3
0
Fork 0
forked from mirrors/nixpkgs

Addressing feedback and fixing a bug

This commit is contained in:
Parnell Springmeyer 2017-02-14 07:38:45 -06:00
parent 467bb3f674
commit fb6d13c01a
No known key found for this signature in database
GPG key ID: DCCF89258EAD874A
3 changed files with 4 additions and 6 deletions

View file

@ -17,10 +17,8 @@ has the following highlights: </para>
</listitem>
<listitem>
<para>Setting capabilities on programs is now supported with a
<literal>setcap-wrapper</literal> functionality. This
functionality and the <literal>setuid-wrapper</literal> are merged
into a single "wrappers" module.</para>
<para>The setuid wrapper functionality now supports setting
capabilities.</para>
</listitem>
<listitem>

View file

@ -113,7 +113,7 @@
./security/prey.nix
./security/rngd.nix
./security/rtkit.nix
./security/wrappers
./security/wrappers/default.nix
./security/sudo.nix
./services/amqp/activemq/default.nix
./services/amqp/rabbitmq.nix

View file

@ -165,7 +165,7 @@ int main(int argc, char * * argv)
// should safely fit within the PATH_MAX system limit. Though I'm
// not positive it's safe...
char selfPath[PATH_MAX];
int selfPathSize = readlink("/proc/self/exe", selfPath, sizeof(selfPath) - 1);
int selfPathSize = readlink("/proc/self/exe", selfPath, sizeof(selfPath));
assert(selfPathSize > 0);