solaris jail: two more privileges for unix domain sockets

When varnishd is started as root (or otherwise will a full privilege
set), the user will rightly expect that whatever permissions and mode
bits are set for a socket, varnishd will fix them to the specification
from the -a argument.
parent adb48856
......@@ -59,7 +59,9 @@ PRIV(MASTER_FILE, E , "file_write")
PRIV(MASTER_STORAGE, E , "file_read")
PRIV(MASTER_STORAGE, E , "file_write")
PRIV(MASTER_PRIVPORT, E , "file_write") // bind(AF_UNIX)
PRIV(MASTER_PRIVPORT, E , "file_write") // bind(AF_UNIX)
PRIV(MASTER_PRIVPORT, E , PRIV_FILE_CHOWN) // user=
PRIV(MASTER_PRIVPORT, E , PRIV_FILE_OWNER) // mode=
PRIV(MASTER_PRIVPORT, E , "net_access")
PRIV(MASTER_PRIVPORT, E , PRIV_NET_PRIVADDR)
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment