From dcbb2cedc5a6f4d7461bf1f52e117cc3638b7812 Mon Sep 17 00:00:00 2001 From: onefang Date: Wed, 25 Aug 2021 19:38:30 +1000 Subject: Comment tweaks. --- src/sledjchisl/sledjchisl.c | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/src/sledjchisl/sledjchisl.c b/src/sledjchisl/sledjchisl.c index 501c7d1..171acd5 100644 --- a/src/sledjchisl/sledjchisl.c +++ b/src/sledjchisl/sledjchisl.c @@ -8150,7 +8150,7 @@ Setup the database stuff. grant all on $MYSQL_DB.* to '$MYSQL_USER'@localhost; FLUSH PRIVILEGES; -Deal with the user. +Deal with the system user. sudo adduser --system --shell /bin/bash --group ${OS_USER} sudo addgroup ${USER} ${OS_USER} @@ -8224,7 +8224,7 @@ Build the OpenSim. // The path to sledjchisl.socket needs to be readable by the www-data group. So the FCGI socket will work. // AND it needs to be group sticky on opensimsc group. So the tmux socket will work. // Put both in scRun, and make it other readable? -// No idea of the SECURITY HOLE that might cause. +// TODO - No idea of the SECURITY HOLE that might cause. if(!qfile_exist(scRun)) { W("Creating the proper %s directory.", scRun); @@ -8281,7 +8281,7 @@ Build the OpenSim. else { I("Not running inside the proper tmux server, starting it with sudo."); - // The sudo is only so that the session is owned by opensim, otherwise it's owned by whoever ran this script, which is a likely security hole. + // The sudo is only so that the session is owned by opensim, otherwise it's owned by whoever ran this script, which is a likely SECURITY HOLE. // After the session is created, we rely on the scRun directory to be group sticky, so that anyone in the opensim group can attach to the tmux socket. pre = xmprintf("sudo -Hu %s ", scUser); } @@ -8326,7 +8326,6 @@ Build the OpenSim. } - //////////////////////////////////////////////////////////////////////////////////////////////////// // Other start up stuff. //////////////////////////////////////////////////////////////////////////////////////////////////// -- cgit v1.1