« Previous | Next » 

Revision d87ef93a

IDd87ef93a58d7160110620ed14fd567c91a658301

Added by Bastian Waidelich almost 10 years ago

[TASK] Escape phpBinaryPathAndFilename in Command execution

Currently the bootstrap fails to properly escape the php path
when dispatching sub requests in command execution.
This leads to exceptions when the path contains spaces or other
special characters.
This is fixed by putting the command in quotes and replacing
backslashes.

Change-Id: Ida11468a75ba2465db275a55e331b2d6e6eb4a0f
Fixes: #30040
Releases: 1.0, 1.1

  • added
  • modified
  • copied
  • renamed
  • deleted