lix/src
Eelco Dolstra cd49ee0897 Fix a security bug in hash rewriting
Before calling dumpPath(), we have to make sure the files are owned by
the build user.  Otherwise, the build could contain a hard link to
(say) /etc/shadow, which would then be read by the daemon and
rewritten as a world-readable file.

This only affects systems that don't have hard link restrictions
enabled.
2013-06-13 17:12:24 +02:00
..
boost * Install some headers in the right location. 2009-03-05 14:57:50 +00:00
bsdiff-4.3 Drop the externals directory 2012-03-18 23:54:57 +01:00
libexpr Show function names in error messages 2013-05-16 19:08:02 +02:00
libmain Revert "Prevent config.h from being clobbered" 2013-03-08 01:24:59 +01:00
libstore Fix a security bug in hash rewriting 2013-06-13 17:12:24 +02:00
libutil Process stderr from substituters while doing have/info queries 2013-06-07 15:02:14 +02:00
nix-daemon nix-daemon: Trust options like binary-caches when the client is root 2013-06-12 12:10:26 +02:00
nix-env Allow setting the profile location using $NIX_PROFILE 2012-12-12 16:01:46 +01:00
nix-hash When ‘--help’ is given, just run ‘man’ to show the manual page 2012-10-03 16:40:09 -04:00
nix-instantiate nix-instantiate: Fix read-only evaluation 2012-11-26 17:41:10 +01:00
nix-log2xml * Emit warning='1' or error='1' attributes for lines marked as 2010-03-05 12:54:58 +00:00
nix-setuid-helper Templatise tokenizeString() 2012-09-19 15:43:23 -04:00
nix-store nix-store --export: Export paths in topologically sorted order 2013-05-23 14:55:36 -04:00
Makefile.am Rename nix-worker to nix-daemon 2012-10-03 17:59:23 -04:00