summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorPascal Rigaux <pixel@mandriva.com>2003-02-14 13:40:47 +0000
committerPascal Rigaux <pixel@mandriva.com>2003-02-14 13:40:47 +0000
commit30af5ece9005186a46e65e358ff45b044480f67e (patch)
treefa2a865e93ab0f2473a50f4a0a4600d5a888e730
parent2fdcefa981f0248dea6f649ed84d9b309fd8965d (diff)
downloaddrakx-30af5ece9005186a46e65e358ff45b044480f67e.tar
drakx-30af5ece9005186a46e65e358ff45b044480f67e.tar.gz
drakx-30af5ece9005186a46e65e358ff45b044480f67e.tar.bz2
drakx-30af5ece9005186a46e65e358ff45b044480f67e.tar.xz
drakx-30af5ece9005186a46e65e358ff45b044480f67e.zip
fix errors (due to previous commit)
-rw-r--r--perl-install/security/level.pm8
1 files changed, 4 insertions, 4 deletions
diff --git a/perl-install/security/level.pm b/perl-install/security/level.pm
index d4211874f..36d5d19cf 100644
--- a/perl-install/security/level.pm
+++ b/perl-install/security/level.pm
@@ -71,15 +71,15 @@ The security is now high enough to use the system as a server which can accept
connections from many clients. Note: if your machine is only a client on the Internet, you should choose a lower level."),
5 => N("This is similar to the previous level, but the system is entirely closed and security features are at their maximum."),
);
- delete @l{0,1};
- delete $l{5} if !$::expert;
+
+ my @l = 2 .. 5;
$in->ask_from_({ title => N("DrakSec Basic Options"),
messages => N("Please choose the desired security level") . "\n\n" .
- join('', map { "$l{$_}: " . formatAlaTeX($help{$_}) . "\n\n" } ikeys %l),
+ join('', map { to_string($_) . ": " . formatAlaTeX($help{$_}) . "\n\n" } @l),
interactive_help_id => 'miscellaneous',
}, [
- { label => N("Security level"), val => $security, list => [ sort keys %l ], format => \&to_string },
+ { label => N("Security level"), val => $security, list => \@l, format => \&to_string },
if_($in->do_pkgs->is_installed('libsafe') && arch() =~ /^i.86/,
{ label => N("Use libsafe for servers"), val => $libsafe, type => 'bool', text =>
N("A library which defends against buffer overflow and format string attacks.") }),