From 9b5672ebedf22e1c0d3ba81791c64087e369ee02 Mon Sep 17 00:00:00 2001 From: Leo Izen Date: Sun, 15 Nov 2020 22:06:59 -0500 Subject: manpage: document improved --playlist security Recent versions of mpv have applied security checks to --playlist that previously only existed if playlist files were played as an input directly. This commit documents this change and how to work around it, in the event that playlist files are trusted. --- stream/stream.c | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) (limited to 'stream') diff --git a/stream/stream.c b/stream/stream.c index f422c5d08d..116dcef4a4 100644 --- a/stream/stream.c +++ b/stream/stream.c @@ -441,8 +441,7 @@ int stream_create_with_args(struct stream_open_args *args, struct stream **ret) if (r == STREAM_UNSAFE) { mp_err(log, "\nRefusing to load potentially unsafe URL from a playlist.\n" - "Use --playlist=file or the --load-unsafe-playlists option to " - "load it anyway.\n\n"); + "Use the --load-unsafe-playlists option to load it anyway.\n\n"); } else if (r == STREAM_NO_MATCH || r == STREAM_UNSUPPORTED) { mp_err(log, "No protocol handler found to open URL %s\n", args->url); mp_err(log, "The protocol is either unsupported, or was disabled " -- cgit v1.2.3