I just found out the hard way (no notice) that at(1) has been permanently disabled on bolt for "security" reasons.
The loss of at/atq in my case broke the main script that manages my fairly simple web site, as it was used to accurately cycle webcam images based on calculated sunrise/sunset.
Given at(1) runs in the same user environment as when logged in to bolt, this makes little obvious sense, and I fail to see how sonic can claim to offer linux shell accounts when fundamentals like at(1) cannot be securely managed.
Perhaps the technical management for shell access should evaluate a longer term strategy and run something a bit more robust than redhat 7.3 and a 2.4.37 kernel instead of crippling fundamental unix work environment tools.
Very disappointing and very un-sonic-like.
Tim.
The loss of at/atq in my case broke the main script that manages my fairly simple web site, as it was used to accurately cycle webcam images based on calculated sunrise/sunset.
Given at(1) runs in the same user environment as when logged in to bolt, this makes little obvious sense, and I fail to see how sonic can claim to offer linux shell accounts when fundamentals like at(1) cannot be securely managed.
Perhaps the technical management for shell access should evaluate a longer term strategy and run something a bit more robust than redhat 7.3 and a 2.4.37 kernel instead of crippling fundamental unix work environment tools.
Very disappointing and very un-sonic-like.
Tim.