about summary refs log tree commit diff
path: root/nixos/modules/security/hidepid.xml
diff options
context:
space:
mode:
authorJan Tojnar <jtojnar@gmail.com>2019-09-18 22:13:35 +0200
committerJan Tojnar <jtojnar@gmail.com>2019-09-18 22:13:35 +0200
commitea6e8775bd69e4676c623a85c39f1da540d29ad1 (patch)
tree87c478306e7bc911b267e356c608faacb38ff573 /nixos/modules/security/hidepid.xml
parent83c2ad80ca8c6087b034155e2a767c4f72a6df3f (diff)
downloadnixlib-ea6e8775bd69e4676c623a85c39f1da540d29ad1.tar
nixlib-ea6e8775bd69e4676c623a85c39f1da540d29ad1.tar.gz
nixlib-ea6e8775bd69e4676c623a85c39f1da540d29ad1.tar.bz2
nixlib-ea6e8775bd69e4676c623a85c39f1da540d29ad1.tar.lz
nixlib-ea6e8775bd69e4676c623a85c39f1da540d29ad1.tar.xz
nixlib-ea6e8775bd69e4676c623a85c39f1da540d29ad1.tar.zst
nixlib-ea6e8775bd69e4676c623a85c39f1da540d29ad1.zip
nixos/doc: re-format
Diffstat (limited to 'nixos/modules/security/hidepid.xml')
-rw-r--r--nixos/modules/security/hidepid.xml11
1 files changed, 3 insertions, 8 deletions
diff --git a/nixos/modules/security/hidepid.xml b/nixos/modules/security/hidepid.xml
index 5a17cb1da412..979d0215ab34 100644
--- a/nixos/modules/security/hidepid.xml
+++ b/nixos/modules/security/hidepid.xml
@@ -9,18 +9,13 @@
 <programlisting>
 <xref linkend="opt-security.hideProcessInformation"/> = true;
 </programlisting>
-  ensures that access to process information is restricted to the owning user.
-  This implies, among other things, that command-line arguments remain private.
-  Unless your deployment relies on unprivileged users being able to inspect the
-  process information of other users, this option should be safe to enable.
+  ensures that access to process information is restricted to the owning user. This implies, among other things, that command-line arguments remain private. Unless your deployment relies on unprivileged users being able to inspect the process information of other users, this option should be safe to enable.
  </para>
  <para>
-  Members of the <literal>proc</literal> group are exempt from process
-  information hiding.
+  Members of the <literal>proc</literal> group are exempt from process information hiding.
  </para>
  <para>
-  To allow a service <replaceable>foo</replaceable> to run without process
-  information hiding, set
+  To allow a service <replaceable>foo</replaceable> to run without process information hiding, set
 <programlisting>
 <link linkend="opt-systemd.services._name_.serviceConfig">systemd.services.<replaceable>foo</replaceable>.serviceConfig</link>.SupplementaryGroups = [ "proc" ];
 </programlisting>