f047e4357b
Seccomp filtering and the no-new-privileges functionality improve the security of the sandbox, and have been enabled by default for a long time. In https://git.lix.systems/lix-project/lix/issues/265 it was decided that they should be enabled unconditionally. Accordingly, remove the allow-new-privileges (which had weird behavior anyway) and filter-syscall settings, and force the security features on. Syscall filtering can still be enabled at build time to support building on architectures libseccomp doesn't support. Change-Id: Iedbfa18d720ae557dee07a24f69b2520f30119cb |
||
---|---|---|
.. | ||
rl-next | ||
rl-next-dev | ||
src | ||
theme | ||
anchors.jq | ||
book.toml | ||
change-authors.yml | ||
custom.css | ||
generate-builtin-constants.nix | ||
generate-builtins.nix | ||
generate-deps.py | ||
generate-manpage.nix | ||
generate-xp-features-shortlist.nix | ||
generate-xp-features.nix | ||
json-to-tree.py | ||
meson.build | ||
process-includes.sh | ||
quote-literals.xsl | ||
rclone.conf | ||
redirects.js | ||
render-manpage.sh | ||
substitute.py | ||
utils.nix |