summaryrefslogtreecommitdiff
path: root/pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch
diff options
context:
space:
mode:
authorGrimmauld <Grimmauld@grimmauld.de>2025-06-25 23:12:13 +0200
committerGrimmauld <Grimmauld@grimmauld.de>2025-07-02 13:06:50 +0200
commit4db1e1cf1356bf7569db932fb339efa83657ee5d (patch)
tree50e462c3824534d750f1cb5e05782fe33c1e113a /pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch
parent916454f79645ecba4da6b7974927fea9cc4a8d60 (diff)
audit: build with libcap_ng
See auditd-plugins(5) for motivation: > When the audit daemon starts your plugin, you will be running as root. > If you do not need root privileges, you should change uid/gid to lower > chances of being a target for exploit. If you need to retain capabilities, > using libcap-ng is the simplest way. `libcap_ng` is already in the closure via util-linux and thus does not unnecessarily bloat the system. It is also a very sane idea to allow plugins to drop privileges if they already conveniently support it.
Diffstat (limited to 'pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch')
0 files changed, 0 insertions, 0 deletions