tor/src
Jérémy Bobbio d41ac64ad6 Add UnixSocketsGroupWritable config flag
When running a system-wide instance of Tor on Unix-like systems, having
a ControlSocket is a quite handy mechanism to access Tor control
channel.  But it would be easier if access to the Unix domain socket can
be granted by making control users members of the group running the Tor
process.

This change introduces a UnixSocketsGroupWritable option, which will
create Unix domain sockets (and thus ControlSocket) 'g+rw'. This allows
ControlSocket to offer same access control measures than
ControlPort+CookieAuthFileGroupReadable.

See <http://bugs.debian.org/552556> for more details.
2011-05-15 20:20:28 -04:00
..
common Merge remote-tracking branch 'origin/maint-0.2.1' into maint-0.2.2 2011-05-15 20:09:10 -04:00
config Merge branch 'maint-0.2.1' into maint-0.2.2 2011-05-10 23:05:51 -04:00
or Add UnixSocketsGroupWritable config flag 2011-05-15 20:20:28 -04:00
test fwd-port test_util_di_ops into tinytest format 2011-05-11 16:25:51 -04:00
tools Merge remote branch 'origin/maint-0.2.1' into maint-0.2.2 2011-01-03 11:51:17 -05:00
win32 bump to 0.2.2.19-alpha 2010-11-21 18:00:12 -05:00
Makefile.am Move testing code into new src/test directory. 2009-09-23 00:24:43 -04:00