diff options
author | Eelco Dolstra <edolstra@gmail.com> | 2019-09-19 19:17:30 +0200 |
---|---|---|
committer | Eelco Dolstra <edolstra@gmail.com> | 2019-09-19 19:17:30 +0200 |
commit | b0ccd6dd16909c8639c2d9bee7dd2a2a0ac74c30 (patch) | |
tree | ee6367837650bb97dc5117d518217b11294900fe /nixos/modules/security/hidepid.xml | |
parent | db3d31b903da12bc471e91d811d231dfe5b662ef (diff) | |
download | nixlib-b0ccd6dd16909c8639c2d9bee7dd2a2a0ac74c30.tar nixlib-b0ccd6dd16909c8639c2d9bee7dd2a2a0ac74c30.tar.gz nixlib-b0ccd6dd16909c8639c2d9bee7dd2a2a0ac74c30.tar.bz2 nixlib-b0ccd6dd16909c8639c2d9bee7dd2a2a0ac74c30.tar.lz nixlib-b0ccd6dd16909c8639c2d9bee7dd2a2a0ac74c30.tar.xz nixlib-b0ccd6dd16909c8639c2d9bee7dd2a2a0ac74c30.tar.zst nixlib-b0ccd6dd16909c8639c2d9bee7dd2a2a0ac74c30.zip |
Revert "nixos/doc: re-format"
This reverts commit ea6e8775bd69e4676c623a85c39f1da540d29ad1. The new format is not an improvement.
Diffstat (limited to 'nixos/modules/security/hidepid.xml')
-rw-r--r-- | nixos/modules/security/hidepid.xml | 11 |
1 files changed, 8 insertions, 3 deletions
diff --git a/nixos/modules/security/hidepid.xml b/nixos/modules/security/hidepid.xml index 979d0215ab34..5a17cb1da412 100644 --- a/nixos/modules/security/hidepid.xml +++ b/nixos/modules/security/hidepid.xml @@ -9,13 +9,18 @@ <programlisting> <xref linkend="opt-security.hideProcessInformation"/> = true; </programlisting> - ensures that access to process information is restricted to the owning user. This implies, among other things, that command-line arguments remain private. Unless your deployment relies on unprivileged users being able to inspect the process information of other users, this option should be safe to enable. + ensures that access to process information is restricted to the owning user. + This implies, among other things, that command-line arguments remain private. + Unless your deployment relies on unprivileged users being able to inspect the + process information of other users, this option should be safe to enable. </para> <para> - Members of the <literal>proc</literal> group are exempt from process information hiding. + Members of the <literal>proc</literal> group are exempt from process + information hiding. </para> <para> - To allow a service <replaceable>foo</replaceable> to run without process information hiding, set + To allow a service <replaceable>foo</replaceable> to run without process + information hiding, set <programlisting> <link linkend="opt-systemd.services._name_.serviceConfig">systemd.services.<replaceable>foo</replaceable>.serviceConfig</link>.SupplementaryGroups = [ "proc" ]; </programlisting> |