diff options
| author | pacien <pacien.trangirard@pacien.net> | 2023-06-05 20:04:48 +0200 |
|---|---|---|
| committer | pacien <pacien.trangirard@pacien.net> | 2023-06-05 20:04:48 +0200 |
| commit | 54be076ae77da1f45fbc6c88419657f828e6237e (patch) | |
| tree | 64f74d75a7ddc72e0cd31b4a7ab2157df5f9cc58 /pkgs/development/python-modules/rangehttpserver | |
| parent | 09720cc41f0dad446f119e3a6259c640d4b33003 (diff) | |
nixos/exim: apply privilege restrictions
Since 816614bd62b, the service is set to use the exim user so that
systemd takes care of the credentials ownership. The executable is
still required to run as root, to then drop privileges. The prefix '+'
that was used however interfers with the use of privilege restrictions
and other sandboxing options. Since we only want to escape the "User"
setting, we can use the '!' prefix instead.
Diffstat (limited to 'pkgs/development/python-modules/rangehttpserver')
0 files changed, 0 insertions, 0 deletions
