forked from lix-project/lix
alois31
f047e4357b
Seccomp filtering and the no-new-privileges functionality improve the security
of the sandbox, and have been enabled by default for a long time. In
lix-project/lix#265 it was decided that they
should be enabled unconditionally. Accordingly, remove the allow-new-privileges
(which had weird behavior anyway) and filter-syscall settings, and force the
security features on. Syscall filtering can still be enabled at build time to
support building on architectures libseccomp doesn't support.
Change-Id:
|
||
---|---|---|
.. | ||
rl-next | ||
rl-next-dev | ||
src | ||
theme | ||
anchors.jq | ||
book.toml | ||
change-authors.yml | ||
custom.css | ||
generate-builtin-constants.nix | ||
generate-builtins.nix | ||
generate-deps.py | ||
generate-manpage.nix | ||
generate-xp-features-shortlist.nix | ||
generate-xp-features.nix | ||
json-to-tree.py | ||
meson.build | ||
process-includes.sh | ||
quote-literals.xsl | ||
rclone.conf | ||
redirects.js | ||
render-manpage.sh | ||
substitute.py | ||
utils.nix |