mirror of https://github.com/digint/btrbk
Revert the hack for shell-based run_cmd() causing problems on zsh.
Signed-off-by: Michael Düll <michael.duell@rub.de>pull/65/head
parent
a1698ef4b0
commit
d51de98604
1
btrbk
1
btrbk
|
@ -1285,7 +1285,6 @@ sub btrfs_send_receive($$$$)
|
||||||
cmd => [ qw(btrfs receive), @receive_options, $target_path . '/' ],
|
cmd => [ qw(btrfs receive), @receive_options, $target_path . '/' ],
|
||||||
rsh => $target->{RSH},
|
rsh => $target->{RSH},
|
||||||
name => "btrfs receive",
|
name => "btrfs receive",
|
||||||
catch_stderr => 1, # hack for shell-based run_cmd()
|
|
||||||
filter_stderr => sub { $err = $_; $_ = undef }
|
filter_stderr => sub { $err = $_; $_ = undef }
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue