On Thu, 15 May 2014 07:21:58 +0200
Ulrich Mueller wrote:
> > On Wed, 14 May 2014, Ryan Hill wrote:
>
> > I'm a lazy bum and I'm tired of rebasing patches that fail due to
> > whitespace. Is this doable or would it make the universe explode?
>
> Please don't. There are languages where whites
On Thu, May 15, 2014 at 12:01 PM, Mike Gilbert wrote:
> On Thu, May 15, 2014 at 2:48 PM, Ciaran McCreesh
> wrote:
> > On Thu, 15 May 2014 14:44:58 -0400
> > Mike Gilbert wrote:
> >> On Thu, May 15, 2014 at 1:17 PM, Ciaran McCreesh
> >> wrote:
> >> > On Thu, 15 May 2014 17:15:32 +
> >> > ha
On Thu, May 15, 2014 at 2:48 PM, Ciaran McCreesh
wrote:
> On Thu, 15 May 2014 14:44:58 -0400
> Mike Gilbert wrote:
>> On Thu, May 15, 2014 at 1:17 PM, Ciaran McCreesh
>> wrote:
>> > On Thu, 15 May 2014 17:15:32 +
>> > hasufell wrote:
>> >> Ciaran McCreesh:
>> >> > Sandboxing isn't about sec
On Thu, 15 May 2014 14:44:58 -0400
Mike Gilbert wrote:
> On Thu, May 15, 2014 at 1:17 PM, Ciaran McCreesh
> wrote:
> > On Thu, 15 May 2014 17:15:32 +
> > hasufell wrote:
> >> Ciaran McCreesh:
> >> > Sandboxing isn't about security.
> >> >
> >>
> >> Sure it is.
> >
> > Then where do the bug r
On Thu, May 15, 2014 at 1:17 PM, Ciaran McCreesh
wrote:
> On Thu, 15 May 2014 17:15:32 +
> hasufell wrote:
>> Ciaran McCreesh:
>> > Sandboxing isn't about security.
>> >
>>
>> Sure it is.
>
> Then where do the bug reports for all the "security violations"
> possible with sandbox go?
>
There
On Thu, 15 May 2014 20:35:41 +0200
"Thomas D." wrote:
> Ciaran McCreesh wrote:
> > Sandboxing isn't about security. It's about catching mistakes.
>
> From Wikipedia
> (http://en.wikipedia.org/wiki/Sandbox_%28computer_security%29):
> > In computer security, a sandbox is a security mechanism for
>
Hi,
Ciaran McCreesh wrote:
> Sandboxing isn't about security. It's about catching mistakes.
>From Wikipedia
(http://en.wikipedia.org/wiki/Sandbox_%28computer_security%29):
> In computer security, a sandbox is a security mechanism for
> separating running programs. It is often used to execute unt
On Thu, 15 May 2014 17:15:32 +
hasufell wrote:
> Ciaran McCreesh:
> > Sandboxing isn't about security.
> >
>
> Sure it is.
Then where do the bug reports for all the "security violations"
possible with sandbox go?
--
Ciaran McCreesh
signature.asc
Description: PGP signature
Ciaran McCreesh:
>
> Sandboxing isn't about security.
>
Sure it is.
On Thu, 15 May 2014 16:48:24 +0100
Ciaran McCreesh wrote:
> Sandboxing isn't about security. It's about catching mistakes.
Ciaran has a point here. Thomas, you assumed that network-sandbox is
the only thing stopping an ebuild from accessing local services or the
internet. However, even with netw
On Thu, 15 May 2014 13:12:30 +0200
"Thomas D." wrote:
> Ryan Hill wrote:
> > Probably best to make FEATURES=distcc disable network-sandbox
> > then. People enabling it are explicitly saying they want to access
> > the network.
>
> Do you really think it is a good behavior to automatically disable
On Thu, May 15, 2014 at 4:12 AM, Thomas D. wrote:
> Hi,
>
> Ryan Hill wrote:
> > Probably best to make FEATURES=distcc disable network-sandbox
> > then. People enabling it are explicitly saying they want to access
> > the network.
>
> Do you really think it is a good behavior to automatically dis
Hi,
Ryan Hill wrote:
> Probably best to make FEATURES=distcc disable network-sandbox
> then. People enabling it are explicitly saying they want to access
> the network.
Do you really think it is a good behavior to automatically disable
something you can call a "security feature"? At least there s
It's called keeping status quo.
08.05.2014 08:07, Alex Alexander пишет:
> x11-misc/whaw
Took this one, really neat and simple tool!
--
Best regards, Sergey Popov
Gentoo developer
Gentoo Desktop Effects project lead
Gentoo Qt project lead
Gentoo Proxy maintainers project lead
signature.asc
Description: OpenPGP digital signat
El mar, 13-05-2014 a las 15:23 -0400, Ian Stakenvicius escribió:
> On 13/05/14 03:19 PM, Pacho Ramos wrote:
> > El dom, 11-05-2014 a las 20:56 +0200, Michał Górny escribió: [...]
> >> 4. whenever possible, depend on the specific subslot that is
> >> known to provide SONAME equal to the required by
16 matches
Mail list logo