, we deliberately decided against running commands, because it requires running as setuid root and increases the vulnerability surface significantly. if you need command aliases, dma is not for you.
On August 13, 2021 3:08:21 PM CDT, Clint Armstrong ***@***.***> wrote:
It would be nice if dma worked with command aliases. As described in `aliases(5)`
```
|command
Pipe the message to command on its standard input. The
command is run under the privileges of the daemon's
unprivileged account.
```
--
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
#102
--
Sent from my Android device with K-9 Mail. Please excuse my brevity.
It would be nice if dma worked with command aliases. As described in
aliases(5)
The text was updated successfully, but these errors were encountered: